72
Fundamentals of Network Security CryptoWorks21 • July 25 & 27, 2017 Dr Douglas Stebila https://www.douglas.stebila.ca/teaching/cryptoworks21

Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

FundamentalsofNetworkSecurity

CryptoWorks21•July25&27,2017

Dr DouglasStebila

https://www.douglas.stebila.ca/teaching/cryptoworks21

Page 2: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

FundamentalsofNetworkSecurity1. BasicsofInformationSecurity

– Securityarchitectureandinfrastructure;securitygoals(confidentiality,integrity,availability,andauthenticity);threats/vulnerabilities/attacks;riskmanagement

2. CryptographicBuildingBlocks– Symmetriccrypto:ciphers(stream,block),hashfunctions,message

authenticationcodes,pseudorandomfunctions– Publickeycrypto:publickeyencryption,digitalsignatures,keyagreement

3. NetworkSecurityProtocols&Standards– Indetail:publickeyinfrastructure,TLS– Overview:Networking,SSH,IPsec,Kerberos,WEP

4. NetworkScanningandDefence– Trafficsniffingandnetworkreconnaissance(mmap)– Networkprotection:firewallsandintrusiondetection

5. AccessControl&Authentication;WebApplicationSecurity– Accesscontrol:discretionary/mandatory/role-based;phases– Authentication:somethingyouknow/have/are/somewhereyouare– Websecurity:cookies,SQLinjection– Supplementalmaterial:Passwords

Page 3: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

FundamentalsofNetworkSecurity

• Lectures:– Tuesday10:30-12and1-2:30pminQNC1201– Thursday10:30-12and1-2:30pminQNC4104

• Assessment:– 4practicalhands-onexerciseswithnetworkandapplicationsecurity,withafewquestionstosubmitfromeach

– DueFridayAugust11

Page 4: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

FundamentalsofNetworkSecurity1.BasicsofInformationSecurity

CryptoWorks21•June27,2016

Dr DouglasStebila

https://www.douglas.stebila.ca/teaching/cryptoworks21

Page 5: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

LectureGoals

• Developabroaderperspectiveoninformationsecuritythanjustcryptography.

• Terminologyfordescribinginformationsecurity.• Howdoorganizationsapproachmakinginformationsecuritydecisions?

• Non-technicallecturetoday;technicallecturestofollow.

Page 6: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityProcess

1. Identifyinformationassets2. Describesecuritygoalsforassets3. Characterizethreats4. Identifyvulnerabilities5. Assessrisks6. Applycontrols

Page 7: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

SECURITYTERMINOLOGY

Page 8: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityProcess

1. Identifyinformationassets2. Describesecuritygoalsforassets3. Characterizethreats4. Identifyvulnerabilities5. Assessrisks6. Applycontrols

Page 9: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

WhatisSecurity?

• Security isabouttheprotectionofassetsfromdamageorharm.

• Assets areitemsorprocessesthatareofvalue– Property– People– Intangibles

Page 10: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

WhatisSecurity?

• Foreffectiveprotectionyouneedtoknow:–Whattheassetsare–Whattheyareworth,andhowcriticaltheyare–Whatcouldpossiblyhappentoaffectthem• Consideraccidentalandintentionalevents

– Howtheycouldbeprotected,andatwhatcost?• Considerpossibilitiesfor:

– Prevention ofdamagetoasset(orminimisingdamage)– Detection ofdamagetoasset– when,how,who?– Reaction torecoverfromdamage

Page 11: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityGoalsorServices

Traditionaldefinitionsofinformationsecurityarebasedonthreeinformationsecuritygoalsorservices:• Confidentiality:preventingunauthoriseddisclosureofinformation

• Integrity:preventingunauthorised (accidentalordeliberate)modificationordestructionofinformation

• Availability:ensuringresourcesareaccessiblewhenrequiredbyanauthorised user

Page 12: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

AdditionalGoalsorServices

Theseadditionalgoalsorservicesarebecomingincreasinglyimportantforsomeapplications:• Authentication:– Entityauthentication– theprocessofverifyingaclaimedidentity

– Dataoriginauthentication– verifythesource(andintegrity)ofamessage

• Non-repudiation:– createevidencethatanactionhasoccurred,sothattheusercannotfalselydenytheactionlater

Page 13: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationStates

• Informationsecurityinvolvesprotectinginformationassetsfromharmordamage.

