Uploaded by Tolu Adesanya

Jason Cyber Security

advertisement
© 2022/2023
Cyber Security:
An introduction
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
welcome to CO558 & CO634!
Modules’ focus areas:
• Cyber/Computer
Security topics
by
Jason R.C. Nurse
• Cryptography topics
by
Carlos Perez Delgado
Jason R.C. Nurse | @jasonnurse
2
welcome to CO558 & CO634!
Modules’ focus areas:
• Cyber/Computer
Security topics
by
Jason R.C. Nurse
• Cryptography topics
by
Carlos Perez Delgado
Jason R.C. Nurse | @jasonnurse
3
welcome to cyber security!
Our goals
• have an understanding of the threats faced by computer
operating systems, applications and networks and the various
countermeasures that can be used
• be able to make informed choices of the appropriate security
measures to put into place for a given network and/or operating
system
Jason R.C. Nurse | @jasonnurse
4
5
Report: Travelex paid hackers $2.3 million worth of Bitcoin after
ransomware attack https://grahamcluley.com/travelex-paid-ransom/
Jason R.C. Nurse | @jasonnurse
Ukraine cyber-attack: Russia to blame for hack, says Kyiv
https://www.bbc.co.uk/news/world-europe-59992531
6
Newcastle University, neighbouring Northumbria hit by ransomware attacks.
https://www.theregister.com/2020/09/08/newcastle_northumbria_universities_cyber_attack/
Jason R.C. Nurse | @jasonnurse
7
Newcastle University, neighbouring Northumbria hit by ransomware attacks.
https://www.theregister.com/2020/09/08/newcastle_northumbria_universities_cyber_attack/
Jason R.C. Nurse | @jasonnurse
8
Exams cancelled after Northumbria University cyber attack https://www.itpro.co.uk/security/cyberattacks/356965/northumbria-university-shutdown-after-cyber-attack
Jason R.C. Nurse | @jasonnurse
9
Northumbria Uni Campus Closed After Serious Cyber-Attack https://www.infosecuritymagazine.com/news/northumbria-uni-campus-closed/
Jason R.C. Nurse | @jasonnurse
10
https://www.ncsc.gov.uk/collection/10-steps
Jason R.C. Nurse | @jasonnurse
which of these is the ‘best’ password?
A. $tarwars
B. kent.SU2018
C. Frank2000
D. bij$223jOIUnKhe
E. p4$$w0rd
Jason R.C. Nurse | @jasonnurse
11
13
useful books
More in module specification & reading list
Security Engineering: https://www.cl.cam.ac.uk/~rja14/book.html
Jason R.C. Nurse | @jasonnurse
14
useful online resources
Katie
Moussouris
@jasonnurse
Jason R.C. Nurse | @jasonnurse
15
lecture outline
• Lecture 1: Introduction to Cyber Security (part 1)
• Lecture 2: Introduction to Cyber Security (part 2)
• Lecture 3: Security Risk Management
• Lecture 4: Cybercrimes and Adversarial Behaviours (part 1)
• Lecture 5: Cybercrimes and Adversarial Behaviours (part 2)
• Lecture 6: Authentication, Authorisation and Access control
• Lecture 7: Symmetric and Asymmetric Authentication
• Lecture 8: Security Controls
• Lecture 9: Legal, ethical and professional aspects
• Lecture 10: Usable Security
Jason R.C. Nurse | @jasonnurse
my module assessment
• CO558
§ 25% of module mark
§ Understanding security concepts and their application
§ Quiz class/take home
Jason R.C. Nurse | @jasonnurse
16
a gentle warning/disclaimer…
17
• Interactivity
§ Lectures are not one way, I’ll expect you (all) to talk to me*.
• Humour
§ I use humour, irony and satire in lectures!
§ Laughter is not required, but I’d appreciate it… XD
• Ethics
§ I do not agree with cybercriminals, pity their victims, and support (and cooperate)
with law enforcement, and so should you!
§ If I say anything apparently contradicting these basic principles, check the Humour
point above.
• Extra study
§ You are expected to do your own reading on the topics we cover in the lectures, e.g.,
following up on references, links, etc. and using reading lists.
* Any problems with this, please come to me directly and let me know.
Jason R.C. Nurse | @jasonnurse
18
introduction outline
• What is security?
• Security properties
• Security services
• Security attacks
Jason R.C. Nurse | @jasonnurse
19
what is (computer) security?
In your words, what is security?
What does computer security mean to you?
Jason R.C. Nurse | @jasonnurse
20
what is (plain, old) security?
“The state of being free from danger or threat.”
[Oxford Dictionary]
“Security refers to all the measures that are taken to
protect a place, or to ensure that only people with
permission enter it or leave it.”
[Collins Dictionary]
Jason R.C. Nurse | @jasonnurse
what is computer security (1): properties
“The protection afforded to an automated information system
in order to attain the applicable objectives of preserving the
integrity, availability, and confidentiality of information system
resources
(includes
hardware,
software,
firmware,
information/data and telecommunications.)”
[NIST Computer Security Handbook, 1995]
Jason R.C. Nurse | @jasonnurse
21
22
the CIA Triad
A common definition of a secure system is one that achieves:
Confidentiality
Only authorized parties can access, or even know about the existence of, a
particular asset
Integrity
Only authorized parties can modify, create, and delete assets
Availability
Ensure denial of service does not happen
Not only: also redundancy, load balancing, etc.
Jason R.C. Nurse | @jasonnurse
23
confidentiality
… is preventing unauthorized disclosure of information. Includes
secrecy, privacy
Everyone has something to hide/protect
Data confidentiality
Communication confidentiality
Encryption and Dummy traffic is part of the solution
Jason R.C. Nurse | @jasonnurse
24
integrity
… is preventing unauthorized modification of data and systems
Information accuracy
E.g. you should be able to check the message received has not been
modified during transmission
Hash functions useful here
Authentication, Encryption is part of the solution
Also includes originality and timeliness
satisfy yourself that the message indeed
comes from a real Author i.e. not has been
intercepted and altered during transmission
or sent by someone else
Jason R.C. Nurse | @jasonnurse
25
availability
… is preventing downtime of systems or inability to access data/information
Sometimes system availability is critical – think about aviation, or
healthcare
There are an increasing number of denial-of-service attacks. Most
certainly one of the most popular cyber-attacks today. Botnets using
DoS have taken down BBC, Reddit, Amazon, PayPal…
Firewalls (IP filtering), load-balancing systems are part of the solution
Jason R.C. Nurse | @jasonnurse
26
some other factors
Authentication is the process of confirming the truth or correctness of the
claimed artefact or identity
Authorisation is the process of granting permission to someone/thing do
some action (e.g., access files)
Non-repudiation is the ability for parties to prove that a message has been
sent by a specific person, and received by a specific person. Therefore
neither party can claim they did not send/receive the message.
What’s an example of a scenario where Non-repudiation is important?
Jason R.C. Nurse | @jasonnurse
what is computer security (2)
Freedom from undesirable events in a system
accidental or malicious
A measure of how well a system resists misuse
Insider (e.g., disgruntled employee) or outsider (e.g., hacker)
For a given model of the adversary & only that
Firewalls ‘great’ for protecting against hackers, but useless against a threat
on the inside
Some password systems rely on the fact that attackers have bounded
computational power.
Jason R.C. Nurse | @jasonnurse
27
computer security, information security,
ICT security, cyber security
Is there a difference?
If there is, what is it?
Jason R.C. Nurse | @jasonnurse
28
computer security, information security, ICT
security, cyber security
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers & security, 38, pp.97-102.
Jason R.C. Nurse | @jasonnurse
29
cyber security in more detail
Cyber security is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber
environment and organization and user’s assets.
Organisation and user’s assets include connected computing devices,
personnel, infrastructure, applications, services, telecommunications systems,
and the totality of transmitted and/or stored information in the cyber
environment.
Cyber security strives to ensure the attainment and maintenance of the
security properties of the organization and user’s assets against relevant
security risks in the cyber environment.
Jason R.C. Nurse | @jasonnurse
30
31
activity – 1
• Security stories from last few years
• Split lecture hall into 4 sections, each section has a different story
• Read and discuss your security story; find more info online !!
Be prepared to feedback on:
• Summarise story: what happened?
• Identify the key security property (confidentiality, integrity, availability)
• Was it accidental/malicious, internal/external?
Jason R.C. Nurse | @jasonnurse
32
activity – 1
• Equifax Breach
(https://www.theregister.com/2018/05/08/equifax_breach_may_2018/)
• NHS & WannaCry (https://www.nao.org.uk/report/investigation-wannacrycyber-attack-and-the-nhs/)
• Colonial Pipeline attack (https://krebsonsecurity.com/tag/colonial-pipelineransomware-attack/)
• Irish Health Service cyber-attack (https://www.bbc.co.uk/news/worldeurope-57184977)
Jason R.C. Nurse | @jasonnurse
34
The End of Part 1!
