98
Overview of Information Security & Privacy Nawanan Theera - Ampornpunt , M.D., Ph.D. Faculty of Medicine Ramathibodi Hospital Mahidol University July 17 , 2015 http://www.SlideShare.net/Nawanan

Overview of Information Security & Privacy

Embed Size (px)

Citation preview

Page 1: Overview of Information Security & Privacy

Overview of Information Security

& Privacy

Nawanan Theera-Ampornpunt, M.D., Ph.D.

Faculty of Medicine Ramathibodi Hospital

Mahidol University

July 17, 2015

http://www.SlideShare.net/Nawanan

Page 2: Overview of Information Security & Privacy

Introduction to Information Privacy & Security

Protecting Information Privacy & Security

User Security

Software Security

Cryptography

Malware

Security Standards

Outline

Page 3: Overview of Information Security & Privacy

Introduction to Information Privacy &

Security

Page 4: Overview of Information Security & Privacy

Malware

Threats to Information Security

Page 5: Overview of Information Security & Privacy

Security Threats & Thailand

https://www.thaicert.or.th/downloads/files/ThaiCERT_Annual_Report_th_2013.pdf

ThaiCERT (2013)

Page 6: Overview of Information Security & Privacy

Security Threats & Thailand

https://www.thaicert.or.th/downloads/files/ThaiCERT_Annual_Report_th_2013.pdf

ThaiCERT (2013)

Page 7: Overview of Information Security & Privacy

Security Threats & Thailand

https://www.thaicert.or.th/downloads/files/ThaiCERT_Annual_Report_th_2013.pdf

ThaiCERT (2013)

Page 8: Overview of Information Security & Privacy

Security Threats & Thailand

https://www.facebook.com/longhackz

Page 9: Overview of Information Security & Privacy

Security Threats & Thailand

(Top) http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/

(Bottom) http://www.bloomberg.com/news/articles/2014-12-07/sony-s-darkseoul-breach-stretched-from-thai-hotel-

to-hollywood

Page 10: Overview of Information Security & Privacy

Security Threats & Health Care

http://usatoday30.usatoday.com/life/people/2007-10-10-clooney_N.htm

Page 11: Overview of Information Security & Privacy

Security Threats & Health Care

http://news.sanook.com/1262964/

Page 12: Overview of Information Security & Privacy

Sources of the Threats

Hackers

Viruses & Malware

Poorly-designed systems

Insiders (Employees)

People’s ignorance & lack of knowledge

Disasters & other incidents affecting information systems

Page 13: Overview of Information Security & Privacy

Information risks Unauthorized access & disclosure of confidential information Unauthorized addition, deletion, or modification of information

Operational risks System not functional (Denial of Service - DoS) System wrongly operated

Personal risks Identity thefts Financial losses Disclosure of information that may affect employment or other

personal aspects (e.g. health information) Physical/psychological harms

Organizational risks Financial losses Damage to reputation & trust

Etc.

Consequences of Security Attacks

Page 14: Overview of Information Security & Privacy

Privacy: “The ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.” (Wikipedia)

Security: “The degree of protection to safeguard ... person against danger, damage, loss, and crime.” (Wikipedia)

Information Security: “Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction” (Wikipedia)

Privacy & Security

Page 15: Overview of Information Security & Privacy

Security & Privacy

http://en.wikipedia.org/wiki/A._S._Bradford_House

Security & Privacy

Page 16: Overview of Information Security & Privacy

Information Security

Confidentiality

Integrity

Availability

Page 17: Overview of Information Security & Privacy

Examples of Confidentiality Risks

http://usatoday30.usatoday.com/life/people/2007-10-10-clooney_N.htm

Page 18: Overview of Information Security & Privacy

Examples of Integrity Risks

http://www.wired.com/threatlevel/2010/03/source-code-hacks/http://en.wikipedia.org/wiki/Operation_Aurora

“Operation Aurora”Alleged Targets: Google, Adobe, Juniper Networks, Yahoo!, Symantec, Northrop Grumman, Morgan Stanley, Dow ChemicalGoal: To gain access to and potentially modify source code repositories at high tech, security & defense contractor companies

Page 19: Overview of Information Security & Privacy

Examples of Integrity Risks

http://news.softpedia.com/news/700-000-InMotion-Websites-Hacked-by-TiGER-M-TE-223607.shtml

Web Defacements

Page 20: Overview of Information Security & Privacy

Examples of Availability Risks

http://en.wikipedia.org/wiki/Blaster_worm

Viruses/worms that led to instability & system restart (e.g. Blaster worm)