• Considerinformationinoneofthreepossiblestates:

– Storage• Informationstoragecontainers– electronic,physical,human

– Transmission• Physicalorelectronic

– Processing (Use)• Physicalorelectronic

Page 14: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities,ThreatsandAttacks• Informationsecurityanalysisinvolvesconsidering:– Threats:

• Setsofcircumstanceswiththepotentialtocauseharmbycompromisingstatedsecuritygoals

– Vulnerabilities:• Weaknessesinasystemthatcouldbeusedtocauseharmbycompromisingstatedsecuritygoals

– Attacks:• Occurwhenvulnerabilitiesaredeliberatelyexploited• Exploit:Anattackonasystem,especiallyonethattakesadvantageofaparticularvulnerabilitythatthesystemofferstointruders.

• NOTE:Securityincidentscanalsoresultfromnon-deliberateacts.

Page 15: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurity:Attacks• Twomaintypesofattacks:– Passive:

• Attacker’sgoalistoobtaininformation• Attackerdoesn’taltersystemresourcesorinteractotherthanbylisteningorobserving– E.g.eavesdropping,shouldersurfing

• Difficulttodetect;usuallytrytopreventtheattack.– Active:

• Attacker’sgoalmaybetomodify,replicateorfabricateinformation

• Requiresinteractionwiththeinformationsystembytheattacker– E.g.Phishing,Denialofservice,Man-in-the-middle

• Trytodetectattacker’sactions,recognisesignsofattackandrespond

Page 16: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

SecurityMeasuresorControls• Usesecuritymeasuresorcontrolstocounterthreatsand

preventattacks– Alsoknownascountermeasures

• Preventive controls:– preventattemptstoexploitvulnerabilities

• Example:encryptionoffilestopreventeavesdropping• Detective controls:

– warnofattemptstoexploitvulnerabilities• Example:UseofChecksum/MACtodetectdatacorruption

• Corrective controls:– correcterrorsorirregularitiesthathavebeendetected

• Example:Restoringallapplicationsfromthelastknowngoodimagetobringacorruptedsystembackonline

Page 17: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

SecurityMeasuresorControls• Thesemayinvolve:– Technology• Firewalls,Ciphers(encryption),Digitalsignatures,IDS,tamper-resistantsystems,etc

– Policyandpractice• Planoutliningorganisation’sapproachtomanaginginformationsecurity

– Education,trainingandawareness• Employeetraining

– Forexample,againstsocialengineering• Rememberpeople arecomponentsoftheinformationsystems

Page 18: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Usefuldiagramtocombineideas:NSTISSI4011SecurityModel

NSTISSI4011 providesaframeworkfordiscussingInformationSecurity

Page 19: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

THREATS,VULNERABILITIES,ANDATTACKS

Page 20: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityProcess

1. Identifyinformationassets2. Describesecuritygoalsforassets3. Characterizethreats4. Identifyvulnerabilities5. Assessrisk6. Applycontrols

Page 21: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Threats

• Setofcircumstanceswithpotential tocauseharmtoaninformationassetbycompromisingstatedinformationsecuritygoals.– Abreachofconfidentiality: informationisdisclosedtounauthorisedentities

– Abreachofintegrity: informationassetshavebeenmodifiedordestroyedbyunauthorisedentity

– Abreachofavailability: informationassetsarenotaccessiblewhenrequiredbyanauthorisedentity

Page 22: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ThreatSources

• External:– Sourceofthreatliesoutsideoftheorganisation– Example:

• Peoplewhoarenotauthorizedtouseinformationsystems-commercialcompetitor,cyber-criminal,politicalactivist,terrorists

• Internal:– Sourceofthreatlieswithintheorganisation– Example:

• peoplewhoareauthorizedtouseinformationsystems-employees,contractors,clients,visitors

Page 23: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Threats• Externalthreatsources

• Mayneedtogainaccesstoinformationassetsusedinanorganisationinordertoharmthem– Physicalaccess– Logicalaccess

• Increasingdependenceoninformationandcommunicationstechnologies(ICT)operatingoverinternetexpandspotentialexternalsourceswithlogicalaccess– Commonthreats:malware(virus,Trojan,worm,spyware)

Page 24: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Threats• Externalthreatsources– 2013CERTCyberCrime&SecuritySurveyReport