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
35
next time…
Cyber Security:
An introduction – part 2
Jason R.C. Nurse | @jasonnurse
© 2022/2023
Cyber Security:
An introduction – part 2
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
outline
• What is security?
• Security properties
• Security services
• Security attacks
Jason R.C. Nurse | @jasonnurse
3
but first…
What are the 3 main security properties?
How is computer security different to cyber security?
Jason R.C. Nurse | @jasonnurse
4
activity – 1
• Equifax Breach (https://www.theregister.com/2018/05/08/equifax_breach_may_2018/)
• NHS & WannaCry (https://www.nao.org.uk/report/investigation-wannacry-cyber-attackand-the-nhs/)
• Colonial Pipeline attack (https://krebsonsecurity.com/tag/colonial-pipeline-ransomwareattack/)
• Irish Health Service cyber-attack (https://www.bbc.co.uk/news/world-europe-57184977)
Be prepared to feedback on:
• Summarise story: what happened?
• Identify the key security property (confidentiality, integrity, availability)
• was it accidental/malicious, internal/external?
Jason R.C. Nurse | @jasonnurse
5
why is security hard to get right?
Jason R.C. Nurse | @jasonnurse
6
why is security hard to get right?
Jason R.C. Nurse | @jasonnurse
7
why is security hard to get right?
Properties simple, mechanisms complex!
•
Attacks “outside the box”
§
•
Arms race
§
•
Attackers focus on them
Resistance against overheads
§
•
Between designers and attackers
Weakest links
§
•
Things never tough or planned before
the "human factor", Social engineering
Development as an “add-on”
§
Security included last, long after functionality
Jason R.C. Nurse | @jasonnurse
8
a bit of “fun”
• Attacks outside the box, weakest link & human factor
http://xkcd.com/538/
Jason R.C. Nurse | @jasonnurse
9
a reality with security
“Information security is, in the terms of the cliche, a journey, not a
destination”
Alan Calder and Steve Watkins
“Security is not a problem that you ever fully solve”
Mark Zuckerberg
“If you think technology can solve your security problems, then you don’t
understand the problems and you don’t understand the technology”
Bruce Schneier
Jason R.C. Nurse | @jasonnurse
10
vulnerabilities, threats, attacks, controls (an intro)
•
Vulnerability
§
•
Threat
§
•
Circumstances or events that could potentially lead to harm or loss
Attack
§
•
Weakness in the system, could originate from design, implementation, context,
…
Attempt to exploit a vulnerability
Control
§
§
Used to remove or limit the vulnerability
Action (disconnect), device (firewall), or a procedure (disaster recovery plan)
We revisit these terms later in the module…
Jason R.C. Nurse | @jasonnurse
11
activity – 2
From your security story, can you tell me:
§ what was the weakness of the system? (vulnerability)
§ what occurred that led to the harm/loss? (threat)
§ how was the weakness exploited? (attack)
§ were any control measures in play? (control)
Jason R.C. Nurse | @jasonnurse
12
security attacks, and their types
Interruption
Interception/eavesdropping
Modification
Fabrication
Jason R.C. Nurse | @jasonnurse
13
security attacks, and their types
Interception/Eavesdropping
An unauthorised party gains access to an asset
Access to confidential information
Copying copyrighted material (software, music)
Hardware stolen (e.g. smart cards, laptop, phone)
Interruption
An asset is destroyed or becomes unavailable
Hardware device, Software or data
Network attacks (e.g. denial of service)
Operating system (security loopholes, CPU bomb, etc.)
Jason R.C. Nurse | @jasonnurse
14
security attacks, and their types
Modification
An unauthorised party modifies an asset
Changing values in a data file or a database (e.g. bank account)
Altering a program (e.g. viruses)
Changing message content (e.g. email…)
Fabrication
An unauthorized party inserts counterfeit objects into the system
Messages inserted into network (bogus email for ‘phishing’
websites)
Add records to a database (e.g. fictional employees on a payroll)
Jason R.C. Nurse | @jasonnurse
15
attacker types
Amateurs – Script Kiddies
Not necessarily specialists
Crackers
Use the knowledge of an underground community
Hacktivists
Hacking for a cause
Terrorists
Can you think of any others?
Jason R.C. Nurse | @jasonnurse
16
computer and network incident taxonomy
A Common Language for
Computer Security
Incidents"; John D.
Howard & Thomas A.
Longstaff; Sandia
National Laboratories
Jason R.C. Nurse | @jasonnurse
17
activity - 3
From your security story, can you tell me:
§ what kind of attack was put in place (interception,
interruption, modification, fabrication)
§ who was the attacker (amateurs, cracker, hacktivist, terrorist)
Jason R.C. Nurse | @jasonnurse
18
security services
1. Confidentiality, traffic confidentiality
2. Integrity: data integrity, originality, timeliness
3. Authentication, authorization, access control
4. Availability
5. Nonrepudiation
Jason R.C. Nurse | @jasonnurse
19
why do we need security?
E.g., you buy an item from Amazon using a credit card
What are the possible attacks on this transaction?
Jason R.C. Nurse | @jasonnurse
20
why do we need security?
E.g., you buy an item from Amazon using a credit card
What are the possible attacks on this transaction?
An adversary could eavesdrop on the transaction
§ A protocol that prevents this by using encryption technique provides
“confidentiality”
§ Concealing the quantity or destination of communication is called “traffic
confidentiality”
Jason R.C. Nurse | @jasonnurse
21
why do we need security?
Even encrypted, an adversary could modify the message: bitflipping attack
§ A protocol that detects such message tampering provides “data
integrity”
The attacker could send extra copies of your message: replay
attack
§ A protocol that detects replays is said to provide
uniqueness/freshness
Jason R.C. Nurse | @jasonnurse
22
why do we need security?
Even with originality guaranteed, an adversary could intercept
your message and retransmit it with a delay
§ A protocol that detects such delaying provides “timeliness”
Data integrity, originality, and timeliness constitute different
aspects of “integrity”
Jason R.C. Nurse | @jasonnurse
23
why do we need security?
You could be directed to a fake web site
§ “Phishing” attack
§ “DNS cache poisoning” attack
§ A protocol that ensures that you are talking to whom you
think you are talking provides “authentication”
§ Authentication is important for both sides of the
communication (mutual auth.)
Jason R.C. Nurse | @jasonnurse
24
why do we need security?
Amazon can be attacked as well
A legitimate user could be authenticated and then remove files
from their server
§ A protocol that controls the access rights of users before granting
them access is said to provide “authorisation/access control”
An attacker could flood Amazon with a big number of requests;
customers will not be served: Denial of Service (DoS) attack
§ A protocol that ensures a degree of access provides “availability”
§ Distributed Denial-of-Service(DDoS) - is common
Jason R.C. Nurse | @jasonnurse
25
why do we need security?
Amazon or the customer could unilaterally deny that an order
was placed: Repudiation
§A protocol that can disprove bogus claims or denials provides
“Nonrepudiation”
Jason R.C. Nurse | @jasonnurse
26
why do we need *better* security?
Here’s an example of how hackers hack you using carefully
crafted social engineering attacks
https://www.youtube.com/watch?v=lc7scxvKQOo
Jason R.C. Nurse | @jasonnurse
27
The End!
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
28
next time…
Security Risk
Management:
The context for applying
appropriate security…
Jason R.C. Nurse | @jasonnurse
29
Security Risk
Management:
The context for applying
appropriate security…
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
© 2022/2023
but first…
• What did we cover in the last lecture?
• What types of security attacks are these?
• Adding files to data server
• Using a network sniffer to gather passwords
• What are the security services?
Jason R.C. Nurse | @jasonnurse
2
outline
• What is security risk?
• What is security risk management?
• What are its main processes?
• What are some of the challenges
facing risk management today?
Jason R.C. Nurse | @jasonnurse
3
risk
How would you define risk generally?
What are some of the key elements that constitute risk?
Jason R.C. Nurse | @jasonnurse
4
security risk defined
Here are three definitions of security risk:
1. mathematical probability of occurrence of a threatening event
2. the qualitative evaluation of the combination of threat, vulnerability and
impact for a given state of a system
3. A measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of: (i) the adverse impacts
that would arise if the circumstance or event occurs; and (ii) the
likelihood of occurrence
Definition 3 is preferred... It’s from NIST SP800-30 R1*.
