Security
* Information Security is protection of
information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction, in order to provide
confidentiality, integrity, and availability; both
digital and analog information
Information security includes personnel,
physical, ICT (information and communication
technology), and document security.
* IT security is protection of information
technologies. Practically, there is no difference
between ICT security and IT security.
* Cybersecurity is the ability to protect or
defend the use of cyberspace from cyber
attacks. It includes information and non-
information, such as cars, traffic lights,
electronic appliances, etc.
* Going by these definition, cyber security is all
about security of anything in cyber realm
(space), while information security is all about
security of information regardless of the realm.
Security
info sec.: C.I.A.
confidentiality: only sender, intended receiver should “understand” message contents
• sender encrypts message
• receiver decrypts message
message integrity: sender, receiver want to ensure message not altered (in transit, or
afterwards) without detection (hash functions and digital signatures)
access and availability: services must be accessible and available to users (disaster
recovery plan, redundancy)
non-repudiation: knowing who sent or received information (digital signatures)
authentication: sender, receiver want to confirm identity of each other (something you
know, have, are)
information assurance: C.I.A. + authentication + non-repudiation
authorization: determining if the client has permission to use or access a resource
Cyber security
▪ Aim: Protecting cyber realm towards to cyber attacks
and reducing the risks
▪ General idea of unrelated people: There are lots of
hackers, cyber terrorists and spies
▪ Reality:
▪ Risks stem from errors of hardware & software
• We can’t protect every asset
Hardware & Software errors
Cyber security
Three basic components
• Vulnerability
- Weakness of a system; when exploited, loss and damage may ocur
(e.g. transferring data clear text)
- Exploiting a vulnerability intentionally is called an attack
• Threat
- Situation resolved when weakness is prevented, may be an attack or
innocent fault of a person
• Countermeasure
- Resolving a vulnerability (e.g. updating the OS)
Cyber security
Risk is the potential for loss, damage, or destruction of an asset, as a result of a threat exploiting a vulnerability.
May be defined as the multiplication of threats and vulnerabilities.
Example: in a system that allows weak passwords;
A password is vulnerable for dictionary or exhaustive key attacks: vulnerability.
An intruder can exploit the password weakness to break into the system: threat.
Resources within the system are prone for illegal access/modify/damage by the intruder: risk.
* BCP: Business Continuity Planning
Cyber resilience
▪ continuously deliver the intended outcome despite
adverse cyber events
▪ involves collaboration of people, processes,
technology and facilities
▪ cyber security + keeping things running
Cyber security
Attackers
- Amateur: mostly script kiddies
- Hacker (Cracker): hackers are innocent, testers; crackers are
malicious
- State-funded spy
- Terrorist
Hackers
Ethical hackers
▪ Work with professional and ethical values
▪ Obtain ‘Get Out of Jail Free’ doc
▪ Must report of the findings
▪ Must respect privacy
▪ Shouldn’t crash tested systems
Hackers vs malicious users
▪ Have a common goal, compromising sensitive information
▪ Hackers: External, unauthorized
▪ Malicious users: Internal, authorized
Threats
Integrity
(Availability)
Confidentiality
Main types of threats
▪ Disclosure: unauthorized access to information, e.g.
