Network Security Engineering: Introduction



Similar documents
Layered protocol (service) architecture

Kick starting science...

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

COSC 472 Network Security

Protocoles internet. Carole Delporte paris- diderot.fr Introduc8on. C. Delporte M2- Internet 1

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

TELE 301 Network Management. Lecture 18: Network Security

How To Classify A Dnet Attack

Network Security and the Small Business

Chapter 8 Security Pt 2

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Overview of computer and communications security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Content Teaching Academy at James Madison University

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Chapter 7: Network security

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

The Information Security Problem


Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

E-BUSINESS THREATS AND SOLUTIONS

Security Issues with Integrated Smart Buildings

Threat Events: Software Attacks (cont.)

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

1 Introduction. Agenda Item: Work Item:

Network attack and defense

Project 25 Security Services Overview

Network Security in Practice

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Network Security - ISA 656 Review

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Module 5: Analytical Writing

Overview. Packet filter

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Data Management & Protection: Common Definitions

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Jort Kollerie SonicWALL

CISCO IOS NETWORK SECURITY (IINS)

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security: Introduction

Don t Fall Victim to Cybercrime:

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CS549: Cryptography and Network Security

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Lecture 13 - Network Security

Firewalls, Tunnels, and Network Intrusion Detection

What is network security?

Top tips for improved network security

Security Issues with Distributed Web Applications

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Denial of Service Attacks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Own your LAN with Arp Poison Routing

Course on Computer Communication and Networks. Lecture 1 & part of lecture 2 Chapter 1: Introduction

What Do You Mean My Cloud Data Isn t Secure?

Austin Peay State University

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Firewall Design Principles Firewall Characteristics Types of Firewalls

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Service Description DDoS Mitigation Service

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

1 Introduction. Agenda Item: Work Item:

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

PART D NETWORK SERVICES

Cybersecurity for the C-Level

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

Business Phone Security. Threats to VoIP and What to do about Them

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

100% Malware-Free A Guaranteed Approach

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Computer Security DD2395

WHITE PAPER. Understanding How File Size Affects Malware Detection

Managing Web Security in an Increasingly Challenging Threat Landscape

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

BE SAFE ONLINE: Lesson Plan

E-BUSINESS SECURITY ASPECTS

IBM Protocol Analysis Module

7 Cs of WEB design - Customer Interface

Network Security Demonstration - Snort based IDS Integration -

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Seminar Computer Security

Security Type of attacks Firewalls Protocols Packet filter

How To Stop A Ddos Attack On A Website From Being Successful

Network Incident Report

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Skoot Secure File Transfer

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Transcription:

Network Security Engineering: Introduction Carlo U. Nicola, SGI FHNW With extracts from publications of : Ross J. Anderson, University of Cambridge William Stallings, David A. Wheeler. and from the book of : Jim Kurose, Keith Ross: Computer Networking: A Top Down Approach, 5th edition. Addison-Wesley, 2009.

Network Security engineering s goals i. Confidentiality: The computing system s assets are accessible only by authorised parties ii. Integrity: The assets can only be modified by authorised parties in authorised ways.. iii. User identification/authentication: Ensure the identity of users; Protect the source of information (sender). iv. Access control (Authorisation) : Control the access to information/resources. v. Non repudiation: Protect from deniability. vi. Availability: Ensure info delivery to authorised parties. NS HS13 2

Security is a war on many fronts Personnel: Access Tokens (RSA), Biometrics Physical: Integrated access control Managerial: Security Education Data Networking: Encryption, Configuration control S/W & O/S: Testing, Evaluation, Certification H/W: Tempest protection, Tamper-proof, Encryption Security is not a tax on the IT budget NS HS13 3

Security is a (political) process (NSA) STATEMENT FOR THE RECORD BY LIEUTENANT GENERAL MICHAEL V. HAYDEN, USAF DIRECTOR, NATIONAL SECURITY AGENCY/ CHIEF, CENTRAL SECURITY SERVICE BEFORE THE JOINT INQUIRY OF THE SENATE SELECT COMMITTEE ON INTELLIGENCE AND THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE 17 OCTOBER 2002 NS HS13 4

