Module V
Module V
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control
Devices, Physical Security, Security and Personnel
SECURITY TECHNOLOGY
What is Security?
quality or state of being secure—to be free from danger”
A successful organization should have multiple layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
Physical Design
Physical design of an information security program is made up of two parts:
Security technologies
Physical security
Physical design process:
Identifies complete technical solutions based on these technologies
(deployment, operations and maintenance elements)
Design physical security measures to support the technical solution.
Firewalls
A software or hardware component that restricts network communication
between two computers or networks.
In buildings, a firewall is a fireproof wall that restricts the spread of a fire.
Network firewall prevents threats from spreading from one network to
another
Prevent specific types of information from moving between the outside
world (untrusted networks) and the inside world (trusted networks)
The firewall may be a separate computer system, a software servic e running
on an existing router all serve r, or a separate network containing a number
of supporting devices.
Internet Firewalls
What Firewalls do
Protects the resources of an internal network.
Restrict external access.
Log Network activities.
Intrusion detection
DoS
Act as intermediary
Centralized Security Management
Carefully administer one firewall to control internet traffic of many
machines.
Internal machines can be administered with less care.
Types of Firewalls (General)
Firewalls types can be categorized depending on:
The Function or methodology the firewall use
Whether the communication is being done between a single node
and the network, or between two or more networks.
Personal Firewalls
a software application which normally filters traffic entering or
leaving a single computer.
Network firewalls
normally running on a dedicated network device or computer
positioned on the boundary of two or more networks.
Whether the communication state is being tracked at the firewall or
not.
3 Firewall categorization methods
The Function or methodology the firewall use
Five processing modes that firewalls can be categorized by are :
packet filtering
application gateways
circuit gateways
MAC layer firewalls
hybrids
Packet filtering:
examine the header information of data packets that come into a
network.
a packet filtering firewall installed on TCP/IP based network and
determine whether to drop a packet or forward it to the next network
connection based on the rules programmed in the firewall.
Packet filtering firewalls scan network data packets looking for
violation of the rules of the firewalls database.
Filtering firewall inspect packets on at the network layers.
If the device finds a packet that matches a restriction it stops the
packet from traveling from network to another.
filters packet-by-packet, decides to Accept/Deny/Discard packet based
on certain/configurable criteria – Filter Rule sets.
Typically stateless: do not keep a table of the connection state of the
various traffic that flows through them
Not dynamic enough to be considered true firewalls.
Usually located at the boundary of a network.
Their main strength points: Speed and Flexibility.
There are three subsets of packet filtering firewalls:
static filtering
dynamic filtering
stateful inspection
static filtering:
requires that the filtering rules covering how the firewall
decides which packets are allowed and which are denied.
This type of filtering is common in network routers and
gateways.
Dynamic filtering
allows the firewall to create rules to deal with event.
This reaction could be positive as in allowing an internal user
to engage in a specific activity upon request or negative as in
dropping all packets from a particular address
Stateful inspection
keep track of each network connection between internal and
external systems using a state table.
A state table tracks the state and context of each packet in the
conversation by recording which station send , what packet
and when.
More complex than their constituent component firewalls
Nearly all modern firewalls in the market today are stateful
Application gateways:
is also known as proxy server since it runs special software that acts as
a proxy for a service request.
One common example of proxy server is a firewall that blocks or
requests for and responses to request for web pages and services from
the internal computers of an organization.
The primary disadvantage of application-level firewalls is that they
are designed for a specific protocol and cannot easily be reconfigured
to protect against attacks in other protocols.
Application firewalls work at the application layer.
Filters packets on application data as well as on IP/TCP/UDP fields.
The interaction is controlled at the application layer
A proxy server is an application that mediates traffic between
two network segments.
With the proxy acting a s mediator, the source and destination system
s never actually“connect”.
Filtering Hostile Code: Proxies can analyse the payload of a packet of
data and make decision as to whether this packet should be passed or
dropped.
Circuit gateways:
operates at the transport layer
Connections are authorized based on addresses, they prevent direct
connections between network and another.