Page 21: Overview of Information Security & Privacy

Examples of Availability Risks

http://en.wikipedia.org/wiki/Ariane_5_Flight_501

Ariane 5 Flight 501 Rocket Launch Failure

Cause: Software bug on rocket acceleration due to data conversion from a 64-bit floating point number to a 16-bit signed integer without proper checks, leading to arithmatic overflow

Page 22: Overview of Information Security & Privacy

Interesting Resources

http://en.wikipedia.org/wiki/List_of_software_bugs

http://en.wikipedia.org/wiki/Notable_computer_viruses_and_worms

http://en.wikipedia.org/wiki/Hacktivism

http://en.wikipedia.org/wiki/Website_defacement

http://en.wikipedia.org/wiki/Hacker_(computer_security)

http://en.wikipedia.org/wiki/List_of_hackers

Page 23: Overview of Information Security & Privacy

Protecting Information Privacy & Security

Page 24: Overview of Information Security & Privacy

http://www.aclu.org/ordering-pizza

Privacy Protections: Why?

Page 25: Overview of Information Security & Privacy

บทความใน JAMA เรว็ๆ นี้

JAMA. 2015 Apr 14;313(14).

Recent JAMA Article

Page 26: Overview of Information Security & Privacy

Attack

An attempt to breach system security

Threat

A scenario that can harm a system

Vulnerability

The “hole” that is used in the attack

Common Security Terms

Page 27: Overview of Information Security & Privacy

Identify some possible means an attacker could use to conduct a security attack

Class Exercise

Page 28: Overview of Information Security & Privacy

Alice

Simplified Attack Scenarios

Server Bob

Eve/Mallory

Page 29: Overview of Information Security & Privacy

Alice

Simplified Attack Scenarios

Server Bob

- Physical access to client computer

- Electronic access (password)

- Tricking user into doing something (malware, phishing & social engineering)

Eve/Mallory

Page 30: Overview of Information Security & Privacy

Alice

Simplified Attack Scenarios

Server Bob

- Intercepting (eavesdropping or “sniffing”) data in transit

- Modifying data (“Man-in-the-middle” attacks)

- “Replay” attacksEve/Mallory

Page 31: Overview of Information Security & Privacy

Alice

Simplified Attack Scenarios

Server Bob

- Unauthorized access to servers through- Physical means- User accounts & privileges- Attacks through software vulnerabilities- Attacks using protocol weaknesses

- DoS / DDoS attacks Eve/Mallory

Page 32: Overview of Information Security & Privacy

Alice

Simplified Attack Scenarios

Server Bob

Other & newer forms of attacks possible

Eve/Mallory

Page 33: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

Administrative Security- Security & privacy policy- Governance of security risk management & response- Uniform enforcement of policy & monitoring- Disaster recovery planning (DRP) & Business continuity

planning/management (BCP/BCM)- Legal obligations, requirements & disclaimers

Page 34: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

Physical Security- Protecting physical access of clients & servers

- Locks & chains, locked rooms, security cameras- Mobile device security- Secure storage & secure disposition of storage devices

Page 35: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

User Security- User account management

- Strong p/w policy (length, complexity, expiry, no meaning)- Principle of Least Privilege- “Clear desk, clear screen policy”- Audit trails

- Education, awareness building & policy enforcement- Alerts & education about phishing & social engineering

Page 36: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

System Security- Antivirus, antispyware, personal firewall, intrusion

detection/prevention system (IDS/IPS), log files, monitoring- Updates, patches, fixes of operating system vulnerabilities &

application vulnerabilities- Redundancy (avoid “Single Point of Failure”)- Honeypots

Page 37: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

Software Security- Software (clients & servers) that is secure by design- Software testing against failures, bugs, invalid inputs,

performance issues & attacks- Updates to patch vulnerabilities

Page 38: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

Network Security- Access control (physical & electronic) to network devices- Use of secure network protocols if possible- Data encryption during transit if possible- Bandwidth monitoring & control

Page 39: Overview of Information Security & Privacy

Alice

Safeguarding Against Attacks

Server Bob

Database Security- Access control to databases & storage devices- Encryption of data stored in databases if necessary- Secure destruction of data after use- Access control to queries/reports- Security features of database management systems (DBMS)

Page 40: Overview of Information Security & Privacy

Privacy Safeguards

Image: http://www.nurseweek.com/news/images/privacy.jpg

Security safeguards

Informed consent

Privacy culture

User awareness building & education

Organizational policy & regulations

Enforcement

Ongoing privacy & security assessments, monitoring, and protection

Page 41: Overview of Information Security & Privacy

User Security

Page 42: Overview of Information Security & Privacy

Need for Strong Password Policy

So, two informaticianswalk into a bar...