eavesdropping
▪ Deception: modification, spoofing, repudiation of origin,
denial of receipt
▪ Disruption: corruption, e.g. Denial of Service (DoS)
▪ Usurpation: hijacking
Attacks (Insider & Outsider)
• Buffer overflow
• Brute force
• Replay
• Sniffing, man in the middle
• Session hijacking
• Denial of Service
• Phishing
• Malware
Buffer overflow
occurs when a program or process attempts to write
more data to a fixed length block of memory (a buffer),
than the buffer is allocated to hold
by sending crafted input to an application, an attacker
can cause the application to execute arbitrary code,
possibly taking over the machine
reading an IP address from a text file, assumption: IP
address, will never exceed 15 bytes
fake string will cause our program to overflow the
destination buffer
Proper: [Link]
Fake: 19222222222.16888888.0.1
Brute force
▪ An attempt to crack a password or username, find an
enc. key
▪ Trial and error approach, aim: making a correct guess
Replay attack
1. Eavesdrop on a secure network communication
2. Intercept it
3. Delay or resend it to misdirect the receiver
no need advanced skills to decrypt a message, could be successful simply by resending the whole thing
-Suppose Alice wants to prove her identity to Bob
-Bob requests her password as proof of identity (possibly after some transformation like a hash function)
-Meanwhile, Eve is eavesdropping on the conversation and keeps the password (or the hash)
-After the interchange is over, Eve (posing as Alice) connects to Bob; when asked for a proof of identity, Eve sends Alice's
password (or hash) read from the last session which Bob accepts, thus granting Eve access
Prevention: completely random session keys, timestamps, pw for each transaction
Sniffing
▪ Eavesdropping
▪ Usually passive
▪ Acquisition of knowledge
Alice Bob
Ev
e
Sniffing
▪ Sniffing maybe active: man-in-the-middle attack
▪ Interception and decryption, aims at changing the flow
Types of MITM Attacks
▪ Rogue Access Point: setting up a fake wireless AP and trick
nearby devices to join that domain
▪ ARP Spoofing: an attacker wishing to pose as another host could
respond to requests it should not be responding to with its own
MAC address
▪ DNS Spoofing: act of entering false information into a DNS cache,
DNS poisoning
Session hijacking
▪ Session ID (token) is captured
using sniffers
▪ Captured token is used to access
the web server
▪ Prevention:
- Changing IDs for each session
- Using timestamps
Denial of service
▪ Shut down a machine or network
▪ Can cost the victim a great deal of time and money to
handle
Denial of service
▪ Flooding services: too much traffic, slow down and
stop
▪ Crashing services: exploiting vulnerabilities
▪ DDoS
Denial of service
▪ multiple connections to the targeted server by
sending multiple partial HTTP request headers
▪ target opens a thread for each incoming request
(If a connection takes too long, the server will
timeout the long connection, freeing the thread
up for the next request)
▪ to prevent the target from timing out the
connections, attacker periodically sends partial
request headers and so keep the request alive
(“I’m still here! I’m just slow, please wait for
me.”)
▪ targeted server is never able to release any of
the open partial connections. Once all available
threads are in use, the server will be unable to
respond to additional requests, this results in
denial-of-service.
Denial of service
How to mitigate?
▪ Increase server availability
▪ Rate limit incoming requests: limiting the max number
of conn. a single IP address is allowed to make, and
limiting the max time a client is allowed to stay
connected
▪ Cloud-based protection: reverse proxy, protect the
origin server
Denial of service
DDoS Types
volumetric (bps---bits per second)
- DSL routers, surveillance cameras, and IoT devices can
be used
protocol (pps---packets per second) : OSI Layer 3 or Layer 4
application layer(rps---requests per second): OSI Layer 7
Denial of service
UDP Flood (Vol.)
Denial of service
ICMP (Ping) Flood (Vol.)
Denial of service
Syn Flood (Protocol)
Denial of service
HTTP Flood (App. Layer)
Phishing
▪ Social engineering
▪ Used to steal data
▪ Tricky email, instant message, or text message
▪ Recipient is then tricked into clicking a malicious link
Malware
▪ Virus: infect other files, need end users to kick them of
▪ Worm: self-replicating and spreads without end-user action
▪ Trojan: masquerades as legitimate programs, works when the
victim executes
▪ Ransomware: encrypts all files
APT
▪ broad term: an intruder, or team of
intruders, establishes an illegal, long-
term presence on a network, in order
to mine highly sensitive data
▪ Stage 1 – Infiltration: through the
compromising of one of three attack
surfaces: web assets, network
resources or authorized human users.
▪ Stage 2 – Expansion: attackers move
to broaden their presence within the
network
▪ Stage 3 – Extraction: stolen
information is stored in a secure
location inside the network and then
extracted without being detected
Security: Defense in Depth
like layers of an onion or a castle with multiple layers of
defense:
Border Router
Perimeter firewall
Internal firewall
Intrusion Detection System
Policies & Procedures & Audits
Authentication
Access Controls
Bastion Host
* Computer fortified
against attackers
* Applications turned off
* Operating system
patched
* Security configuration
tightened
Attacking the Network
What ways do you see of getting in? Which one is the easiest?
- A good network: divided into
sections
- De-Militarized Zone here is
for public access.
Border Router/Firewall - A DMZ contains external-
The Internet facing services to an untrusted
network, such as the Internet.
- Purpose of a DMZ is to add
De-Militarized an additional layer of security
Zone to an organization's LAN.