*Guide for Conducting Risk Assessments https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
Jason R.C. Nurse | @jasonnurse
5
security risk as a function
http://www.digitalthreat.net/wp-content/uploads/2009/06/risk-definition.jpg
http://dathq.com/portals/3/final%20risk.png
http://newschoolsecurity.com/wp-content/uploads/2010/09/landscapes.png
Jason R.C. Nurse | @jasonnurse
6
new definitions
You already know:
• Vulnerability, Threat, Attack, Control (see Lecture 1)
What you might not know:
• asset: something of value to the organisation
• impact/harm: negative consequences for an asset, e.g.
• undesired exposure of stored information
• unavailability of a service
• attack probability: the likelihood that an attack will take place
Jason R.C. Nurse | @jasonnurse
7
outline
• What is security risk?
• What is security risk management?
• What are its main processes?
• What are some of the challenges
facing risk management today?
Jason R.C. Nurse | @jasonnurse
8
security risk management
• two dictionary definitions of “manage”
1. to succeed in being able to do something
2. to exercise control over something
• meaning 2 is stronger than meaning 1
• “risk management” could just mean solving security problems in an
ad-hoc fashion
• but it’s much, much more…
• it should also be controllable and rigorous
Jason R.C. Nurse | @jasonnurse
9
security risk management
“Security risk management is a comprehensive process
that requires organizations to frame risk (i.e., establish
the context for risk-based decisions); assess risk; respond
to risk once determined; and monitor risk on an ongoing
basis …”
NIST Special Publication 800-39 Managing Information
Security Risk Organization, Mission, and Information System View
Jason R.C. Nurse | @jasonnurse
10
security risk management lifecycle
Identify
Analyse
Monitor
Treat
Jason R.C. Nurse | @jasonnurse
From Information
Security
Management
Principles, Andy
Taylor (ed)
11
security risk management lifecycle
Identify
Analyse
Monitor
Treat
Jason R.C. Nurse | @jasonnurse
From Information
Security
Management
Principles, Andy
Taylor (ed)
12
identify security risks
http://dathq.com/portals/3/final%20risk.png
First start thinking about what are the assets that are important to you, what
are the threats they may face, and what are the vulnerabilities that may be
exploited.
Jason R.C. Nurse | @jasonnurse
13
identify key assets
an asset is broadly defined as something valuable:
• money
• physical possessions
• information
• a facility, e.g. machinery or computer
• people
• intangibles, such as reputation
which one do you think is the most valuable to an organisation?
which one is most valuable to you?
Jason R.C. Nurse | @jasonnurse
14
identify security risks
For the critical assets:
• identify vulnerabilities in the assets
• define threats/attacks and relate to vulnerabilities
• define threat x vulnerability pairs to characterise the
risk. These will feed into the next risk management
stage
Jason R.C. Nurse | @jasonnurse
15
security risk statements
• A security risk statement is a method of presenting related
information in the expression of a security risk
The Security Risk Assessment Handbook, Douglas Landoll
Jason R.C. Nurse | @jasonnurse
17
security risk management lifecycle
Identify
Analyse
Monitor
Treat
Jason R.C. Nurse | @jasonnurse
From Information
Security
Management
Principles, Andy
Taylor (ed)
18
analysing security risks
For the each risk identified:
• determine its probability of occurrence (which is
informed by the threat/attack)
• define the impact/harm/loss to the related asset(s)
• combine probability and impact/harm/loss to determine
the risk rating
Jason R.C. Nurse | @jasonnurse
19
analysing security risks
• What is the level of each risk, in terms of
impact/harm/loss and probability?
Jason R.C. Nurse | @jasonnurse
Impact
Probability
Risk level
?
?
?
?
?
?
20
impact valuation – factors
• full impact valuation can be difficult to carry out
• factors contributing to impact include:
1. loss of confidentiality
• legal implications, e.g. General Data Protection Regulation
• personal implications
• loss of competitiveness, e.g. commercial formula
2. loss of integrity / unavailability
• costs of lost work
• recovery costs
3. indirect harm: impact on intangibles
• brand, reputation
Jason R.C. Nurse | @jasonnurse
21
attack probability – factors
• probability of attack is estimated based on:
• Organisational experience
• Published reports, e.g. CERT, NIST, ENISA
• Likely to be a high frequency of attacks if systems
visible from the Internet, e.g., Web servers
• Estimated cost of attack
• Expensive attacks are less likely (e.g. brute-force attacks on encryption
keys)
• Attractiveness of target
• High publicity value
• High criminal value
• Vulnerability exposure
• How accessible are their systems
• How likely is it that there are weaknesses in those systems
Jason R.C. Nurse | @jasonnurse
22
analysing security risks
What’s the likelihood of a hacker attacking, and the
impact if they compromise the following companies?
(1-2 mins)
Jason R.C. Nurse | @jasonnurse
23
qualitative versus quantitative
• qualitative risk analysis
• highly subjective
• hard to baseline
• Imprecise
• But… easy to communicate
https://www.gov.uk/terrorism-national-emergency/terrorism-threat-levels
Jason R.C. Nurse | @jasonnurse
24
qualitative versus quantitative
• quantitative risk analysis
• difficult to be confident above some values
• very challenging to quantify value of loss when so much is
intangible (e.g. loss to reputation)
• precise monetary values can give false precision
Single Loss Expectancy is the expected monetary loss every time a
security risk occurs.
£25,000
£75,000
…per risk...!
£100,000
requires excellent
knowledge of
asset and attacks,
& way of mapping
asset value loss
25%
£25,000
Jason R.C. Nurse | @jasonnurse
3
based on
historic events
25
security risk management lifecycle
Identify
Analyse
Monitor
Treat
Jason R.C. Nurse | @jasonnurse
From Information
Security
Management
Principles, Andy
Taylor (ed)
26
security risk evaluation & treatment
• the process by which the risks output from the assessment are balanced
and prioritised, and the response identified:
• Avoid: no longer engaging in the activity
• Mitigate: attempt to limit the probability and/or impact
• Transfer: moving the responsibility to a 3rd party e.g., the new trend
towards cyber insurance
• Accept: live with it
• as this is a cost / benefit decision some knowledge of potential
mitigations is required
• guiding principle is that controls should be commensurate with the risks
they protect against
Jason R.C. Nurse | @jasonnurse
27
security controls
• security controls as described before (Lecture 1) are used to
mitigate/reduce attacks or threats, and their impact
• types of control:
• preventive
• detective
• reactive
• corrective - actively reduces impact
• recovery - restores the asset after impact
• detection + reaction + timeliness ->>> prevention
What are some examples of these?
Jason R.C. Nurse | @jasonnurse
28
security risk management lifecycle
Identify
Analyse
Monitor
Treat
Jason R.C. Nurse | @jasonnurse
From Information
Security
Management
Principles, Andy
Taylor (ed)
29
monitoring and audit
• continuous monitoring of security risk aspects:
• log and audit network activity and security appliance alerts to
maintain situational awareness
Jason R.C. Nurse | @jasonnurse
30
http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
monitoring and audit
• continuous monitoring of security risk aspects:
• monitor trends in threat
• monitor attack surface and vulnerability posture
“
Of course, all of this could have been avoided if security patches
had been applied to protect the Windows 7 systems common
throughout the NHS. Once again, there had been warnings sent out
by NHS Digital, but many trusts failed to act upon them - though in
that they were no different from many organisations around the
world that were also hit.
Jason R.C. Nurse | @jasonnurse
”
31
outline
• What is security risk?
• What is security risk management?
• What are its main processes?
• What are some of the challenges
facing risk management today?
Jason R.C. Nurse | @jasonnurse
32
risk management challenges
• the following are quite difficult problems:
• valuation of assets
• how to accurately value data, software & intangibles?
• likelihood of impact/harm
• how relevant is past data to future probabilities?
• the nature of future attacks is unpredictable
• resulting assessment of risk
• if data used to define risk and risk levels is uncertain, how certain can we
be about the resulting risk level ?
• how does risk assessment relate in new forms of technology e.g., Internet
of Things, or Artificial Intelligence?
• risk treatment contains subjectivity
• which risks to treat, which to accept? What are best controls?
Jason R.C. Nurse | @jasonnurse
33
summary
• What is security risk?
• What is security risk management?
• What are its main processes?
• What are some of the challenges facing risk
management today?
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
34
next time…
Cybercrimes and
adversarial behaviours:
Cyber-attacks, attackers, and techniques
Cybercrimes and
adversarial behaviours :
© 2022/2023
Cyber-attacks, attackers, and
techniques
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
1
but first…
• What did we cover in the last lecture?
• What is a security risk, and what are it’s main factors?
• Qualitative risk analysis is easier than quantitative
risk analysis: true or false?
Jason R.C. Nurse | @jasonnurse
2
outline
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques
Jason R.C. Nurse | @jasonnurse
3
cybercrime – what is it?
What do you think it is?
(Work in pairs to find a one-sentence definition)
Jason R.C. Nurse | @jasonnurse
4
cybercrime – what is it?