They accomplish this prevention by creating channels connecting
specific systems on each side of the firewall and then allow only
authorized traffic.
relays two TCP connections (session layer)
imposes security by limiting which such connections are allowed
once created usually relays traffic without examining contents
Monitor handshaking between packets to decide whether the traffic is
legitimate
typically used when trust internal users by allowing general outbound
connections
SOCKS commonly used for this
Circuit Level Firewalls Example
Padded cell: honey pot that has been protected so it cannot be easily
compromised
In addition to attracting attackers with tempting data, a padded cell operates in
tandem with a traditional IDS
When the IDS detects attackers, it seamlessly transfers them to a special
simulated environment where they can cause no harm—the nature of this host
environment is what gives approach the name padded cell
Advantages
Attackers can be diverted to targets they cannot damage
Administrators have time to decide how to respond to attacker
Attackers’ actions can be easily and more extensively monitored, and records can
be used to refine threat models and improve system protections
Honey pots may be effective at catching insiders who are snooping around a
network
Disadvantages
Legal implications of using such devices are not well defined
Honey pots and padded cells have not yet been shown to be generally useful
security technologies
Expert attacker, once diverted into a decoy system, may become angry and
launch a more hostile attack against an organization’s systems
Administrators and security managers will need a high level of expertise to use
these systems
Trap and Trace Systems
Use combination of techniques to detect an intrusion and trace it back to its
source
Trap usually consists of honey pot or padded cell and alarm
Legal drawbacks to trap and trace
Enticement: process of attracting attention to system by placing tantalizing bits of
information in key locations
Entrapment: action of luring an individual into committing a crime to get a
conviction.
Enticement is legal and ethical, whereas entrapment is not
SCANNING AND ANALYSIS TOOLS
Typically used to collect information that attacker would need to launch
successful attack
Attack protocol is series of steps or processes used by an attacker, in a logical
sequence, to launch attack against a target system or network
Foot printing: the organized research of Internet addresses owned or controlled by
a target organization
Confidentiality
Confidentiality, keeping information secret from unauthorized access, is probably
the most common aspect of information security: we need to protect confidential
information. An organization needs to guard against those malicious actions that
endanger the confidentiality of its information.
Integrity
Information needs to be changed constantly. In a bank, when a customer deposits
or withdraws money, the balance of their account needs to be changed. Integrity
means that changes should be done only by authorized users and through
authorized mechanisms.
Availability
The third component of information security is availability. The information
created and stored by an organization needs to be available to authorized users
and applications. Information is useless if it is not available. Information needs to
be changed constantly, which means that it must be accessible to those authorized
to access it. Unavailability of information is just as harmful to an organization as
a lack of confidentiality or integrity. Imagine what would happen to a bank if the
customers could not access their accounts for transactions.
Attacks
The three goals of security—confidentiality, integrity and availability—can be
threatened by security attacks. Figure relates the taxonomy of attack types to
security goals.
Techniques
The actual implementation of security goals needs some help from mathematics.
Two techniques are prevalent today: one is very general—cryptography—and
one is specific—steganography.
CRYPTOGRAPHY
Some security services can be implemented using cryptography. Cryptography, a
word with Greek origins, means “secret writing”.
Steganography
The word steganography, with its origin in Greek, means “covered writing”, in
contrast to cryptography, which means
“secret writing”.
Symmetric-Key Cryptography
Figure 16.4 shows the general idea behind symmetric-key cryptography. Alice
can send a message to Bob over an insecure channel with the assumption that an
adversary, Eve, cannot understand the contents of the message by simply
eavesdropping on the channel.
The original message from Alice to Bob is referred to as plaintext; the message
that is sent through the channel is referred to as the ciphertext. Alice uses an
encryption algorithm and a shared secret key. Bob uses a decryption algorithm
and the same secret key.
Traditional ciphers
Traditional ciphers used two techniques for hiding information from an
intruder: substitution and transposition.
Substitution ciphers
A substitution cipher replaces one symbol with another. If the symbols in the
plaintext are alphabetic characters, we replace one character with another.
Example 16.1
ü Use the additive cipher with key = 15 to encrypt the message “hello”.
