44
Introduction to Cybersecurity - 2017 GenCyber Camp Bo Luo Associate Professor Director, Information Assurance Lab, ITTC The University of Kansas, Lawrence, KS, USA [email protected] ; http ://www.ittc.ku.edu/~bluo

Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Introduction to Cybersecurity- 2017 GenCyber Camp

Bo LuoAssociate Professor

Director, Information Assurance Lab, ITTCThe University of Kansas, Lawrence, KS, USA

[email protected]; http://www.ittc.ku.edu/~bluo

Page 2: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

What Does Secure Mean?

Wild West vs. Today

then not so hard to rob bank, big payoff

now pretty hard. payoff?

today we use checks, credit cards

Why the difference?

bank, large institution security well-studied

they have more secure:

procedures

infrastructure

lots of practice

Today’s computers, nets like wild west

How about IoT devices?

Page 3: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Evolution of Cars

3

Mechanical Electro-Mechanical

Page 4: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

IoT Security: What’s Different?

4

Isolated Connected

Page 5: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

IoT Security: What’s Different?

More convenience and safety

Safety? Security?

5

Parking

Assist

Collision

AvoidanceTPMS

Adaptive Cruise Control

Page 6: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Automobile Example

Modern cars have many computer systems

Do they need security?

False assumptions:

the code is too complex for troublemakers

the more complex, the more difficult to make secure

why would anyone want to hack them?

disable alarms, unlock doors, tracking

just because they can

6

Page 7: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Automobile Example

The Tesla Hack @ Black Hat 2016 & 2017

Keen Security Lab: turn on the brakes remotely and getting

the doors and trunk to open and close while blinking the

lights in time to music streamed from the car's radio on

Tesla Model X.

“the work was complex and not easily replicated”

The Jeep Hack @ Black Hat 2015 & 2016

Remotely stop a car and disable its brake.

Plug into the car's electronic system to hijack its steering

and brake systems

The TPMS “Hack”

Tire Pressure Monitoring System (TPMS) signal sent

wirelessly

Easily eavesdropped, with unique identifier

7

Page 8: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Objectives of the camp

Understand the basic principles and problems of

computer security

Security Management: Risks, Policies, and Ethics

First principles of cyber security

Introduction to cryptography

Data security and privacy

OS security

Software security

Network security

Cybersecurity practice

Hands-on labs

OS and network hardening

Cyber Defense Competition

8

Page 9: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

First Principles of Cybersecurity

The first principles of security are the foundation

upon which security mechanisms are reliably built;

and security policies can be reliably implemented.

Study the principles

Use them to examine the design of real-world

security mechanisms

Page 10: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

First Principles of Cybersecurity

Page 11: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

What’s Valuable?

Important to protect what’s valuable

Bank example:

Protect money well

Forget to protect the customer information

Now: Regulations for Financial Institutions and Customer

Information

What is valuable in a computer/information system?

11

Page 12: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Easiest Penetration

Intruder will use any means of penetration.

Site or method of penetration

May not be most obvious

Not necessarily where the strongest defenses are

e.g., don’t install strong lock but not hinge

Yes, intruders are (always) able to find the easiest

penetration!

12

Page 13: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Valuable Components

Computer’s “valuable components”

hardware

software

data

Any can be targeted

Could be mixed

Attacking from hardware, targeting at data

13

Page 14: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Threat vs. Vulnerability

Vulnerability: security weakness that might be

exploited to cause undesired consequences

Threat: a set of circumstances that potentially cause

loss or harm.

Attack: the exploitation of vulnerabilities by threats.

Example: Water is the threat, Crack is vulnerability

14

Page 15: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls

A control is a protective measure

A threat is blocked by a control of a vulnerability

15

Page 16: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

MOM

For a successful attack, attacker must have:

Method skills, knowledge, tools to pull off the attack

Opportunity time and access

Motive

Control?

Eliminate one of them…

16

Page 17: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Meaning of Computer Security

Security should provide:

confidentiality

integrity

availability (implies timely availability)

The CIA notion

Other factors?

Authentication

Authorization

Non-Repudiation

Privacy

17

Page 18: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Vulnerabilities

Consider three types:

hardware

software

data

18

Page 19: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Hardware Vulnerabilities

Often easiest to defend against

Examples:

adding/removing/changing devices

pull the plug

spill soda

reboot with boot disk to use machine for attack,

mount HDs, etc.

19

Page 20: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

“Backhoe” vulnerability?

When company digs, registers with locality

utilities in dig zone spray paint what’s buried

item not marked, or digger doesn’t contact locality?

Backhoe cutting fiberoptic cable

most common cause of telecom outages

Publicly available information

Single cuts can cause widespread outages

Telecoms reluctant to lay redundant cable

Legitimate threat?

20

Page 21: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Forget hoes. what about anchors?