Security is a process (NSA) 38.When I spoke with our workforce shortly after the September 11th attacks, I told them that free people always had to decide where to draw the line between their liberty and their security, and I noted that the attacks would almost certainly push us as a nation more toward security. I then gave the NSA workforce a challenge: We were going to keep America free by making Americans feel safe again. 39.Let me close by telling you what I hope to get out of the national dialogue that these committees are fostering. I am not really helped by being reminded that I need more Arabic linguists or by someone secondguessing an obscure intercept sitting in our files that may make more sense today than it did two years ago. What I really need you to do is to talk to your constituents and find out where the American people want that line between security and liberty to be. NS HS13 5

The answer of te USA politicians AS HS13 6

Security threats Various surveys show following distribution (apart from NSA) in security threats: 1. 55% human error 2. 10% disgruntled employees 3. 10% dishonest employees 4. 15% outsider access 5. Rest "acts of God" (fire, flood etc.) AS HS13 7

Human error (1) NS HS13 8

Small probabilities means NS HS13 9

Security attacks Interception of information-traffic flow: attacks confidentiality. Interruption of service: attacks availability (DoS). Modification of information: attacks integrity. Fabrication of information: attacks authentication. Exploit of security holes in web applications: all of the above. NS HS13 10

Sophistication s level of security threats For more information see Chap. 10 of Anderson s book. Always remember: (a) Dumb and malicious people are the major security risks. (b) High-tech scenarios are not very probable ( Ocean s eleven ). (c) Clever, unexpected use of low-tech tools is the major threat (D.B. Cooper 1971; UnaBomber; Twin Towers attack of Sept. 11, 2001). (d) Theft of Cellini s saliera in Vienna (May, 12 th 2003), theft of Der Schrei of Edvard Munch in Oslo (August, 21 st 2004) NS HS13 11

Internet users per 100 inhabitants in 2007 NS HS13 12

New Technology new Threats November, 2 nd 1988: 6,000 of ca. 60,000 Internet's nodes are attacked by a malicious program that massively overloads the systems' CPUs. Consequences:! System's administrators disconnect their networks from the Internet.! Two weeks go by until all nodes are re-established. Author: Robert Tappan Morris, a 25 years old Ph.D. student of the Cornell University. We will later on analyze the Morris worm. NS HS13 13

Trend in Security in 21. century The more sophisticated is the security the more brutal and unsophisticated the attack. Internet cyber crime is a reality and it is more profitable and unfortunately less dangerous (for the criminals themselves) than selling cocaine. NS HS13 14

Network Security The field of network security is about: how bad guys can attack computer networks how we can defend networks against attacks how to design architectures that are immune to attacks Internet was not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Internet protocol designers playing catch-up Security considerations in all layers! NS HS13 15

Bad guys (NSA) can put malware into hosts via Internet Malware can get in host from a virus, worm, or trojan horse. Spyware malware can record keystrokes, web sites visited, upload info to collection site. Infected host can be enrolled in a botnet, used for spam and DDoS attacks. Malware is often self-replicating: from an infected host, seeks entry into other hosts NS HS13 16

Bad guys (NSA) can put malware into hosts via Internet Trojan horse! Hidden part of some otherwise useful software! Today often on a Web page (Active-X, plugin) Virus/Phishing! infection by receiving object (e.g., e-mail attachment), actively executing! self-replicating: propagate itself to other hosts, users Worm:! infection by passively receiving object that gets itself executed! self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) Bad guys can put malware into hosts via Internet NS HS13 17

Bad guys (NSA) can attack servers and network infrastructure Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resources with bogus traffic. 1. Select target 2. Break into hosts around the network (see botnet) 3. Send packets toward target from compromised hosts target NS HS13 18

The bad guys (NSA) can sniff packets Packet sniffing: broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A C src:b dest:a payload B The Wireshark software we use in the lab is a (free) packet-sniffer NS HS13 19

The bad guys (NSA) can falsify packets IP spoofing: send packet with false source address A C src:b dest:a payload B NS HS13 20

The bad guys (NSA) can record and playback Record-and-playback: sniff sensitive info (e.g., password), and use it later:! password holder is that user from system point of view A C src:b dest:a user: B; password: foo B NS HS13 21

General Model for Network Security Sources of security holes NS HS13 22

General Model of Network Access Security NS HS13 23