Solution
ü We apply the encryption algorithm to the plaintext, character by character:
The key used for encryption and decryption is a permutation key, which shows
how the character are permuted. For this message, assume that Alice and Bob
used the following key:
The third character in the plaintext block becomes the first character in the
ciphertext block, the first character in the plaintext block becomes the second
character in the ciphertext block and so on. The permutation yields:
Asymmetric-Key Cryptography
Figure shows the general idea of asymmetric-key cryptography as used for
confidentiality. The figure shows that, unlike symmetric-key cryptography, there
are distinctive keys in asymmetric-key cryptography: a private key and a public
key. If encryption and decryption are thought of as locking and unlocking
padlocks with keys, then the padlock that is locked with a public key can be
unlocked only with the corresponding private key. Eve should not be able to
advertise her public key to the community pretending that it is Bob’s public key.
Example 16.3
Bob chooses p = 7 and q = 11 and calculates n = 7 × 11 = 77. Now he chooses
two exponents, 13 and 37, using the complex process mentioned before. The
public key is (n = 77 and e = 13) and the private key is (d = 37). Now imagine
that Alice wants to send the plaintext 5 to Bob. The following shows the
encryption and decryption.
Asymmetric-Key Cryptography
Both symmetric-key and asymmetric-key cryptography will continue to exist in
parallel. We believe that they are complements of each other: the advantages of
one can compensate for the disadvantages of the other.
The number of secrets
The conceptual differences between the two systems are based on how these
systems keep a secret. In symmetric-key cryptography, the secret token must be
shared between two parties. In asymmetric-key cryptography, the token is
unshared: each party creates its own token.
Symmetric-key cryptography is based on sharing secrecy;
asymmetric-key cryptography is based on personal secrecy.
A need for both systems
There are other aspects of security besides confidentiality that need asymmetric-
key cryptography. These include authentication and digital signatures (discussed
later). Whereas symmetric-key cryptography is based on substitution and
permutation of symbols, asymmetric-key cryptography is based on applying
mathematical functions to numbers.
In symmetric-key cryptography, symbols are permuted or substituted:
in asymmetric-key cryptography, numbers are manipulated.
ACCESS CONTROL DEVICES
Successful access control system includes number of components, depending on
system’s needs for authentication and authorization
Strong authentication requires at least two forms of authentication to authenticate
the supplicant’s identity
The technology to manage authentication based on what a supplicant knows is
widely integrated into the networking and security software systems in use across
the IT industry
Authentication
Authentication is validation of a supplicant’s identity
Four general ways in which authentication is carried out:
What a supplicant knows
What a supplicant has
Who a supplicant is
What a supplicant produces
Authorization: Are you allowed to do that?
Once you have access, what can you do?
Enforces limits on actions
Note: Access control often used as synonym for authorization
Authentication
How to authenticate a human to a machine?
Can be based on…
Something you know
For example, a password
Something you have
For example, a smartcard
Something you are
For example, your fingerprint
Passwords
Lots of things act as passwords!
PIN
Social security number
Mother’s maiden name
Date of birth
Name of your pet, etc.
Trouble with Passwords
“Passwords are one of the biggest practical problems facing security engineers
today.”
“Humans are incapable of securely storing high-quality cryptographic keys, and
they have unacceptable speed and accuracy when performing cryptographic
operations. (They are also large, expensive to maintain, difficult to manage, and
they pollute the environment. It is astonishing that these devices continue to be
manufactured and deployed.)”
Why Passwords?
Why is “something you know” more popular than “something you have” and
“something you are”?
Cost: passwords are free
Convenience: easier for SA to reset pwd than to issue user a new thumb
Keys vs Passwords
Crypto keys
Spse key is 64 bits
Then 264 keys
Choose key at random
Then attacker must try about 263 keys
Passwords
Spse passwords are 8 characters, and 256 different characters
Then 2568 = 264 pwds
Users do not select passwords at random
Attacker has far less than 263 pwds to try (dictionary attack)
Good and Bad Passwords
Bad passwords
frank
Fido
password
4444
Pikachu
102560
Good Passwords?
jfIej,43j-EmmL+y
09864376537263
P0kem0N
FSa7Yago
0nceuP0nAt1m8
Password Experiment
Three groups of users ¾ each group advised to select passwords as follows
Group A: At least 6 chars, 1 non-letter
Group B: Password based on passphrase
Group C: 8 random characters
Results
Group A: About 30% of pwds easy to crack
Group B: About 10% cracked
Passwords easy to remember
Group C: About 10% cracked
Passwords hard to remember
User compliance hard to achieve
In each case, 1/3rd did not comply (and about 1/3rd of those easy to crack!)