Page 25: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Threats• Internalthreatsources:Insidersarefamiliarwithinformationsystemsusedinanorganisation:

oHaveknowledgeofassetvaluesoKnowprocessesandproceduresinuseoMaybeawareofsystemvulnerabilitiesoHaveopportunitytoaccessassetsoMaymisusesystemsorexceedtheirauthorizationoPotentialtocauseharmishighoOutsourcing(cleaners,catering,supportservices)withoutsecurityassurancebringsoutsidersin

Page 26: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Threats• Internalthreatsources– 2013CERTCyberCrime&SecuritySurveyReport

Page 27: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities

• Weaknessesinasystem– thatcouldbeusedtocauseharmtoinformationassets

• Needtoconsidercomponentsofinformationsystem:– Property– People– Procedures

Page 28: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:Property

• Physicalassets:buildingsandcontents– Location;physicalsecurity;maintenance;monitoringandloggingphysicalaccess

• Hardware:computersystems,datacommunicationsdevices,datastoragedevices

• Software:Operatingsystem,applications– Source;testing;updates;(mis)configuration

• Data:Files,databases,passwords

Page 29: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:People• Employees:– Recruitingstaffsuitablefortheposition

• Failuretocheckbackgroundiscommon– Monitoringaccessofpeopletopropertyandprocesses• Disgruntledemployees,clientsorcontractorscanbethreatsource

– Inadequateeducationofstaffwithrespecttothreats:forexample,arestaffawareofpoliciesregarding:• providinginformationbyemailoroverphone• downloadingsoftware,• useofmobiledevices,etc

Page 30: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:People

Page 31: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:People

• Employees:– Aretherekeypersonnelcriticaltoorganisation?• Maybeunavailableduetoaccidentorillness,orotherevent(transportfailure,naturaldisaster)

– Vulnerableifnoback-upforthesepeople• Ifproceduresareundocumented

• Others:– Aresecurityconditionsincludedincontractswithconsultants,contractors,outsourcing?

Page 32: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:Processes

• Accesscontrol andprivilegemanagement– Includingkeys,cards,passwords

• Backup offilesandsystems• Businesscontinuityplans– forrecoveryofinformationassetsafterdisaster

• Communications

Page 33: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Vulnerabilities:Processes

• Checksandbalances:– Peoplemakemistakes:arethereprocessestodetect,correctorreducetheimpactoferrors?• Example:Separationofduties

• Processesassociatedwithstaffjoining/leavingorganisation– Clearstatementofduties– Nondisclosure/confidentialityagreements

• Softwaremanagementprocessesandauditing

Page 34: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

AttacksAnattackiswhenvulnerabilitiesaredeliberately exploitedtogainunauthorizedaccessorperformunauthorizedactions.

• Passive– Attacker’sgoalistoobtaininformation– Attackerdoesnotalterinformationsystemresources

• Nointeractionbytheattacker otherthanlisteningorobserving– Difficulttodetect;usuallytrytopreventtheattack.

• Active– Attacker’sgoalmaybetoobtain,modify,replicateorfabricate

information– Requiressomeactionorinteractionwiththeinformationsystem by

theattacker– Usualapproachistotrydetectattackersactions,recognisethemas

signsofattackandrecover

Page 35: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

PassiveAttacks

• Eavesdropping:– Listeningtotheconversationsofotherswithouttheirknowledgeorconsent

–Wiretapping• Eavesdroppingovertelephonenetwork• Maybehardertodetectinwirelessnetwork

– Informationcanbeobtainedfrom:• thecontentoftheconversations,and• knowingwhoistalkingtowhoandwhen(trafficanalysis)

Page 36: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

PassiveAttacks

• Shouldersurfing–Watchingtheactionsofothers(especiallyatdataentry)withouttheirknowledgeorconsent

– Usuallyconnectedwithentryofconfidentialinformation• PIN(forfinancialaccessatATM)• Securitycodeorpassword

– Canalsobeforgreateramountsofdata• Useofmobiledevicesininsecuresurroundingsisvulnerabilitythatcanbeexploitedforthisattack

Page 37: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

PassiveAttacks

• Networkmonitoringandeavesdropping– Apacketsnifferornetworkanalyzercanmonitornetworktraffic• canbeusedfornetworkmaintenance(findingfaultsandtrafficproblems)

• Butcanalsobeusedtogainknowledgeofconfidentialinformation

• e.gpasswordscorrespondingtousernames– Confidentialinformationshouldnotbesentoveruntrustednetworks

withoutprotection• Example:whenloggingontoaremoteresource,passwordsshouldnotbesent‘intheclear’