- Private Network is for
Commercial Network internal access, and requires
Firewall going through 2 firewalls, each
WLAN with filtering.
Private Network
Filters: Firewalls & Routers
The good, the bad & Filter The Good
the ugly…
The bad &
the ugly
- Route Filter: Verifies source/destination IP addresses
- Packet Filter: Scans headers of packets: computer IDs and service IDs
- Content Filter: Scans contents of packet (e.g., IPS)
Fail Safe, Fail Close, Fail Secure: Default Deny - Any packet not explicitly permitted is rejected
Fail Open: granting all access
In which design availability is important more than security?
Packet Filter Firewall
Web Response
Illegal Dest IP Address
Web Request
Email Response
SSH Connect Request
DNS Request Web
Response
Ping Request
Illegal Source IP Address
Email Response
FTP request
Microsoft NetBIOS Name Service
Email Connect Request
Telnet Request
Firewalls – Next Generation
Packet Filter FW
IDS/IPS
Application Control
Anti Virus
Anti Bot
SSL inspection
DLP
…
Informal Path of Logical Access
Login
Students &
Instructors
Campus Library
Register
Public:
Potential Students Registrars Lab
Graduates Students &
Instructors
Public
Legend Web Staff Nurses
Public
Health
Private PoS
Services
Confidential
Determine Services
Service Source
(e.g., web, sales database) (e.g., home, world, local computer)
Registration Registrars: On campus
On campus students and staff.
Library databases
Off-campus requires login
Health Services On campus: nurses office
External (Internet) web On campus: Campus labs, dorms, faculty
services offices
Allocate Network Zones
Zone Services Zone Description
Internet This zone is external to the organization.
Web,
This zone houses services that the public are allowed to
DMZ Email,
access in our network.
DNS
Wireless This zone connects wireless/laptop employees/students
Wireless
local (and crackers) to our internal network. They have wide
Network
employees access.
Private This zone hosts our student learning databases, faculty
DBs
Server Zone servers, and student servers.
Payment
Confidential card, This highly-secure zone hosts databases with payment
Zone health, and other confidential (protected by law) information.
grades info
Wired
Private User This zone hosts our wired/fixed employee/classroom
staff/
Zone computer terminals.
students
Define Controls
Zone Service Required Controls
Web, Hacking: Intrusion Prevention System, Monitor
DMZ Email, alarm logs, Anti-virus software within Email
DNS package.
Wireless Wireless local Confidentiality: WPA2 Encryption
Network users Authentication: WPA2 Authentication
Classroom
Confidentiality: Secure Web (HTTPS), Secure
software,
Private Protocols (SSH, SFTP).
Faculty &
Server Zone Authentication: Single Sign-on through Radius
student
Hacking: Monitor alarm logs
storage.
Bill
Data Privacy
Confidentiality: Unauthorized
parties cannot access Confidentiality Authenticity
information Joe
(->Secret Key Encryption) Joe (Actually Bill)
Bill
Authenticity: Ensures claimed
sender = actual sender.
(->Public Key Encryption) Ann Ann
Integrity: Ensures the message
is not modified in Integrity Non-Repudiation
transmission. Joe Joe
(->Hashing)
Nonrepudiation: Ensures Bill
sender cannot later deny
sending message. Ann Ann
(->Digital Signature)
Confidentiality:
Encryption – Secret Key
Examples: DES, AES
plaintext Encrypt Decrypt plaintext
Ksecret Ksecret
ciphertext
Sender, Receiver have IDENTICAL keys
Plaintext = Decrypt(Ksecret, Encrypt(Ksecret,Plaintext))
Confidentiality, Authentication, Non-Repudiation
Public Key Encryption
Examples: RSA, ECC, Quantum
Sender, Receiver have Complimentary Keys
Plaintext = Decrypt(kPRIV, Encrypt(kPUB,Plaintext))
Encryption
Joe (e.g., RCS) Key owner
Encrypt Decrypt
Kpublic Message, Kprivate
private key
Authentication,
Joe Decrypt Non-repudiation Encrypt Key
Kpublic Kprivate owner
Digital
Signature
Plaintext = Decrypt(kPUB, Encrypt(kPRIV,Plaintext))
PK enc. is processor-intensive, and not useful for long term data communications sessions. Therefore, it is often used to change a Secret
key(session key) between two endpoints, and then Secret key is used to enc. data.