Assigned passwords sometimes best
If passwords not assigned, best advice is
Choose passwords based on passphrase
Use pwd cracking tool to test for weak pwds
Require periodic password changes?
Attacks on Passwords
Attacker could…
Target one particular account
Target any account on system
Target any account on any system
Attempt denial of service (DoS) attack
Common attack path
Outsider ® normal user ® administrator
May only require one weak password!
Password Retry
Suppose system locks after 3 bad passwords. How long should it lock?
5 seconds
5 minutes
Until SA restores service
What are +’s and -’s of each?
Password File
Bad idea to store passwords in a file
But need a way to verify passwords
Cryptographic solution: hash the passwords
Store y = h(password)
Can verify entered password by hashing
If attacker obtains password file, he does not obtain passwords
But attacker with password file can guess x and check whether y = h(x)
If so, attacker has found password!
Dictionary Attack
Attacker pre-computes h(x) for all x in a dictionary of common passwords
Suppose attacker gets access to password file containing hashed passwords
Attacker only needs to compare hashes to his pre-computed
dictionary
Same attack will work each time
Can we prevent this attack? Or at least make attacker’s job more difficult?
Password Cracking: Do the Math
Assumptions
Pwds are 8 chars, 128 choices per character
Then 1288 = 256 possible passwords
There is a password file with 210 pwds
Attacker has dictionary of 220 common pwds
Probability of 1/4 that a pwd is in dictionary
Work is measured by number of hashes
Password Cracking
Attack 1 password without dictionary
Must try 256/2 = 255 on average
Just like exhaustive key search
Attack 1 password with dictionary
Expected work is about
/4 (2 ) + 3/4 (255) = 254.6
19
But in practice, try all in dictionary and quit if not found work is at most
220 and probability of success is 1/4
Attack any of 1024 passwords in file
Without dictionary
Assume all 210 passwords are distinct
Need 255 comparisons before expect to find password
If no salt, each hash computation gives 210 comparisons Þ the
expected work (number of hashes) is 255/210 = 245
If salt is used, expected work is 255 since each comparison requires a
new hash computation
Attack any of 1024 passwords in file
With dictionary
Probability at least one password is in dictionary is 1 - (3/4)1024 = 1
We ignore case where no pwd is in dictionary
If no salt, work is about 219/210 = 29
If salt, expected work is less than 222
Note: If no salt, we can precompute all dictionary hashes and
amortize the work
Password cracking is too easy!
One weak password may break security
Users choose bad passwords
Social engineering attacks, etc.
The bad guy has all of the advantages
All of the math favours bad guys
Passwords are a big security problem
Password Cracking Tools
Popular password cracking tools
Password Crackers
Password Portal
L0phtCrack and LC4 (Windows)
John the Ripper (Unix)
Admins should use these tools to test for weak passwords since attackers will!
Good article on password cracking
Passwords - Cornerstone of Computer Security
Biometric
“You are your key” ¾ Schneier
Examples
Fingerprint
Handwritten signature
Facial recognition
Speech recognition
Gait (walking) recognition
“Digital doggie” (odour recognition)
Many more!
Why Biometrics?
Biometrics seen as desirable replacement for passwords
Cheap and reliable biometrics needed
Today, a very active area of research
Biometrics are used in security today
Thumbprint mouse
Palm print for secure entry
Fingerprint to unlock car door, etc.
But biometrics not too popular
Has not lived up to its promise (yet)
Ideal Biometric
Universal ¾ applies to (almost) everyone
In reality, no biometric applies to everyone
Distinguishing ¾ distinguish with certainty
In reality, cannot hope for 100% certainty
Permanent ¾ physical characteristic being measured never changes
In reality, want it to remain valid for a long time
Collectable ¾ easy to collect required data
Depends on whether subjects are cooperative
Safe, easy to use, etc., etc.
Biometric Modes
ü Identification ¾ Who goes there?
Compare one to many
Example: The FBI fingerprint database
Authentication Is that really you?
