60
1 Cybersecurity: Technologies and their Impact on Privacy Eran Toch The Minerva Center for Human Rights, The Hebrew University, June 2013

Cybersecurity and Privacy Lecture

Embed Size (px)

DESCRIPTION

What is cybersecurity (or computer security)? The lecture describes the field and tries to answer two questions: How people's privacy can be threaten by computer threats? How can it be threaten by the security mechanisms that help organizations and nations fight cyber security?

Citation preview

Page 1: Cybersecurity and Privacy Lecture

1

Cybersecurity: Technologies and their Impact on Privacy

Eran TochThe Minerva Center for Human Rights, The Hebrew University, June 2013

Page 2: Cybersecurity and Privacy Lecture

2

Eran Toch

Department of Industrial Engineering

Tel Aviv University, Israel

http://toch.tau.ac.il/

[email protected]

Page 3: Cybersecurity and Privacy Lecture

My Work

3

Managing Location Privacy

Temporal Aspects of Privacy

Generating Automatic Defaults

http://toch.tau.ac.il/

Page 4: Cybersecurity and Privacy Lecture

Cyber-Security and Privacy

4

Cyber Attacks

Cyber Security

Page 5: Cybersecurity and Privacy Lecture

Agenda

1. The Context Of Cyber Attacks

2. The Attack Model

3. The Cyber-security Response

5

Page 6: Cybersecurity and Privacy Lecture

1. The Context Of Cyber Attacks

6

Page 7: Cybersecurity and Privacy Lecture

Cyber Attacks

7

Actions to penetrate the computers or networks of a nation, organization or a person for the purposes of causing damage, disruption or to violate privacy.

http://www.flickr.com/photos/75468116@N04/8569854011

Page 8: Cybersecurity and Privacy Lecture

Three Questions

‣Who are the attackers?

‣What are the targets?

‣ How the attacks are carried out?

8

Page 9: Cybersecurity and Privacy Lecture

Who Are the Bad Guys?

9

Page 10: Cybersecurity and Privacy Lecture

10

“Off-the-shelf” Hackers

Sophisticated Hackers

Motivations:‣ Cyber Crime‣ Vandalism ‣Hactivism

Motivations:‣ Cyber Crime‣ Cyber Espionage ‣ Cyberwar

Page 12: Cybersecurity and Privacy Lecture

Threats for Electronic Services‣Disrupting, sabotaging or exploiting electronic

services.

12http://www.nytimes.com/2012/01/17/world/middleeast/cyber-attacks-temporarily-cripple-2-israeli-web-sites.htmlhttp://www.nytimes.com/2013/03/28/technology/attacks-on-spamhaus-used-internet-against-itself.html?pagewanted=all

Page 13: Cybersecurity and Privacy Lecture

For Example, The Attack on ATMs

13http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?pagewanted=all

Page 14: Cybersecurity and Privacy Lecture

Threats for the Computer Network‣ Disrupting the Internet network itself,

preventing the flow of communication.

14

Page 15: Cybersecurity and Privacy Lecture

Disrupting the Infrastructure‣ Electricity, water,

fuel and nuclear energy.

‣ Air control, traffic, building infrastructure.

15

Page 16: Cybersecurity and Privacy Lecture

But, Apart from Stuxnet...‣ Not many examples

of successful cyberattacks on infrastructure.

‣ However, physical infrastructure is getting increasingly connected.

16

The Stuxnet Attack, July 2012

Page 17: Cybersecurity and Privacy Lecture

Threats for Privacy‣ Accessing private information on servers and

personal devices.

17

Page 18: Cybersecurity and Privacy Lecture

1. The attack model

18

Page 19: Cybersecurity and Privacy Lecture

Attack Models

19

‣ The Internet Architecture

‣ Attacks

‣ Denial-of-service

‣ Trojan horse

‣ Phishing

‣ Man-in-the-middle

‣ Social Network attacks

‣ Insiders

Page 20: Cybersecurity and Privacy Lecture

The Internet Protocol

Client

Routers

Server

20

IP Packet

132.66.237.203

64.233.160.0

209.85.128.0

IP Address

Page 21: Cybersecurity and Privacy Lecture

Global IP Network

21

Page 22: Cybersecurity and Privacy Lecture

Properties of the Internet Network

‣ Multi channels of communication.‣ Anonymity and trustfulness.