The bouncer says, "What's the password."

One says, "Password?"

The bouncer lets them in.

Credits: @RossMartin & AMIA (2012)

Page 43: Overview of Information Security & Privacy

Access control

Selective restriction of access to the system

Role-based access control

Access control based on the person’s role (rather than identity)

Audit trails

Logs/records that provide evidence of sequence of activities

User Security

Page 44: Overview of Information Security & Privacy

Identification

Identifying who you are

Usually done by user IDs or some other unique codes

Authentication

Confirming that you truly are who you identify

Usually done by keys, PIN, passwords or biometrics

Authorization

Specifying/verifying how much you have access

Determined based on system owner’s policy & system configurations

“Principle of Least Privilege”

User Security

Page 45: Overview of Information Security & Privacy

Nonrepudiation

Proving integrity, origin, & performer of an activity without the person’s ability to refute his actions

Most common form: signatures

Electronic signatures offer varying degrees of nonrepudiation

PIN/password vs. biometrics

Digital certificates (in public key infrastructure - PKI) often used to ascertain nonrepudiation

User Security

Page 46: Overview of Information Security & Privacy

User Account Security

https://www.thaicert.or.th/downloads/files/BROCHURE_security_awareness.png

Page 47: Overview of Information Security & Privacy

Multiple-Factor Authentication

Two-Factor Authentication

Use of multiple means (“factors”) for authentication

Types of Authentication Factors

Something you know

Password, PIN, etc.

Something you have

Keys, cards, tokens, devices (e.g. mobile phones)

Something you are

Biometrics

User Security

Page 48: Overview of Information Security & Privacy

Recommended Password Policy Length

8 characters or more (to slow down brute-force attacks)

Complexity (to slow down brute-force attacks)

Consists of 3 of 4 categories of characters

Uppercase letters

Lowercase letters

Numbers

Symbols (except symbols that have special uses by the system or that can be used to hack system, e.g. SQL Injection)

No meaning (“Dictionary Attacks”)

Not simple patterns (12345678, 11111111) (to slow down brute-force attacks & prevent dictionary attacks)

Not easy to guess (birthday, family names, etc.) (to prevent unknown & known persons from guessing)

Personal opinion. No legal responsibility assumed.

Page 49: Overview of Information Security & Privacy

Recommended Password Policy Expiration (to make brute-force attacks not possible)

6-8 months

Decreasing over time because of increasing computer’s speed

But be careful! Too short duration will force users to write passwords down

Secure password storage in database or system (encrypted or store only password hashes)

Secure password confirmation

Secure “forget password” policy

Different password for each account. Create variations to help remember. If not possible, have different sets of accounts for differing security needs (e.g., bank accounts vs. social media sites) Personal opinion. No legal responsibility assumed.

Page 50: Overview of Information Security & Privacy

Dictionary Attack: เรื่องเล่าจากการเรียน

การ Hack ระบบ ที่ USA

Page 51: Overview of Information Security & Privacy

Clear Desk, Clear Screen Policy

http://pixabay.com/en/post-it-sticky-note-note-corner-148282/

Page 52: Overview of Information Security & Privacy

Techniques to Remember Passwords

http://www.wikihow.com/Create-a-Password-You-Can-Remember

Note that some of the techniques are less secure!

One easy & secure way: password mnemonic

Think of a full sentence that you can remember

Ideally the sentence should have 8 or more words, with numbers and symbols

Use first character of each word as password

Sentence: I love reading all 7 Harry Potter books!

Password: Ilra7HPb!

Voila!

Personal opinion. No legal responsibility assumed.

Page 53: Overview of Information Security & Privacy

Password Sharing

อยา่แชร์ Passwordกบัคนอื่น

Page 54: Overview of Information Security & Privacy

Password Expiration

เปลีย่น Passwordทุกๆ 3-6 เดอืน

Page 55: Overview of Information Security & Privacy

Keylogger Attack: เรื่องเล่าจากกิจกรรมชมรมสมัยเป็นนักศึกษาแพทย์

Page 56: Overview of Information Security & Privacy

Rogue Wi-Fi Router: จอมขโมย Password

ที่ทุกคนต้องระวัง

Page 57: Overview of Information Security & Privacy

Logout After Use

อยา่ลมื Logout หลงัใชง้านเสมอ โดยเฉพาะเครือ่งสาธารณะ(หากไมอ่ยูท่ีห่น้าจอ แมเ้พยีงชัว่ครู ่ให ้Lock Screen เสมอ)