• … any crime that involves a computer and a network
• ... any crime that can be conducting using a computer or
network
• … any crime (traditional or new) that can be conducted or
enabled through, or using, digital technologies.
Jason R.C. Nurse | @jasonnurse
5
cybercrime – types
One way to think about characterising cybercrime:
Crime in the
technology
Crime against the
technology
Crime using the
technology
• covers content in
computers
• e.g., pornographic
material related to
minors
• covers the integrity
of computers and
networks
• e.g., DDOS attacks
• crimes committed
using networked
computers
• e.g., Phishing
campaigns
Wall, D.S.: Policing cybercrimes: Situating the public police in networks of security within cyber-space.
Police Practice and Research 8(2), 183–205 (2007)
Jason R.C. Nurse | @jasonnurse
6
cybercrime – types
Another way to think about characterising cybercrime:
Computer-dependent crimes
Computer-enabled crimes
can only be committed
using computers and
networks (e.g., hacking,
malware, ransomware,
DDoS)
traditional crimes that are
enhanced in scale and
reach using computers
(e.g., online fraud, data
theft, phishing)
Home Office. (2013) Cyber crime: A review of the evidence
Research Report 75
Jason R.C. Nurse | @jasonnurse
7
cybercrime – context
2016… “You are now 20 times more likely to be robbed while at your
computer by a criminal based overseas than held up in the street,
new figures have revealed.”
Now…
If it were measured as a country, then cybercrime … would be the world’s
third-largest economy after the U.S. and China.
Cybersecurity Ventures expects global cybercrime costs to grow by 15
percent per year over the next five years, reaching $10.5 trillion USD annually
by 2025, up from $3 trillion USD in 2015. This represents the greatest transfer
of economic wealth in history, risks the incentives for innovation and
investment, is exponentially larger than the damage inflicted from natural
disasters in a year, and will be more profitable than the global trade
of all major illegal drugs combined.
3
Jason R.C. Nurse | @jasonnurse
8
8
outline
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques
Jason R.C. Nurse | @jasonnurse
9
adversaries and attackers (extends lecture 2)
Amateurs – Script Kiddies
Not the ‘traditional criminals’
Crackers
Use the knowledge of an underground community
Cybercriminals
Can you list
examples of
each type?
Cyber-enabled and cyber-dependent criminals
Hacktivists
Hacking for a political/ideological cause
Cyber-terrorists
Conduct terror/extreme attacks to cause harm/destruction
Nation State actors
Typically regarded as the most powerful group
(Insider threats
Insider that conduct attacks against their organisation
May be within the cybercriminal group)
Jason R.C. Nurse | @jasonnurse
10
adversaries and attackers
MageCart Syndicate
DarkSide
Lazarus Group
Shadow Brokers
Can you list a significant attack conducted by each of these groups?
Jason R.C. Nurse | @jasonnurse
11
adversaries and attackers
Jason R.C. Nurse | @jasonnurse
12
outline
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques
Jason R.C. Nurse | @jasonnurse
13
attacks and techniques
Social
engineering
Online
harassment
Identityrelated
crimes &
online fraud
Hacking
Denial of
service and
information
Which do you think is the most common?
4
Jason R.C. Nurse | @jasonnurse
14
social engineering
Social
engineering
Phishing emails
Identity- are responsible for
Denial of
Online
related
service and
about 91 percent
ofHacking
cyber attacks.
Harassment
crimes &
fraud
information
https://cofense.com/enterprise-phishing-susceptibility-report/
4
Jason R.C. Nurse | @jasonnurse
15
0day = zero day = vulnerability/exploit known to someone,
but unknown to those who should be protecting against it.
4
Jason R.C. Nurse | @jasonnurse
16
Social Engineering involves applying
deceitful methods to coerce individuals
into behaving certain ways or performing
some task…
Jason R.C. Nurse | @jasonnurse
17
https://www.youtube.com/watch?v=NiCyaFcs9qI
Jason R.C. Nurse | @jasonnurse
18
Jason R.C. Nurse | @jasonnurse
19
Jason R.C. Nurse | @jasonnurse
20
Jason R.C. Nurse | @jasonnurse
21
Jason R.C. Nurse | @jasonnurse
22
“Currently I happen to be travelling home on a ticket that is half the price of a
valid ticket for this journey, even though the ticket inspector has ‘checked my
ticket’.
A relatively well-known technique, particularly amongst magicians, is to distract
you at a key moment in order to misdirect your attention. In this case the key
moment is the specific point when the inspector views the (invalid) ticket. Using
the knowledge that we shall we exploring in Section 2, I understand that the
inspector will see what he expects to see, and if I asked a question at precisely
the right time, he is very likely to subconsciously carry on with the inspection,
whilst consciously thinking about my question. In this case, the question was
simply to ask what time we were due to reach our final destination. I also
offered a subtle command to his subconscious, when finding the ticket in my
shirt pocket, and offering it to him accompanied by the instruction ‘this is the
right ticket’.”
Mann, I., 2008. Hacking the Human: Social Engineering
Techniques and Security Countermeasures
11
Jason R.C. Nurse | @jasonnurse
23
Jason R.C. Nurse | @jasonnurse
24
Scammers Are Using QR
Codes to Plunder Parking
Meter Payments
The scam has hit several major
Texas cities already.
https://gizmodo.com/scammers-are-using-qr-codes-to-plunderparking-meter-pa-1848347940
https://twitter.com/SATXPolice/status/1473025923951775755
Jason R.C. Nurse | @jasonnurse
25
Jason R.C. Nurse | @jasonnurse
26
online harassment
Social
engineering
Online
harassment
Roughly four-in-ten Americans have
Identitypersonally
experienced online
Denial of
related
harassment, and
62% consider
it a
Hacking
service and
crimes &
information
major
fraud problem. Many want
technology firms to do more, but
they are divided on how to balance
free speech and safety issues online
https://www.pewinternet.org/2017/07/11/online-harassment-2017/
Jason R.C. Nurse | @jasonnurse
27
Jason R.C. Nurse | @jasonnurse
28
Online harassment can broadly be
regarded as the targeting of individuals
with unwanted / unsolicited terms or
actions.
4
Jason R.C. Nurse | @jasonnurse
29
What are the main types of online harassment?
(Work in groups of three to define a set of main types)
Jason R.C. Nurse | @jasonnurse
30
Anyone know what this
stands for, or its origin?
Sextortion &
revenge porn
Origin of troll face:
The Trollface was
originally drawn by
Carlos Ramirez, an
Oakland-based artist
known by his
DeviantART handle
Whynne, as part of a
MS Paint webcomic
about the pointless
nature of trolling on
4chan's /v/ (video
games) board.
https://ryersonjournalism.ca/tag/online-harassment/
4
Jason R.C. Nurse | @jasonnurse
31
Trolling is the action of posting inflammatory messages
deliberately with the intention of being disruptive, starting
arguments, and upsetting individuals.
Four groups of trolls:
1. Haters – Like to inflame situations for no real benefit to others
2. Lolcows – Like to provoke others so the attention is on them
3. Bzzzters – Like to chat regardless of accuracy or usefulness of contributions
4. Eyeballs – Like to watch what others do for the ‘opportune’ moment to
post a provocative message
Bishop, J. (2014). Dealing with Internet Trolling in Political Online Communities: Towards the This
Is Why We Can't Have Nice Things Scale. International Journal of E-Politics (IJEP), 5(4), 1-20.
Jason R.C. Nurse | @jasonnurse
32
Cyberbullying is ‘‘an aggressive, intentional act carried out by a
group or individual, using electronic forms of contact, repeatedly
and over time against a victim who cannot easily defend him or
herself.”
Main components to this definition:
1. aggressive,
2. intentional,
3. repetitive, and
4. with a power imbalance.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N.
(2008). Cyberbullying: Its nature and impact in secondary school pupils.
Journal of Child Psychology and Psychiatry, 49, 376–385.
Jason R.C. Nurse | @jasonnurse
33
Sextortion is the gathering of sexual images or video its use to
blackmail individuals for further sexual footage or other favours.
Hi, victim. I write yоu becаusе I put а mаlware оn the wеb раge with porn
whiсh yоu hаve visitеd. My virus grаbbed all your рersonal infо аnd turnеd on
yоur сamеrа which сaрtured the рroсеss оf your onаnism. Just aftеr that the
soft savеd yоur соntaсt list.I will dеlеte thе сompromising video and infо if you
pаy me 999 USD in bitcoin. This is address fоr рaymеnt : xx give yоu 30 hоurs
aftеr you ореn my mеssаge for making the trаnsactiоn. As sоon аs yоu reаd
the mеssаgе I'll see it right awаy. This address is соnneсtеd tо yоu, my systеm
will dеlete еverything automаtically aftеr trаnsfer соnfirmаtiоn. If yоu nееd 48
h just reрly оn this letter with +.Yоu сan visit thе pоlicе stаtion but nobоdy cаn
hеlp yоu. Dоnt fоrget аbоut thе shame and tо ignore, Yоur life can be ruined.