22

Page 24: Cybersecurity and Privacy Lecture

Denial-of-Service Attacks‣ Distributed denial-of-

service attack (DDoS attack)

‣ An attempt to make a machine or network resource unavailable to its intended users.

‣ Attackers hide themselves by employing “zombies”.

24

Page 25: Cybersecurity and Privacy Lecture

Example: The Attack on Spamhaus

25http://www.nytimes.com/interactive/2013/03/30/technology/how-the-cyberattack-on-spamhaus-unfolded.html

Page 26: Cybersecurity and Privacy Lecture

Second Attack

26http://www.flickr.com/photos/lars_in_japan/6129526077

Trojan Horses!

Page 27: Cybersecurity and Privacy Lecture

Trojan Horses Attack‣ A Trojan horse is a

malware that appears to perform a desirable function but instead drops a malicious payload

‣ Often including a backdoor allowing unauthorized access to the target's computer.

27

Page 28: Cybersecurity and Privacy Lecture

Example: The Zeus Trojan Malware

28

1. Zeus Trojan sells for $3,000 to $4,000 in the black market

2. Victims download and install the trojan malware

3. When victims surf to a select bank website, it displays a fake site

4. The malware steals account numbers, Social Security number, usernames and passwords

Page 31: Cybersecurity and Privacy Lecture

Phishing Attacks‣ In Phishing attacks, the victim receives an email, a text message or

another communication. The link or reference will take the victim to a dummy site.

31http://www.gartner.com/newsroom/id/565125

Page 32: Cybersecurity and Privacy Lecture

The Cost‣ Gartner estimates that

3.6 million U.S. million adults lost money in phishing attacks in 2007.

‣ $3.2 billion was lost to these attacks.

32

Page 33: Cybersecurity and Privacy Lecture

Fourth Attack

33http://www.flickr.com/photos/lars_in_japan/6129526077

Man in the Middle in Mobile

Page 34: Cybersecurity and Privacy Lecture

Attacks on Mobile Devices‣ Mobile devices generate

and store very sensitive information:

‣ Our location

‣ Voice and video

‣ Contacts and communications

‣ Applications

‣ Various sensor data34

Page 35: Cybersecurity and Privacy Lecture

Man-in-the-middle Attack

35

Malicious Router

Sensitive Website

Page 36: Cybersecurity and Privacy Lecture

Man-in-the-Middle + Trojan

36

Malicious Router

Page 38: Cybersecurity and Privacy Lecture

Facebook Botnets‣ How would you

respond to this Facebook friend request?

‣ The cyber attack: to become your friend.

‣ Social engineering can be used to get close to targeted people.

38

Page 39: Cybersecurity and Privacy Lecture

Social Network Attacks

39

The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al, In Proceedings of ACSAC'11, 2011.

Boshmaf et al. engineered a botnet server, and measured the rate in which people will fall for the attack.

Page 41: Cybersecurity and Privacy Lecture

Insiders‣ Cybersecurity is turning its eyes to insiders

such as employees and subcontractors.

41http://www.haaretz.co.il/news/law/1.1831775

Page 42: Cybersecurity and Privacy Lecture

The Risk‣ External threats count

for only 47.1% of perceived risks by IT managers.

‣ The majority of risk is from insiders and from management limitations.

42AlgoSec 2012 Report

Page 43: Cybersecurity and Privacy Lecture

2. The cyber-security Response

43

Page 44: Cybersecurity and Privacy Lecture

Cybersecurity Responses

44

‣ Organizations and governments respond to cyber attacks by:

‣ Developing technologies

‣ Regulating organizations

‣ Educating users and service providers

‣ Applying different levels of monitoring

http://www.flickr.com/photos/6892190693

Page 45: Cybersecurity and Privacy Lecture

Israel National Cyber Bureau‣ The Israel National Cyber Bureau

can be seen as a test case for government cybersecurity response.