Page 58: Overview of Information Security & Privacy

Mobile Security

https://www.thaicert.or.th/downloads/files/BROCHURE_mobile_malware.png

Page 59: Overview of Information Security & Privacy

Mobile Security

ตัง้ PIN ส าหรบั Lock Screen เอาไว้ ไมเ่กบ็ขอ้มลูส าคญัเอาไว้ ระวงัไมใ่หส้ญูหาย หากสญูหายรบีแจง้ระงบั

Page 60: Overview of Information Security & Privacy

Online (Shopping) Security

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Online-Shopping-Tips.jpg

ดแูลบตัรเครดติ และขอ้มลูหมายเลขบตัรใหด้ี

ใชเ้ฉพาะกบัเวบ็ทีเ่ชือ่ถอืได้

สมคัรบรกิาร SMS แจง้เตอืนเมือ่มกีารรดูบตัร

ด ูstatement และตรวจสอบธรุกรรมเสมอ

Page 61: Overview of Information Security & Privacy

E-mail Security

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Mail-Scam.jpg

Page 62: Overview of Information Security & Privacy

E-mail Security

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Mail-Scam.jpg

Page 63: Overview of Information Security & Privacy

E-mail & Online Security (Phishing)

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Phishing.jpg

Page 64: Overview of Information Security & Privacy

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Phishing.jpg

E-mail & Online Security (Phishing)

Page 65: Overview of Information Security & Privacy

Secure Log-in ส าหรบัเวบ็ทีส่ าคญัMicrosoft Internet Explorer

Page 66: Overview of Information Security & Privacy

Mozilla Firefox

Google Chrome

Secure Log-in ส าหรบัเวบ็ทีส่ าคญั

Page 67: Overview of Information Security & Privacy

Phishing Web Site

Page 68: Overview of Information Security & Privacy

Phishing E-mail

Page 69: Overview of Information Security & Privacy

Phishing E-mail

Page 70: Overview of Information Security & Privacy

Phishing E-mail

Page 71: Overview of Information Security & Privacy

Phishing E-mail

Page 72: Overview of Information Security & Privacy

Ransomware

Page 73: Overview of Information Security & Privacy

ลกัษณะส าคญัทีค่วรสงสยั Phishing

Grammar หว่ยแตก ตวัสะกดผดิเยอะพยายามอยา่งยิง่ใหเ้ปิดไฟลแ์นบ หรอืกดlink หรอืตอบเมล แต่ไมค่อ่ยใหร้ายละเอยีด

E-mail ทีม่าจากคนรูจ้กั ไมไ่ดป้ลอดภยัเสมอไป

Page 74: Overview of Information Security & Privacy

Don’t be too trusting of people

Always be suspicious & alert

An e-mail with your friend’s name & info doesn’t have to come from him/her

Look for signs of phishing attacks

Don’t open attachments unless you expect them

Scan for viruses before opening attachments

Don’t click links in e-mail. Directly type in browser using known & trusted URLs

Especially cautioned if ask for passwords, bank accounts, credit card numbers, social security numbers, etc.

Ways to Protect against Phishing

Page 75: Overview of Information Security & Privacy

{

Phishing Attack: เรื่องเล่าจากชีวิต

ประธานนักเรียนไทยใน Minnesota

Page 76: Overview of Information Security & Privacy

PC Security, Virus & Malware

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Phishing_Malicious-Code.jpg

Page 77: Overview of Information Security & Privacy

https://www.thaicert.or.th/downloads/files/info_ThaiCERT_Phishing_Malicious-Code.jpg

PC Security, Virus & Malware

Page 78: Overview of Information Security & Privacy

{

File Sharing: เรื่องเล่าจากชีวิต

นักศึกษาแพทย์รามาธิบดี(ที่อยากรู้อยากเห็น)

Page 79: Overview of Information Security & Privacy

Virus/Malware Attack & Windows Update: เรื่องเล่าจากบทบาท

Chief IT Admin รามาธิบดี(ที่ต้องดูแลระบบล่ม)

Page 80: Overview of Information Security & Privacy

Back-up Your Data: เรื่องเล่าจากคนงานเยอะ

Page 81: Overview of Information Security & Privacy

Software Security

Page 82: Overview of Information Security & Privacy

Most common reason for security bugs is invalid programming assumptions that attackers will look for

Weak input checking

Buffer overflow

Integer overflow

Race condition (Time of Check / Time of Use vulnerabilities)

Running programs in new environments

Software Security

Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271

Page 83: Overview of Information Security & Privacy

Feeping creaturism (Creeping featurism)