2/2008. Two undersea cuts to SeaMeWe4

South East Asia–Middle East–Western Europe 4

Optical fiber submarine communications cable

21

Page 22: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Forget hoes. what about anchors?

2/2008. Two undersea cuts to SeaMeWe4

South East Asia–Middle East–Western Europe 4

Optical fiber submarine communications cable

Major disruptions in Middle East, S. Asia

Egypt 70% lost capacity

Both cuts just off coast of Alexandria

Redundant cable.

Geographic diversity?

22

Page 23: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Personal hardware?

Implanted medical devices, e.g.

vulnerable defibrillator with wireless access

BYOD

Connect your own phone/laptop to the corporate WiFi?

Receive emails on your personal tablet?

23

Page 24: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Software Vulnerabilities

Breaking software

Modify to do something different

Delete software

Software theft

Can use configuration management to avoid

software modification attacks.

Need a root of trust…

24

Page 25: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Vulnerability Window

Vulnerability “life cycle”

Born (in software, hardware)

Discovered, not yet patched (0-day)

May be known to the public

Patched

Most vulnerable before they are patched

0-days are valuable

Black market

Software vendors give rewards

25

Page 26: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Data Vulnerabilities

Data can be understood by lay people

e.g. SSN, address, name …

don’t need:

physical access (as in HW vulnerabilities)

computer skills (as in SW vulnerabilities)

Can be very valuable

e.g. private company info.

Can be damaging if modified

e.g. air traffic control, patient drug allergies

26

Page 27: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

How Long Are Data Valuable?

Might only be valuable for short time

e.g. Oscar winners, movie Trading Places

Principle of Adequate Protection

Items must be protected only until they lose value

Must be protected to degree consistent with value

27

Page 28: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Adversaries – Computer Criminals

Script kiddies

download tools

don’t understand them

Amateurs

Average user who stumbles upon vulnerability

Crackers

Hack for the challenge

Career criminals

hack for personal profit

Users with skills

design, implement tools

28

Page 29: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Market for Stolen Data

Black/gray market

Bank accounts

Credit card numbers

SSN

User information

Accounts, passwords, etc.

29

Page 30: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

The economy of computer crime

30

Page 31: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Methods of Defense

Prevent - close vulnerability

Deter - make attack more difficult

Deflect - make another target attractive

Detect - know when attack occurs

Recover - mitigate attack’s effects

31

Page 32: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls in Computer Security

Encryption

Software controls

Hardware controls

System design

Policies and procedures

Physical controls

32

Page 33: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Encryption

Important part of security

But many more things in the picture

Bellovin survey of CERT vulnerabilities

Much more about encryption later

33

Page 34: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Software

Internal program controls

part of program

enforces security restrictions

e.g., access ctrl in DBMS

OS, network controls

same for OS, nets

protect OS, net from users

protect users from each other

34

Page 35: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Software

Independent control programs

– e.g., password checkers, IDS, antivirus

Development controls

quality standards

used during:

design

coding

testing

maintenance

35

Page 36: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Hardware

Examples

smart cards

locks, cables

user identification devices

firewalls

IDS

circuit boards that control access to storage media

36

Page 37: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Policies & Procedures

i.e., “human” policies and procedures

Very important, often overlooked

Examples:

Proper use of passwords (password policies)

What not to write in email

What not to say over the phone

What not to say to strangers (or let overheard)

Probes for stock insider info, HIPAA, etc.

Documents to shred or not

37

Page 38: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Physical

Examples:

guards

locks

backups (including off site)

etc.

38

Page 39: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Controls: Design

Security by design

Separation

Secure zone

Fault-tolerant: distrust inputs and other components

Proper use of technology

Defense in depth (layered protection)

39

Page 40: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Domain Separation

Good fences make good neighbors

Different domains need to be separated

In computer networks

In computer systems

Hardware

OS

Software applications

Internet of Things (CPS)

Page 41: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Domain Separation

Domain is a generic term

Take a computer system as an example:

Threads at different security levels need to access the same

global state insecure

Partition threads into separate domains: Supervisor vs. User

each domain has its own storage (sandbox)

operating system code runs in supervisor domain and user

code runs in user domains

Page 42: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Defense in Depth

What if the control mechanism fail?

Defense in Depth (Castle Approach)

Originated from a military concept

Layered control mechanisms

Distributed defense

Redundancy in defense

42

Page 43: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Defense in Depth

What if the control mechanism fail?

Defense in Depth (Castle Approach)

Originated from a military concept

Multiple layers of computer security, each one having to be

conquered before moving to the next

For all aspects: physical, hardware, software, policies,

personnel, etc.

Example: anti-spam

Example: firewalls and IDS

43

Page 44: Introduction to Cybersecurity - Jayhawk SFS · computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data

Principle of Weakest Link

Security is no stronger than the weakest link

Weakest link can be:

Firewall’s power supply

OS that a security app runs over

Human who:

plans

implements or

administers controls

44