‣ The Bureau activities include:

‣ Response formulation.

‣ Regulation roadmap.

‣ Research and development.

45

Page 46: Cybersecurity and Privacy Lecture

Levels of Response

Technology, Research and Education

CitizenEducation

Small Service ProvidersRegulation

Civil OrganizationsPolicy and Enforcement

Government Internal Procedures

Page 47: Cybersecurity and Privacy Lecture

All Front‣ Unlike traditional warfare, there is no clear

front.

‣ The question of how to regulate civic organizations and individuals is still open.

47

Page 48: Cybersecurity and Privacy Lecture

Cybersecurity Technologies

48

‣ Network Monitoring

‣ Syntactic monitoring

‣ Semantic monitoring

‣ Identification systems

‣ Monitoring systems

Page 49: Cybersecurity and Privacy Lecture

Syntactic Monitoring‣ Tracking the network

communication by:

‣ Firewalls

‣ Proxies

‣ Radius servers

‣ Monitoring is based on IP characteristics, such as destination, origin etc.

49

Page 50: Cybersecurity and Privacy Lecture

Syntactic Monitoring and Privacy

‣ Sites users visit.

‣ Applications used by the user:

‣ Bitorrent.

‣ http / https.

‣ VOIP.

‣ Geographical origins and destinations.

50

Page 51: Cybersecurity and Privacy Lecture

Semantic Monitoring ‣ Application firewalls

look at the content of network communication.

‣ It operates by monitoring and potentially blocking the input, output, and system service calls.

51

Page 52: Cybersecurity and Privacy Lecture

What can it Block?

52

The most comprehensive Web Application threat mitigation • SQL injection• Cross-site scripting• Parameter tampering• Hidden field manipulation• Session manipulation• Cookie poisoning• Stealth commanding• Backdoor and debug options• Geolocation-based blocking• Application buffer overflow attacks• Brute force attacks• Data encoding• Unauthorized navigation• Gateway circumvention• Web server reconnaissance• SOAP and Web services manipulation• Parameters pollution

Imperva

Radware

Citrix

Page 53: Cybersecurity and Privacy Lecture

State-Wide Monitoring‣ Direct connection to

the network infrastructure and to service providers.

‣ Big-Data: Reading everything, detecting by Machine Learning.

53

Page 54: Cybersecurity and Privacy Lecture

Insiders‣ To battle insiders

from accessing the data, organizations:

‣ Design procedures for data access.

‣ Track end-user devices.

‣ Track communications and traces.

54

Page 55: Cybersecurity and Privacy Lecture

Deep Device Monitoring ‣ For example,

Trusteer, an Israeli Startup, provides technology that monitors end-user devices.

‣ Every application is scanned for key-logging etc.

55

Page 56: Cybersecurity and Privacy Lecture

Summary

56

Page 57: Cybersecurity and Privacy Lecture

Cyber-Security and Privacy

57

Cyber Attacks

Cyber Security

Page 58: Cybersecurity and Privacy Lecture

Cyber Attacks‣ Easier to carry out

‣ But not necessarily easier to succeed.

‣ Increasing threat to privacy.

‣ We are all the victims of the Agron 2006 attack.

‣ Increasing use of social engineering, personal devices, human vulnerabilities.

58

Page 59: Cybersecurity and Privacy Lecture

Cyber-Security ‣ Deeper and wider monitoring

‣ With a chilling effect on privacy.

‣ The front is increasingly ubiquitous

‣ Government, organizations, companies, services.

59

Where should be the line between security and privacy?

Page 60: Cybersecurity and Privacy Lecture

60

Eran TochDepartment of Industrial Engineering Tel Aviv University, Israel

http://toch.tau.ac.il/

[email protected]