Log files that contain sensitive information

Configuration bugs

Unnecessary privileges

Monoculture

Security bypass

Software Security

Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271

Page 84: Overview of Information Security & Privacy

Consider a log-in form on a web page

Example of Weak Input Checking: SQL Injection

Source code would look something like this:

statement = "SELECT * FROM users WHERE name = '" + userName + "';"

Attacker would enter as username:

' or '1'='1

Which leads to this always-true query:

statement = "SELECT * FROM users WHERE name = '" + "' or '1'='1" + "';"

statement = "SELECT * FROM users WHERE name = '' or '1'='1';"

http://en.wikipedia.org/wiki/SQL_injection

Page 85: Overview of Information Security & Privacy

Economy of Mechanism

Design should be small & simple

Fail-safe default

Complete mediation

Check every access to every object

Open design

Separation of privilege / Least Privilege

Secure Software Design Principles

Saltzer & Schroeder (1975), Viega & McGraw (2000)Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271

Page 86: Overview of Information Security & Privacy

Least common mechanism

Minimize complexity of shared components

Psychological acceptability

If users don’t buy in to security mechanism or don’t understand how to use it, system is insecure

Work factor

Cost of attack should exceed resources attacker will spend

Secure Software Design Principles

Saltzer & Schroeder (1975), Viega & McGraw (2000)Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271

Page 87: Overview of Information Security & Privacy

Compromise recording

If too expensive to prevent a compromise, record it

Tamper evident vs. tamperproof

Log files

Secure Software Design Principles

Saltzer & Schroeder (1975), Viega & McGraw (2000)Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271 Image source: http://www.flickr.com/photos/goobelyga/2340650133/

Page 88: Overview of Information Security & Privacy

Defense in Depth

Multiple layers of security defense are placed throughout a system to provide redundancy in the event a security control fails

Secure the weakest link

Promote privacy

Trust no one

Secure Software Design Principles

Saltzer & Schroeder (1975), Viega & McGraw (2000)Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271 http://en.wikipedia.org/wiki/Defense_in_depth_(computing)

Page 89: Overview of Information Security & Privacy

Modular design

Check error conditions on return values

Validate inputs (whitelist vs. blacklist)

Avoid infinite loops, memory leaks

Check for integer overflows

Language/library choices

Development processes

Secure Software Best Practices

Adapted from Nicholas Hopper’s teaching slides for UMN Computer Security Class Fall 2006 CSCI 5271

Page 90: Overview of Information Security & Privacy

Malware

Page 91: Overview of Information Security & Privacy

Malicious software - Any code with intentional, undesirable side effects

Virus

Worm

Trojan

Spyware

Logic Bomb/Time Bomb

Backdoor/Trapdoor

Rootkit

Botnet

Malware

Page 92: Overview of Information Security & Privacy

Virus

Propagating malware that requires user action to propagate

Infects executable files, data files with executable contents (e.g. Macro), boot sectors

Worm

Self-propagating malware

Trojan

A legitimate program with additional, hidden functionality

Malware

Page 93: Overview of Information Security & Privacy

Spyware

Trojan that spies for & steals personal information

Logic Bomb/Time Bomb

Malware that triggers under certain conditions

Backdoor/Trapdoor

A hole left behind by malware for future access

Malware

Page 94: Overview of Information Security & Privacy

Rogue Antispyware (Ransomware)

Software that tricks or forces users to pay before fixing (real or hoax) spyware detected

Rootkit

A stealth program designed to hide existence of certain processes or programs from detection

Botnet

A collection of Internet-connected computers that have been compromised (bots) which controller of the botnet can use to do something (e.g. do DDoS attacks)

Malware

Page 95: Overview of Information Security & Privacy

Installed & updated antivirus, antispyware, & personal firewall

Check for known signatures

Check for improper file changes (integrity failures)

Check for generic patterns of malware (for unknown malware): “Heuristics scan”

Firewall: Block certain network traffic in and out

Sandboxing

Network monitoring & containment

User education

Software patches, more secure protocols

Defense Against Malware

Page 96: Overview of Information Security & Privacy

Social media spams/scams/clickjacking

Social media privacy issues

User privacy settings

Location services

Mobile device malware & other privacy risks

Stuxnet (advanced malware targeting certain countries)

Advanced persistent threats (APT) by governments & corporations against specific targets

Newer Threats

Page 97: Overview of Information Security & Privacy

US-CERT

U.S. Computer Emergency Readiness Team

http://www.us-cert.gov/

Subscribe to alerts & news

Microsoft Security Resources

http://technet.microsoft.com/en-us/security

http://technet.microsoft.com/en-us/security/bulletin

Common Vulnerabilities & Exposures

http://cve.mitre.org/

More Information

Page 98: Overview of Information Security & Privacy

Q & A