Compare one to one
Example: Thumbprint mouse
Identification problem more difficult
More “random” matches since more comparisons
Fingerprint Comparison
Examples of loops, whorls and arches
Minutia extracted from these features
PHYSICAL SECURITY
Introduction
Physical security addresses design, implementation, and maintenance of
countermeasures that protect physical resources of an organization.
Most controls can be circumvented if attacker gains physical access
Physical security is as important as logical security
Seven major sources of physical loss
Extreme temperature
Gases
Liquids
Living organisms
Projectiles
Movement
Energy anomalies
Community roles
General management: responsible for facility security
IT management and professionals: responsible for environmental and access
security
Information security management and professionals: perform risk assessments and
implementation reviews
Physical Access Controls
Secure facility: physical location engineered with controls designed to minimize
risk of attacks from physical threats
Secure facility can take advantage of natural terrain, traffic flow, and degree
of urban development; can complement these with protection mechanisms
(fences, gates, walls, guards, alarms)
1 Controls for Protecting the Secure Facility
Walls, fencing, and gates
Guards
Dogs
ID Cards and badges
Locks and keys
Mantraps
Electronic monitoring
Alarms and alarm systems
Computer rooms and wiring closets
Interior walls and doors
2 ID Cards and Badges
Ties physical security with information access control
ID card is typically concealed
Name badge is visible
Serve as simple form of biometrics (facial recognition)
Should not be only means of control as cards can be easily duplicated, stolen, and
modified
Tailgating occurs when unauthorized individual follows authorized user through
the control
3 Locks and Keys
Two types of locks: mechanical and electromechanical
Locks can also be divided into four categories: manual, programmable, electronic,
biometric
Locks fail and alternative procedures for controlling access must be put in place
Locks fail in one of two ways
Fail-safe lock
Fail-secure lock
4 Mantraps
Small enclosure that has entry point and different exit point
Individual enters mantrap, requests access, and if verified, is allowed to exit
mantrap into facility
Individual denied entry is not allowed to exit until security official overrides
automatic locks of the enclosure
5 Electronic Monitoring
Records events where other types of physical controls are impractical or
incomplete
May use cameras with vi deo recorders; includes closed-circuit television (CCT)
systems
Drawbacks
Reactive; do not prevent access or prohibited activity
Recordings often not monitored in real time; must be reviewed to have any value
Alarms and Alarm Systems
Alarm systems notify when an event occurs
Detect fire, intrusion, environmental disturbance, or an interruption in services
Rely on sensors that detect event; e.g., motion detectors, smoke detectors, thermal
detectors, glass breakage detectors, weight sensors, contact sensors, vibration
sensors
6 Computer Rooms and Wiring Closets
ü Require special attenti on to ensure confidentiality, integrity, and availability of
information
ü Logical controls easily d efeated if attacker gains physical access to comp uting
equipment
Custodial staff often the least scrutinized persons who have access to offices; are
given greatest degree of unsupervised access
7 Interior Walls and Doors
Information asset security sometimes compromised by construction of facility
walls and doors
Facility walls typically either standard interior or firewall
High-security areas must have firewall-grade walls to provide physical security
from potential intruders and improve resistance to fires
Doors allowing access to high security rooms should be evaluated
Recommended that push or crash bars be installed on computer rooms and closets
8 Fire Security and Safety
Most serious threat to safety of people who work in an organization is possibility of
fire
Fires account for more property damage, personal injury, and death than any other
threat
Imperative that physical security plans examine and implement strong measures to
detect and respond to fires
9 Fire Detection and Response
Fire suppression systems: devices installed and maintained to detect and respond to
a fire
Deny an environment of heat, fuel, or oxygen
Water and water mist systems
Carbon dioxide systems
Soda acid systems
Gas-based systems
10 Fire Detection
Fire detection systems fall into two general categories: manual and automatic
Part of a complete fire safety program includes individuals that monitor chaos of
fire evacuation to prevent an attacker accessing offices
There are three basic types of fire detection systems: thermal detection, smoke
detection, flame detection
11 Fire Suppression
Systems consist of portable, manual, or automatic apparatus
Portable extinguishers are rated by the type of fire: Class A, Class B, Class C,
Class D
Installed systems apply suppressive agents; usually either sprinkler or gaseous
systems
Power Management and Conditioning