Confidentiality:
Remote Access Security
Firewall
The Internet VPN
Concentrator
Virtual Private Network (VPN): encrypted point-to-point path between two nodes, often
implemented with IPSec
Can authenticate and encrypt data through Internet (red line)
Easy to use and inexpensive
Difficult to troubleshoot
Susceptible to malicious software and unauthorized actions
Often router or firewall is the VPN endpoint
Integrity:
Hash Functions
Examples: SHA-2, SHA-3
Ensures the message was not modified during transmission
Message Message H Message H H
Compare
H H H
H = Hash Algorithm
H=Hashed Value
Non-Repudiation:
Digital Signature
Public key algorithm
Verifies integrity of data
Verifies identity of sender: non-repudiation
Non-Repudiation:
Digital Signature
X.509 public key infrastructure (PKI)
1 – Content Info 3– Signer info
(Signed Data) • Version Signed attributes
• Signer Identifier • Hash
• Hash algorithm • Time
2– Signed Data (sha256) • Content type data
• Version • Signed attributes • Certificate (hash)
• Hash algorithm • Signature algorithm
(sha256) • sha256withRSA
• Encapsulated data • Signature
1. der encoding
(original data)
2. Hash
• Certificate
3. RSA (enc.)
• Signer info
Authentication:
Public Key Infrastructure (PKI)
7. Tom confirms
Sue’s DS
5. Tom requests Sue’s DC 🡪
6. CA sends Sue’s DC 🡪
Tom
Digital
Certificate
4. Sue sends User: Sue Certificate Authority
Tom message Public Key: (CA)
signed with 2456
Digital Signature 3. Send approved
Digital Certificates
1. Sue registers with
CA through RA
Sue Register(Owner, Public Key) 2. Registration Authority
(RA) verifies owners
Hacking Defense:
Intrusion Detection/Prevention Systems (IDS or IPS)
Router
IDS
Firewall
Network IDS=NIDS Host IDS=HIDS
Examines packets for attacks Examines actions or resources
for attacks
Can find worms, viruses, or
defined attacks Recognize unusual or
inappropriate behavior
Warns administrator of attack E.g., Detect modification or
deletion of special files
Hacking Defense:
IDS/IPS Intelligence Systems
NIDS:
Nasty
Virus
ALARM!!!
Attacks:
Nasty
Virus
BlastWor
Normal
m Statistical-Based:
The expected behavior of the system is
understood
If variations occur, they may be attacks
(or maybe not)
Signature-Based: Neural Networks:
Specific patterns are recognized as Statistical-Based with self-learning (or
attacks artificial intelligence)
Recognizes patterns
Hacking Defense:
WAF
SQL injection
Cross-site scripting
Local File Inclusion
Remote File Inclusion
Remote Code Execusion
PHP Code Inclusion
….
Hacking Defense:
Web Proxy (Web Gateway)
A forward proxy server: a web server that
acts as a gateway between a client
application (e.g. a browser), and the real
server.
makes requests to the real server on behalf
of the client, two purposes: to filter
requests (monitor, block) and improve
performance (caching external site
content).
A reverse proxy server: pass on requests
from web clients to web servers; load
balancing, IP masking, traffic scrubbing
(DDoS mitigation, wep app sec), content
caching-rapid content delivery
Hacking Defense:
Honeypot & Honeynet
Honeypot: A system with a special software application which
appears easy to break into
Honeynet: A network which appears easy to break into
Purpose: Catch attackers
All traffic going to honeypot/net is suspicious
If successfully penetrated, can launch further attacks
Must be carefully monitored
Firewall
Honey External IDS Web E-Commerce VPN
DNS Server Server
Pot
Hacking Defense:
Vulnerability Assessment
* Scan servers, work stations, and control devices for vulnerabilities
* Open services, patching, configuration weaknesses
* Testing controls for effectiveness
* Adherence to policy & standards
* Penetration testing
Path of Logical Access
How would access control be improved?
Border Router/
Firewall
The Internet
De-Militarized
Zone
Firewall
WLAN
Private Network
Protecting the Network
Border Router: Packet Filter
The Internet
De-Militarized
Zone
WLAN
Firewall
Private Network
End User Security Systems
Host FW
Host IPS
Anti Virus, Endpoint Security Systems
Endpoint Detection and Response (EDR)
DLP
Sandbox
Application Control
Encryption
…