Sextortion (cyber-enabled blackmail)
Jason R.C. Nurse | @jasonnurse
34
https://www.gov.uk/government/consultations/online-harms-white-paper
Jason R.C. Nurse | @jasonnurse
35
identity-related crimes & online fraud
Online fraud is now the
most
common crime
Social
Online in
the
country with
almost
engineering
harassment
one in ten people
falling victim, the latest
figures have revealed.
(2017)
Identityrelated
crimes &
online fraud
Over £63m was
Denial of
lost nationally
Hacking
serviceby
and
victims of information
investment fraud
(2021)
https://www.telegraph.co.uk/news/2017/01/19/fraud-cyber-crime-now-countrys-common-offences/
https://www.bbc.co.uk/news/uk-47016671
https://www.actionfraud.police.uk/news/new-figures-reveal-victims-lost-over-63m-to-investment-fraud-scams-on-social-media
4
Jason R.C. Nurse | @jasonnurse
36
Identity-related crimes & online fraud mainly
seek to use information about people to con
them for the criminal’s financial gain.
Jason R.C. Nurse | @jasonnurse
37
What are the main types of online fraud?
(Work in groups of three to define a set of main types)
Jason R.C. Nurse | @jasonnurse
38
Identity fraud
Account takeover
Bank card and cheque fraud
Health scams
Fraud recovery fraud
Charity donation fraud
Romance scams
Internet auction fraud
Government agency scams
Holiday fraud
Business opportunity fraud
West African or 419 scam
Event scams
Jason R.C. Nurse | @jasonnurse
39
https://www.actionfraud.police.uk/news/action-fraud-report-reveals-7-millionlost-to-holiday-fraud
Jason R.C. Nurse | @jasonnurse
40
https://www.which.co.uk/news/2019/03/thousands-targeted-by-tv-license-refund-scam/
Jason R.C. Nurse | @jasonnurse
41
A fraudster posing as the Hollywood actor ‘bombarded’ a vulnerable British fan
with WhatsApp messages begging her to transfer money. The ‘starstruck’ woman
admitted she was fooled into believing the messages were coming from Statham
himself because the con artist was reaching out via a Facebook fanpage
dedicated to The Transporter star.
After grooming the woman, the con artist requested that she transfer money via
Western Union to cover wages for Jason’s latest film that it had been ‘delayed’.
https://metro.co.uk/2019/04/30/fraudster-posing-jason-statham-scams-100kvulnerable-woman-online-fan-page-9352173/
Jason R.C. Nurse | @jasonnurse
42
42
Jason R.C. Nurse | @jasonnurse
43
43
summary
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques (partially)
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
44
next time…
Cybercrimes and
adversarial behaviours:
Cyber-attacks, attackers, and techniques
(part 2)
45
Cybercrimes and
adversarial behaviours :
© 2022/2023
Cyber-attacks, attackers, and
techniques – part 2
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
1
but first…
• What’s the difference between the following?
• Computer-dependent crimes
• Computer-enabled crimes
• How does social engineering work? What are some examples
of common social engineering attacks?
Jason R.C. Nurse | @jasonnurse
2
outline
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques
Jason R.C. Nurse | @jasonnurse
3
hacking
“I am convinced that there are
Identityonly
two
types
of
companies:
Social
Online
related
those
that have
been hacked
and&
engineering
harassment
crimes
online
fraud
those that will be. And even
they
are converging into one category:
companies that have been hacked
and will be hacked again.”
Hacking
Robert Mueller, Former Director of the
FBI
Jason R.C. Nurse | @jasonnurse
Denial of
service and
information
4
4
How would you define hacking? When I say the
word ‘hacking’, what activities comes to mind?
(Work in groups of two to define a set of main types)
Jason R.C. Nurse | @jasonnurse
5
5
“The Most Accurate Hacking Scene Ever” ;-)
https://www.youtube.com/watch?v=K7Hn1rPQouU
Jason R.C. Nurse | @jasonnurse
6
Hacking refers to activities that result in the compromise
of computing systems and/or digital information.
Jason R.C. Nurse | @jasonnurse
7
Malicious software (or malware) describes applications that compromise
the confidentiality, integrity or availability of systems and information.
The most popular types (outside of ransomware) are:
Viruses are … programs that replicate when executed and spread to other files and
systems. They are known for attaching themselves to other programs.
Worms are … similar to viruses but they are standalone and do not need to be
attached to a file. The prime purpose of worms is to self-replicate especially to
other computers on the network (e.g., a home, university, or public network).
Trojan horses … are programs that appear legitimate but have another core purpose,
which commonly is acting as a back door into computers or systems
Spyware are… programs that secretly collect information about users, which could
span from gathering specific information (e.g., passwords, banking information,
search habits
What aspects of CIA relate to each?
Jason R.C. Nurse | @jasonnurse
8
Password hacking & account
takeover…
What are the ways that an attacker
could find out a company or user’s password?
Informed guessing
20
19
20
19
20
18
Guessing
https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-ukcyber-survey-exposes-gaps-in-online-security
Jason R.C. Nurse | @jasonnurse
9
Password hacking & account
takeover…
Eavesdropping
What are the ways that an attacker
could find out a company or user’s password?
Password hacking tools
Public
Wi-Fi
Cain and Abel
Jason R.C. Nurse | @jasonnurse
10
Password hacking & account
takeover…
Kali Password Attacks | Explained https://www.youtube.com/watch?v=fPHkO6T_g8A
(in lecture: 00:48-05:07)
Jason R.C. Nurse | @jasonnurse
11
Password hacking & account
takeover…
What are the ways that an attacker
could find out a company or user’s password?
Jason R.C. Nurse | @jasonnurse
12
Cross site scripting (XSS) is a way that attackers manipulate a webpage to
serve malicious content to users that visit that page in the future
https://medium.com/@vishwaraj101/next-xss-gonna-cost-you-some-cpu-65e3b3cb998d
https://www.wired.com/story/british-airways-hack-details/
Jason R.C. Nurse | @jasonnurse
13
Cross site scripting (XSS) is a way that attackers manipulate a webpage to
serve malicious content to users that visit that page in the future
Example in a controlled environment:
https://www.google.co.uk/about/appsecurity/learning/xss/
Jason R.C. Nurse | @jasonnurse
14
denial of service / information
Social
engineering
Online
harassment
Identityrelated
crimes &
online fraud
Hacking
Denial of
service and
information
https://www.sophos.com/en-us/medialibrary/pdfs/other/aptinfographic.pdf?cmp=70130000001xIObAAM
Jason R.C. Nurse | @jasonnurse
15
A denial of service attack is one where cybercriminals
block individuals from accessing legitimate websites and
services.
This is normally achieved by bombarding the
websites/services with an enormous number of fabricated
requests (e.g., page visits), which causes legitimate
requests to be dropped or the organizations
websites/services to crash under the load.
Jason R.C. Nurse | @jasonnurse
16
Pogrebna, G. & Skilton, M. (2019) Navigating New Cyber Risks: How Businesses Can Plan,
Build and Manage Safe Spaces in the Digital Age. Springer.
Jason R.C. Nurse | @jasonnurse
17
the power of DoS attacks
The sites were down for around three-and-a-half hours. During
that time, all of the BBC’s websites — as well as online
services like the iPlayer and its news sites — were inaccessible.
2 August 2021
Jason R.C. Nurse | @jasonnurse
18
the power of DoS attacks
Jason R.C. Nurse | @jasonnurse
19
the power of DoS/DDoS attacks
Jason R.C. Nurse | @jasonnurse
20
ransomware
… type of malware that uses encryption to hold a victim's
information/systems at ransom; only allowing them to be decrypted if
some request is fulfilled (e.g., most typically, paying a ransom demand)
Significance of ransomware…
• Ransomware is the most prominent malware threat.
• Experts estimate that a ransomware attack will occur every 11 seconds in 2021.
• The average ransom fee requested has increased from $5,000 in 2018 to around
$200,000 in 2020.
• The most common tactics hackers use to carry out ransomware attacks are email
phishing campaigns, RDP vulnerabilities, and software vulnerabilities.