Page 38: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks

• DenialofService(DoS)Attack– Objectiveistomakeaninformationassetorresourceunavailabletoauthorizedusers

– Commonmethodsare:• Tooverloadtheresource,soitcannotrespondtolegitimaterequests• Todamagetheresource,sothatitcannotbeused• Todeliberatelyinterruptcommunicationsbetweenusersandresource,sothatitcannotbeaccessed

Page 39: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks

• DistributedDenialofService(DDoS)Attack– ObjectiveissameasDoSattack:

• Breachesavailabilityofinformationasset

– Method:• Usemultiplesourcestomakeresourcerequests• Hopetooverloadresource,soitcannotrespondtolegitimaterequests

• Malware(e.g.virus)maybeusedtocompromisemanymachines– allhavesametarget,andpayloadisactivatedatsametime,tomakesimultaneousresourcerequest

Page 40: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• DDoS Attacks– 1999– firstDDoS attack– 2000– Yahoo,eBay,AmazonDDoS’ed forhours– Early2000’s:peakspeed4gigabit/sec– 2015:

• Averagespeed:10–60Gb/sec• peakspeed:≥400Gb/sec– Onecompanyreportedreceiving250xnormalbandwidth

• Averageduration:17hours– Attacktechniques:

• Resource/bandwidthconsumption,keepconnectionsopen– Defensetechniques:

• Cloudhosting,coordinationwithupstreamproviders

http://gcn.com/articles/2015/07/27/ddos-attack-mitigation.aspxhttp://www.darkreading.com/cloud/inside-a-vicious-ddos-attack/a/d-id/1321286

Page 41: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks

• Masquerade/Spoofing:–Whereoneentitypretendstobeanotherinordertodeceiveothers

• Commonspoofingattacksinclude:– Emailaddressspoofing• Alteringthesenderinformationonemailtotrickrecipientsintothinkingthemessageisfromanothersource

– Webpagespoofing• Creatingafakewebpagethatlookslikethepageforalegitimatebusinesstotrickusers– intogivingthecredentialstheywoulduseatlegitimatesite– Intodownloadingmaterialsfromanalternativesite

Page 42: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks

• Phishing:– Attemptstogaincredentialstoenableaccesstootherresourcesbymasqueradingasalegitimateorganisation(Bank,eBay,PayPal)• Example:accountdetails,PINnumber,password

– Usuallyinvolves• spoofedemailsand/orspoofedwebpages• socialengineering

Page 43: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• Phishing

Basicphishingemail Targetedspearphishingemail

https://iconixtruemark.wordpress.com/2011/06/10/spear-phishing-examples/

Page 44: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• Phishing

Page 45: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• Man-in-the-MiddleAttack(MITM)– Anattacker(Carol)positionsherselfbetweentwoentitieswhowishtocommunicate,sayAliceandBob.

– CarolpretendstoAlicesheisBob,andpretendstoBobsheisAlice(spoofing).

Bob

Alice

Carol

Page 46: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

MITM• Normalinformationflow

Information Source (Alice)

Information Destination (Bob)

Page 47: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

MITMInterception

Breachesconfidentiality

TheunauthorizedMITMobservestheinformationandtransmitsit

Page 48: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

MITMInterruptionTheunauthorizedMITMpreventstransmission,so

informationassetsareunavailabletoBob

Breachesavailability

Page 49: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

MITMModification

Breachesintegrity

TheMITMmodifiestheinformationandthensendstoBob

Page 50: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

MITMFabrication

Breachesauthenticity

TheMITMcreatesinformationassetandsendstoBobbutclaimsitisfromAlice

Page 51: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• SocialEngineering:usingsocialskillstoconvincepeopletorevealinformationorpermitaccesstoresources.Examples:– Claimtobenewemployee,manager’sassistant,maintenanceperson,etcandaskforassistanceinaccessingresourcetocompleteanurgenttask:• I’velostmypasswordandIhavetofinishthistoday…• Myswipecarddoesn’twork/leftathome…

– Tailgating– followanotherpersoncloselysothatwhentheygointosecureareayoucanalsogetinwithoutprovidingappropriatecredentials

Page 52: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

ActiveAttacks• Replayattack:– Thisiswhereavaliddatatransmissionisrecorded,andretransmittedatalaterdate

– Example:• Accesstoasystemrequiresuseofpassword,butpasswordisencryptedduringtransmission• Attackerrecordsencryptedpassword,andreplaysthisinformationinordertogainaccess• Doesn’tmatterthatattackerdoesn’tknowthepassword– theycouldprovidetheexpectedcredentialonrequest.