• On average, only 65% of the encrypted data was restored after the ransom was paid
• In 2021, the largest ransomware payout was made by an insurance company at $40
million, setting a world record.
https://secure2.sophos.com/en-us/medialibrary/pdfs/whitepaper/sophos-state-of-ransomware-2021-wp.pdf
https://www.varonis.com/blog/ransomware-statistics-2021/
Jason R.C. Nurse | @jasonnurse
21
ransomware
REvil
Jason R.C. Nurse | @jasonnurse
22
22
ransomware
Jason R.C. Nurse | @jasonnurse
23
23
ransomware: anatomy
DEMO: The Anatomy of Ransomware https://www.youtube.com/watch?v=aykf0P5Qtb8
(lecture: 03:22-08:06)
Jason R.C. Nurse | @jasonnurse
24
live cybercrimes & cyberattacks map
https://threatmap.checkpoint.com/ThreatPortal/livemap.html
https://cybermap.kaspersky.com/
https://www.fireeye.com/cyber-map/threat-map.html
Jason R.C. Nurse | @jasonnurse
25
other places worth checking out…
https://www.reddit.com/r/netsec/
https://www.reddit.com/r/hacking/
https://sectools.org/
All links are shared here for your reference and for educational purposes only. Please be mindful that
some tools are used for crime and therefore, various authorities may be taking note of their use.
Jason R.C. Nurse | @jasonnurse
26
summary
• Cybercrime – types and context
• Adversaries and attackers
• Attacks and techniques
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
27
next time…
Authentication,
Authorisation &
Access control:
Key security services
28
further reading
The following slides will be helpful at understanding
the topics discussed. You are strongly advised to read
them, and conduct your own independent research.
29
Cyber Kill Chain
• Characterising 7 stages of a
cyber-attack in a “kill chain”
(i.e., series of attack steps)
https://www.lockheedmartin.com/enus/capabilities/cyber/cyber-kill-chain.html
• What Is the Cyber Kill Chain
and How It Can Protect Against
Attacks
https://www.computer.org/publications/tech
-news/trends/what-is-the-cyber-kill-chainand-how-it-can-protect-against-attacks
Jason R.C. Nurse | @jasonnurse
30
Authentication,
Authorisation &
Access control:
© 2022/2023
Key security services
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
@jasonnurse
@drjasonnurse
Jason R.C. Nurse | @jasonnurse
1
but first…
• What did we cover in the last lecture?
• Explain how a DDoS works.
• Why is ransomware such a significant issue today?
Jason R.C. Nurse | @jasonnurse
2
outline
• What is authentication
• Authentication factors
• Password security
• Multi-factor authentication
• Authorisation and Access control
Jason R.C. Nurse | @jasonnurse
3
What is authentication about?
What does it aim to achieve?
Do we need authentication in security?
Jason R.C. Nurse | @jasonnurse
4
authentication
… verifying the identity of a user, process, or device,
often as a prerequisite to allowing access to resources in
an information system. (NIST SP800-30)
Jason R.C. Nurse | @jasonnurse
5
types of authentication
•
Something I Know
•
Something I Possess
•
Something I Am
•
A combination of these three (Multi-factor
authentication)
Jason R.C. Nurse | @jasonnurse
6
types of authentication
Jason R.C. Nurse | @jasonnurse
7
something I know
●
●
Could be:
● Passwords/Passphrases
● Some Shared Secret
● Obscure Information
Relatively Weak, but commonplace
● How many companies use mother’s maiden name?
● Problems with offline attacks
● rainbow tables
● solutions like PBKDF2 & bcrypt
Jason R.C. Nurse | @jasonnurse
8
what’s the best password (all things considered)?
A. $tarwars
B. kent.SU2018
C. Frank2000
D. bij$223jOIUnKhe
E. p4$$w0rd
It depends…
• D is hardest to break but also
hardest to remember, so people
might write it down
• C is easy to remember (name, birth
year) but easy to break.
• A & E may strike a reasonable
security usability balance, but l33t
speak is well known now
• B might be the best, all things
considered…
Jason R.C. Nurse | @jasonnurse
9
password entropy
●
●
●
Password entropy is about minimising the odds of an
individual guess being right
Defending against brute force and dictionary attacks
● stronger passwords have greater entropy
Two ways to go about increasing it
● Increase the size of the character set
● Increase the length of the password
Jason R.C. Nurse | @jasonnurse
10
password entropy
●
Think on the number of “valid” passwords, in a given
scheme
n
● [A-Z]+ = 26 = 4.7n bits:
●
log2 (26n) = n * log2 (26) = n * log(26)/log(2) = n * 1.41 / 0.3
Throw in numbers and punctuation =~ 45n = 5.5n bits
● …or just make n bigger
●
●
●
Usage of random password generators
● Though they also have their own problems
Around ~128 bits is considered (-NSA) secure enough today
Jason R.C. Nurse | @jasonnurse
11
a small exercise
Here are three password schemes. I would like you to
calculate the number of possible combinations for a
brute force attack.
Feel free to use phones/calculators in this instance.
Jason R.C. Nurse | @jasonnurse
12
a small exercise
●
Scheme 1: 4 alphabetical characters, non-case sensitive
●
Scheme 2: 6 alphanumerical characters, case sensitive
●
Scheme 3: 8 alphanumerical characters, case sensitive,
including punctuation. Assume 10 punctuation {.,:,',:,%,
etc.} characters
Jason R.C. Nurse | @jasonnurse
13
a small exercise
●
Scheme 1: 4 alphabetical characters, non-case sensitive
●
Scheme 2: 6 alphanumerical characters, case sensitive
●
Scheme 3: 8 alphanumerical characters, case sensitive,
including punctuation. Assume 10 punctuation {.,:,',:,%,
etc.} characters
264 = 456,976 → 18.801 bits
6
● (26+26+10) = 56,800,235,584 → 35.72 bits
8
● (26+26+10+10) = 722,204,136,308,736 → 49.35 bits
●
Jason R.C. Nurse | @jasonnurse
14
strong passwords
http://xkcd.com/936/
Jason R.C. Nurse | @jasonnurse
15
password generation
• We assumed passwords generated from random
characters, i.e. where all combinations are equally likely
• If some passwords are more common than others then
entropy is lower
• e.g., the entropy for a word picked from the Oxford dictionary
is 17 bits of entropy, given that there are only 200k words in it,
even if the longest is
Pneumonoultramicroscopicsilicovolcanoconiosis (45 characters
= 210 bits of entropy)
Jason R.C. Nurse | @jasonnurse
16
dictionary attacks
• Attackers may use a "dictionary"
• wordlist of tens of thousands of common words/passwords
• e.g., password, 123456, 12345678, qwerty, abc123, 1111111, iloveyou, etc...
• Dictionaries could be used to prevent users to choose common
passwords from the dictionary
• Password/passphrases should be generated
• randomly (best way)
• or from to something that is very personal, e.g., remember a long phrase
or poem, and use the first letter of each to give a random-looking, but
easy to remember string (and hope is not too common)
Jason R.C. Nurse | @jasonnurse
17
online password attacks
• This would all be fine for online attacks:
• If request+reply = 1kB on a 1Gbps connection that is this is 125k
req/sec, or on a 20Mbps connection that is 2.5k req/sec
• Can make it more difficult:
• Lock accounts after a few failed login attempts
• Ask the user logging in to perform a task unsuitable to bots, e.g., CAPTCHAs
(Completely Automated Public Turing test to tell Computers and Humans
Apart)
• ... so it would take ages for passwords with decent entropy
Jason R.C. Nurse | @jasonnurse
18
offline attacks
• Users often reuse passwords across different service accounts
• Passwords should not be stored in clear text or encrypted with keys
• Passwords should be hashed
What is password hashing?
What is a difference between hashing and traditional encryption?
Jason R.C. Nurse | @jasonnurse
19
offline attacks
• Users often reuse passwords across different service accounts
• Passwords should not be stored in clear text or encrypted with keys
• Passwords should be hashed
What is password hashing?
What is a difference between hashing and traditional encryption?
“Hashing is the practice of using an algorithm to map data of any size to a fixed
length. This is called a hash value (or sometimes hash code or hash sums or even a
hash digest if you’re feeling fancy). Whereas encryption is a two-way function,
hashing is a one-way function. While it’s technically possible to reverse-hash
something, the computing power required makes it unfeasible. Hashing is one-way.”
https://www.thesslstore.com/blog/difference-encryption-hashing-salting/
Jason R.C. Nurse | @jasonnurse
20
offline attacks
• If password hashes are stolen
• they cannot be used directly to login into same/other systems
• but attackers can try to recover password from hash:
• by hashing billions of passwords per second; if hash matches, they have found the
password
• Crackers can join together and build huge tables of passwords
and hashes (rainbow tables) so that given a hash they can find out
the original passwords (example of time/memory tradeoff)
• e.g., https://crackstation... https://www.hashkiller...