Page 53: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RISKMANAGEMENT

Page 54: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityProcess

1. Identifyinformationassets2. Describesecuritygoalsforassets3. Characterizethreats4. Identifyvulnerabilities5. Assessrisk6. Applycontrols

Page 55: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Informationsecurityandriskmanagement

–Whatisrisk?– Howdowemanagerisk?– Riskmanagementandstandards• ISO31000:2009RiskManagement• ISO27005:2012InformationSecurityRiskManagement

– InformationSecurityManagementStandards• ISO27001:2006InfoSecManagementSystems• ISO27002:2006CodeofpracticeforISmanagement

Page 56: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Informationsecurity&riskmanagement

• Informationsecuritymanagementinvolvesaskingquestionslike:– Whatneedstobeprotected?– Whydoesitneedtobeprotected?– Howcanitbeprotected?

• Whatdoesthatcost?• Howurgentlyisthisrequired?

– Whathappensifitisnotprotected?• Organisationshavelimitedresources(time,money,space)so

makingtradeoffs isnecessary:– Can’taffordtoprotectallassetsagainstallpossiblethreats

• Informationsecuritymanagementinvolvesriskmanagement

Page 57: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Whatisrisk?• DefinitioninISO27005:2012Informationsecurityriskmanagement

• Risk:‘effectofuncertaintyonobjectives.’– Effect includesbothpositiveandnegative– Aspectsofobjectivestoconsider:

• financial,healthandsafety,informationsecurity,environmental

– Mayapplyatdifferentlevels:• organizational,project,product,process

– Informationsecurityriskexpressedintermsofconsequencesandlikelihood• Consequence: ‘outcomeofaneventaffectingobjectives’• Likelihood: ‘chanceofsomethinghappening’

Page 58: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Whatisrisk?Infosecriskconsiderspotentialforthreatsandvulnerabilitiestocoincideandharmassets

threatagent vulnerability

likelihoodofeventoccurrence

consequenceofeventoccurrence

risk

(sometimescalledchanceorrisk)

(sometimescalledbusinessrisk)

Page 59: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Howdowemanagerisk?Riskmanagementprocess (fromISO31000:2009)

Establishthecontext

Identifyrisks

Analyserisks

Evaluaterisks

TreatrisksCommun

icateand

consult

Mon

itora

ndre

view

RiskAssessment

Page 60: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessEstablishthecontext

• Establishtheexternal context:• Relationshipbetweenorganisationandexternal

environmentitoperatesin• Establishtheinternal context:

• Understandtheorganisationanditscapabilities,goalsandobjectives

• Establishtheriskmanagement context:• Goals,objectives,strategies,scopeandparameters

oftheareatheriskmanagementprocessisbeingappliedto

Page 61: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessEstablishthecontext

• Defineriskcriteria(Criteriaagainstwhichriskistobeevaluated)

• Forriskevaluationcriteriaconsider:– Strategicvalueoftheasset,– Criticalityoftheasset,– Legal,regulatoryorcontractualobligations,– Reputation

• Forimpactevaluationcriteriaconsider:– Levelofclassificationofasset,andtypeofbreach(CIA)– Degreeofimpairment/disruption/lossofbusiness

• Forriskacceptancecriteriaconsider:– Whatthetimeframeswillbe– Whatlevelofriskisacceptabletoorganisation, etc

Page 62: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessIdentifyrisks

• Whatcanhappen,whereandwhen?– Identifyplausiblethreatsandexistingvulnerabilities:combinetheseto

identifyeventsandpotentialconsequences

• Whyandhowitcanhappen?– Considercausesandscenarios

• Toolsandtechniques:– Identifyrisksusing• Checklists(Fromotherstandardsdocuments)• Judgementsbasedonexperience(ownandothers)• Systemsanalysis

• Includeallrisks,whethertheyareunderthecontroloftheorganisationornot.