• Defences:
• Passwords should be hashed using a "slow" hashing algorithm like bcrypt/scrypt to
slow down offline attacks
• Salt should be used when hashing to defeat rainbow tables attacks
• Do not implement your own password hashing, use a library for password hashing
(e.g. crypt or password_hash in PHP)
Jason R.C. Nurse | @jasonnurse
21
offline attacks
Jason R.C. Nurse | @jasonnurse
22
other attacks on passwords
• Trick you into giving away password (e.g., phishing)
• Exploit password recovery mechanisms (e.g., having access to
personal information about you)
• Timing attacks in some cases how long it takes to give an
answer can give away the password
Jason R.C. Nurse | @jasonnurse
23
something I possess
●
●
●
Could be a purpose made dongle or key fob
● A proximity key fob
● A Smart Card / RFID
Could be more general purpose
● Mobile
● Passport
Items can be stolen, but can be used to strengthen other
authentication methods
● Something I have, and something I know
● Two Factor Authentication
What are some other examples?
Jason R.C. Nurse | @jasonnurse
24
mobile phone example
●
Example of Two Factor Authentication (Gmail, etc.)
User logs in with a username and password
● Server sends a text message with a one-time code to the user’s registered
mobile phone
● User enters code from sms
● Everyone lives happily ever after – OK, not quite but (a bit) better security
●
●
Thus, the server has proof that the user knows something that only they’re
supposed to know, and that the user has something that only they’re
supposed to have
●
The server is sufficiently convinced that the user really is who they say
they are
Jason R.C. Nurse | @jasonnurse
25
mobile phone example
SMS and voice calls are not encrypted. Instead, they're transmitted in clear text, making them easier to intercept.
SMS codes are vulnerable to phishing. A tool called Modlishka uses actual content from the site it's mimicking to get you
to enter your info and dumps you out on that site at the end so you don't even realize you were there.
Phone company employees can be fooled. Attackers can trick an employee into transferring a phone number to the
attacker's SIM card, meaning the security codes get sent to them instead of you.
Outages. Authentication apps and security keys work offline. SMS needs the phone service to be available to work and
sometimes the phone system can go down when the internet does not.
SMS isn't likely to get more secure. As multi-factor authentication becomes more common, more attackers will target it.
Attackers usually target the weakest link in security and with MFA, SMS is the weakest link.
https://www.techrepublic.com/article/top-5-reasons-not-to-use-sms-for-multi-factor-authentication/
Jason R.C. Nurse | @jasonnurse
26
Sim
swap/port
attack
https://medium.com/coinmonks/the-mostexpensive-lesson-of-my-life-details-of-sim-porthack-35de11517124
https://www.researchgate.net/figure/SIMswapping-fraud-scheme-15_fig1_337291807
Jason R.C. Nurse | @jasonnurse
27
mobile phone example
Google Authenticator
Microsoft Authenticator
Jason R.C. Nurse | @jasonnurse
Etc..
28
something I am
●
●
TouchID
Biometrics – measurements of the characteristics of our human
bodies
● Fingerprints, DNA, Iris or Retina Scans
In theory, the “most secure” sort of authentication
FaceID
Jason R.C. Nurse | @jasonnurse
WindowsHello
29
something I am
●
Can you think of any way around these? Maybe reference your latest spy/crime
movie! J
Fingerprints can be copied in gelatin/latex
● Or there’s the more direct approach (though forceful!), also for retinas
● You can acquire a sample of someone’s DNA easily…
●
●
Important to note that systems do not typically do a complete match
● They match markers/key points against a saved template
● Significant false negative and false positive rate
● Not consistent across different legislations
Jason R.C. Nurse | @jasonnurse
30
outline
• What is authentication
• Authentication factors
• Password security
• Multi-factor authentication
• Authorisation and Access control
Jason R.C. Nurse | @jasonnurse
31
authorisation and access control
• After authentication, the system knows “who” it is engaging with (or
who is requesting to access/use some service or data)
• Authorisation determines whether that entity (person, device, etc.)
should be allowed access or not
• Access control is the process of allowing or blocking the requests for
access/use
Jason R.C. Nurse | @jasonnurse
32
authorisation and access control
Access
Control List
(ACL)
Access Control = Authentication + Authorisation
A reference monitor performs two tasks.
• It authenticates any evidence supplied by the subject with an access request.
Traditionally, the user identity the subject was speaking for was authenticated.
• It evaluates the request with respect to the given policy.
https://cybok.org/media/downloads/AAA_issue_1.0_q3qspzo.pdf
Jason R.C. Nurse | @jasonnurse
33
types of access control approaches
• Discretionary (DAC) (authorisation-based) policies control access based on the
identity of the requestor and on access rules stating what requestors are (or are
not) allowed to do.
• Mandatory (MAC) policies control access based on mandated regulations
determined by a central authority.
• Role-based (RBAC) policies control access depending on the roles that users have
within the system and on rules stating what accesses are allowed to users in given
roles.
• Attribute-based (ABAC) policies control access depending on the attributes of
entities (subject and object), operations, and the environment relevant to a request.
Samarati P., de Vimercati S.C. (2001) Access Control: Policies, Models, and Mechanisms. In: Focardi R., Gorrieri R. (eds)
Foundations of Security Analysis and Design. FOSAD 2000. Lecture Notes in Computer Science, vol 2171. Springer.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., & Voas, J. (2015). Attribute-based access control. Computer, 48(2), 85-88.
Jason R.C. Nurse | @jasonnurse
34
access list examples
Access matrix
CO558-634examnotes.docx
BobAssignment.pdf
Jason
Own, Read, Write
Read
Alice (lecturer)
Read, Write
Own, Read, Write
Bob (student)
ACLs by file
CO558-634examnotes.docx
• Jason: Own, Read, Write
• Alice: Read, Write
BobNotes.docx
Own, Read, Write
BobAssignment.pdf
• Bob: Own, Read, Write
• Jason: Read
BobNotes.pdf
• Bob: Own, Read, Write
Samarati P., de Vimercati S.C. (2001) Access Control: Policies, Models, and Mechanisms. In: Focardi R., Gorrieri R. (eds)
Foundations of Security Analysis and Design. FOSAD 2000. Lecture Notes in Computer Science, vol 2171. Springer.
Jason R.C. Nurse | @jasonnurse
35
a linux-based example
Can anyone tell me what this is, and interpret it?
Jason R.C. Nurse | @jasonnurse
36
a linux-based example
Jason R.C. Nurse | @jasonnurse
37
a linux-based example
ACLs allow one to apply a more specific set of permissions to a file or directory
without (necessarily) changing the base ownership and permissions (e.g., previous
slide). Essentially, they let a system "tack on" access for other users or groups.
~test$ getfacl /test
# file: test
# owner: user
# group: user
user::rwx
group::rwx
other::---
~test$ setfacl -d -m students:rw- /test
~test$ getfacl /test
# file: test
# owner: user
# group: user
user::rwx
group::rwx
other::--default:user::rwx
default:user:students:rwx
default:group::rwx
default:mask::rwx
default:other::--Jason R.C. Nurse | @jasonnurse
Sets default access control list for
the /test directory
More here:
https://www.redhat.com/sys
admin/linux-access-controllists (read it!)
38
summary
• What is authentication
• Authentication factors
• Password security
• Multi-factor authentication
• Authorisation and Access control
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
39
next time…
Symmetric &
Asymmetric
Authentication:
A closer look
Jason R.C. Nurse | @jasonnurse
40
Symmetric &
Asymmetric Authentication:
A closer look
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
jasonnurse.github.io
@jasonnurse
@drjasonnurse
Jason R.C. Nurse | @jasonnurse
© 2022/2023
but first…
• What did we cover in the last lecture?
• What are the main types of authentication?
• A hint: Passwords are like underwear…
• What happened in cyber security this last week?
Jason R.C. Nurse | @jasonnurse
2
outline
• Symmetric authentication protocol
• Key distribution
• Needham Schroeder
• Asymmetric authentication
Jason R.C. Nurse | @jasonnurse
3
authentication
… verifying the identity of a user, process, or device, often as a
prerequisite to allowing access to resources in an information
system. (NIST SP800-30)
Symmetric authentication… about?
… core theme is using the same cryptographic keys
for authentication process
Jason R.C. Nurse | @jasonnurse
4
authentication using symmetric crypto
●
We call this Challenge/Response
note the key (shared secret here) is never sent
● still need to watch out for Replay Attacks
●
Alice
Shared Secret K
Bob
A (Hi, I am Alice)
rb (Prove you are Alice)
Computes
{ rb }K
Generates rb
{ rb }K (Here is your proof)
Ok or Fail
Jason R.C. Nurse | @jasonnurse
Generates
{ { rb }K }K checks
if same as rb
challenge needs to be generated by…
Authenticator (Bob)
Would this work?
Alice
Generates ra
Computes { ra }K
Shared Secret K
Bob
A, ra, { ra }K (Hi, proof that I am Alice)
Ok or Fail
Generates
{ { ra }K }K checks
if same as ra
• No! Any attacker who can see the conversation can then
always impersonate Alice (Replay Attack)
Jason R.C. Nurse | @jasonnurse
6
distributed systems & password auth.