Page 63: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessAnalyserisks

• Determinethemagnitudeofidentifiedrisks• Typesofanalysis:• Qualitative

– Usesdescriptivescales(inwords).Example:• Consequence: Minor,moderate,major,catastrophic• Likelihood: Rare,unlikely,possible,likely,almostcertain

• Semi-quantitative– Qualitativescalesassignednumericalvalues– Canbeusedinformulaeforprioritization(withcaution!)

• Quantitative– Usenumericalvaluesforbothconsequence(e.g.$$$) andlikelihood

(e.g.probabilityvalue)

Page 64: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessQualitativeRiskAnalysis:Example

Measure Description

Major Majorproblems wouldoccurandthreatentheprovisionofimportantprocesses resultinginsignificantfinancialloss.

Moderate Services wouldcontinue, butwould needtobereviewedorchanged.

Minor Effectivenessofserviceswouldbethreatenedbutdealtwith.

Insignificant Dealtwithasapartofroutineoperations.

Incr

easi

ng D

amag

e

QualitativeConsequencescale example:

FromInformationRiskManagementBestPracticeGuidep19

Page 65: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessQualitativeRiskAnalysis:Example

Measure Description

High Isexpectedtooccurinmostconditions(1ormoretimesperyear).

Medium Theeventwillprobablyhappeninmostconditions(aboutonceevery2years).

Possible Theeventshouldhappenatsometime(onceevery5years).

Unlikely Theeventcouldhappenatsometime(onceevery10years).In

crea

sing

Pro

babi

lity

QualitativeLikelihoodscale example:

InformationRiskManagementBestPracticeGuidep19

Page 66: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

M

MM

H

M

M

RiskmanagementprocessQualitativeRiskAnalysis:Example

Likelih

ood

Consequence

Insignificant Minor Moderate Major

High

Medium

Low

Unlikely

LegendE:extremerisk;immediateactionrequiredH:highrisk;seniormanagementattentionneededM:moderaterisk;managementresponsibilitymustbespecifiedL:lowrisk;managebyroutineprocedures

M

M

L

H

H

EE

E

L

L

QualitativeLevelofRisk example: Matchconsequencestolikelihoodstodeterminelevelsofrisk

Page 67: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessEvaluaterisks

• Compare thelevelofriskfoundduringriskanalysiswiththeestablishedriskcriteria

• Decidewhichrisksneedtreatment,andwhen– Prioritize listofrisksforfurtheraction• Risksinlowormoderateriskcategoriesmaybeacceptedwithoutfurthertreatment• Highorextremerisksrequireimmediateconsiderationoftreatmentpossibilities

Page 68: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessTreatrisks

• Selectoptionsformodifyingrisks:– optionsforrisktreatmentwith positiveoutcomesinclude:• Activelyseekopportunity• Changethelikelihoodofopportunity toenhancethelikelihoodofbeneficialoutcome• Changetheconsequencestoincreasetheextentofthegains• Sharingtheopportunity• Retain theresidualopportunity

Page 69: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

RiskmanagementprocessTreatrisks

• Selectoptionsformodifyingrisks:– optionsforrisktreatmentwithnegativeoutcomesinclude:• Avoid therisk• Reduce likelihoodofnegativeoutcomeby:– Reducingthelikelihood oftherisk– Reducingtheconsequences

• Share therisk• Retain therisk

Page 70: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Exampleriskassessment:effectofquantumcomputersonclassicalcryptography

• Context:alargebankusesRSApublickeycryptographyandAESencryptiontosecurecommunicationoverthepublicinternetbetweenitsbranches

• Identifyrisks:large-scalequantumcomputerswillrenderRSAencryptioncompletelyinsecureandimpactkeylengthofAESencryption

Page 71: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

Exampleriskassessment:effectofquantumcomputersonclassicalcryptography

• Analyzerisks:– consequence:major/moderate/minor/insignificant

– likelihood:high/medium/possible/unlikely

• Evaluaterisks:prioritizerisksbasedonconsequencexlikelihood

• Treathighpriorityrisks– ShouldthebankswitchtoQKD?post-quantumcrypto?

Page 72: Fundamentals of Network Security · Fundamentals of Network Security •Lectures: –Tuesday 10:30 -12 and 1-2:30pm in QNC 1201 –Thursday 10:30-12 and 1-2:30pm in QNC 4104 •Assessment:

InformationSecurityProcess

1. Identifyinformationassets2. Describesecuritygoalsforassets3. Characterizethreats4. Identifyvulnerabilities5. Assessrisk– Identify

->analyze->evaluaterisks

6. Applycontrols