• Imagine you want to be able to authenticate to lots of different services,
all using passwords. Here are your options:
• could use same password everywhere
• could use different passwords for each
• could use a password manager
• I could trust a third party (e.g., login
with Google, Apple, Microsoft, etc.)
Jason R.C. Nurse | @jasonnurse
scalability of symmetric authentication
• If N people want to authenticate to each other with shared
secrets, you need N*(N-1)/2 secrets
• Scales very poorly (square of N)
• Lots of key generation and distribution problems
• Key distribution protocols
• A server generates keys and distribute them in a secure way (Needham
– Schroeder and Kerberos)
• Key agreement protocols
• Parties agree on a shared key each contributing some key material to
the shared key (Diffie-Hellman)
Jason R.C. Nurse | @jasonnurse
8
key distribution
• Even if the secret is stored securely, how is it transmitted
between parties?
• We need to worry about eavesdropping
• People listening to our secret
• Replay attacks
Jason R.C. Nurse | @jasonnurse
exercise: 5 mins
Thus far we have assumed that there is a shared key
between the two parties that want to communicate.
But, how do they attain this shared key?
Task: Try to design a protocol*, or think of key
elements of a protocol, that would allow the secure
distribution/sharing of keys.
*system of rules or procedures
Jason R.C. Nurse | @jasonnurse
Needham Schroeder Protocol
Alice (KAS)
Server Bob
(KAS, KBS) (KBS)
A, B
{K AB ,{K AB }K BS }K AS
A,{K AB }K BS
{N B }K AB
{ f (N B )}K AB
• Needs a trusted intermediary
• Every User share a master
key with the server S
• thus we only have n
(master) keys for n users
• Alice-Server key: KAS, BobServer key KBS
Non-secure Needham – Schroeder (v1)
• Alice asks server for a key to Talk to Bob
• Server generates a session key KAB, encrypts with Alice’s master key (KAS)
• Gives Alice same key KAB encrypted with Bob’s master key KBS (a "ticket")
• Alice forwards Bob’s ticket (encrypted session key) to him
• Bob decrypts the session key using KBS, obtaining KAB
• Bob's sends a challenge (random nonce NB) encrypted with the session key KAB to verify Alice identity
• Alice decrypts the nonce, does a simple operation on it, and sends it back, encrypted again with the
session key
Jason R.C. Nurse | @jasonnurse
11
Needham Schroeder Protocol
Alice
Server Bob
A, B
Charlie
Server Bob
{K AB ,{K AB }K BS }K AS
C, B
{K CB ,{K CB }K BS }K CS
A,{K AB }K BS
A,{K CB }K BS
{N B }K AB
{N B }KCB
{ f (N B )}K AB
{ f (N B )}KCB
Non-secure Needham – Schroeder (v1)
Attack on non-secure Needham – Schroeder (v1)
• Charlie can easily impersonate Alice with Bob
• To prevent that we need to have Alice identity (A) be part of the Ticket so that Bob
knows the session key is
Jason R.C. Nurse | @jasonnurse
12
Needham Schroeder Protocol
Alice
Server Bob
A, B
Alice
Charlie
A, B
Server
A, C
{K AB ,{A, K AB }K BS }K AS
{K AC ,{A, K AC }KCS }K AS
{A, K AB }K BS
{N B }K AB
{K AC ,{A, K AC }KCS }K AS
{ f (N B )}K AB
{A, K AC }KCS
{ f (N B )}K AC
Non-secure Needham – Schroeder (v2)
{N B }K AC
Attack on non-secure Needham – Schroeder (v2)
• Man in the middle attack (MITM) Charlie can impersonate Bob (note, message never
reaches Bob)
• To prevent that we need to have Bob identity (B) be part of the server response to
Alice
Jason R.C. Nurse | @jasonnurse
13
Needham Schroeder Protocol
Alice
Server Bob
A, B
*
Alice
Charlie
A, B
{K AB , B,{A, K AB }K BS }K AS
{K AB , B,{A, K AB }K BS }K AS
{A, K AB }K BS
{A, K AB }K BS
{N B }K AB
{N B }K AB
{ f (N B )}K AB
{ f (N B )}K AB
Non-secure Needham – Schroeder (v3)
Attack on non-secure Needham – Schroeder (v3)
• Almost safe, but Charlie can replay to Alice a previous session key
• cause key wearing of one session key, ultimately leading to its compromise
• attempt to replay the old conversation with Bob (assuming Alice would interpret the communication again as
valid)
• Alternatively if KBS becomes compromised, Charlie can replay a response that used that key and fully impersonate
Bob even if Bob changed KBS
• To prevent all these we need to make sure that the reply is fresh, adding a nonce NA to the first message which is
echoed back in the server reply
Jason R.C. Nurse | @jasonnurse
14
Needham Schroeder Protocol
Alice
Server Bob
A, B, N A
{K AB , B, N A ,{A, K AB }K BS }K AS
But… there are always other attacks…
Charlie
{A, K AB }K BS
{A, K AB }K BS
{N B }K AB
{N B }K AB
{ f (N B )}K AB
{ f (N B )}K AB
Needham – Schroeder protocol
Bob
Attack on Needham – Schroeder based on
compromised KAB
• This is the complete protocol published by Needham and Schroeder
• Adding a nonce NA to the first message which is echoed back in the server reply – this
ensures the reply is fresh
• Denning and Sacco: if a session key KAB is compromised Charlie can impersonate Alice
with Bob
• To prevent that Bob needs to be sure that the ticket is fresh, to do so provides a nonce to
Alice before she contacts the server
Jason R.C. Nurse | @jasonnurse
15
Needham – Schroeder with Handshake
Alice
Bob
A
{A, N Bʹ }K BS
!, #, $! ,
!, $ "
Server
# $!"
{K AB , B, N A ,{A, K AB , N Bʹ }K BS }K AS
{A, K AB , N Bʹ }K BS
{N B }K AB
{ f (N B )}K AB
Needham – Schroeder protocol with Alice-Bob handshake
Jason R.C. Nurse | @jasonnurse
16
problems with symmetric authentication
• Lots of secrets!
• We have to store them securely
• We have to share them in the first place
• Eavesdropping these initial communications, or hacking the secure storage blows
the whole thing
• Needham-Schroeder & Kerberos improves scalability, but would you want to
manage the key server for the whole Uni? Google?
• key server becomes a primary target
• We could use a key agreement protocol (see further reading at end)
• We could use Asymmetric Authentication
Jason R.C. Nurse | @jasonnurse
outline
• Symmetric authentication protocol
• Key distribution
• Needham Schroeder
• Asymmetric authentication
Jason R.C. Nurse | @jasonnurse
18
asymmetric authentication
•
•
•
Asymmetric Authentication builds on Asymmetric Encryption
Asymmetric Encryption = Different keys
Generate keys in pairs, one key is kept (privately) by one party,
the other can be disclosed to all
•
We call them private and public keys
Jason R.C. Nurse | @jasonnurse
19
uses of asymmetric encryption
Can use the keys either way round:
•
Encrypt with the public key, and only the person with the
private key can read the message
• Encrypt with the private key, and anyone with the public
key can decrypt it, but they can be sure that it was the
private key holder that wrote it
We are particularly interested in the 2nd usage…
•
•
Jason R.C. Nurse | @jasonnurse
20
uses of asymmetric encryption
•
•
•
Everyone can have a public/private key pair
Bob needs to know Alice’s public key in order to
authenticate her
If Alice uses her private key to encrypt something, we refer
to this as signing
Jason R.C. Nurse | @jasonnurse
21
uses of asymmetric encryption
•
Below shows the signing process and how it all fits together
Challenge sent
to request proof
of Alice’s identity
Encrypt/sign
with private key
(of Alice)
Jason R.C. Nurse | @jasonnurse
Verify identity of Alice
based on public key
22
why bother with symmetric?
Okay then, if this is so much better, why bother with the
stuff on symmetric encryption / authentication from
previous classes?
Any ideas?
Jason R.C. Nurse | @jasonnurse
23
why bother with symmetric?
•
Okay then, if this is so much better, why bother with
the stuff on symmetric encryption / authentication
from previous classes?
• Asymmetric encryption is much, much slower L
• Estimates of 1000 times slower for some
implementations!
• Remember, we need to care about the security
and usability balance…
•
Can we do anything about that?
• Yes! – sign a hash (summary)
of the message
Jason R.C. Nurse | @jasonnurse
24
hashing
•
A hashing function takes any arbitrary message, and gives us a
fixed length string of random-looking letters and numbers
•
Turns up everywhere in computing
•
•
Hash tables
•
Password storage (discussed before…)
A good hashing function makes it difficult to find another input
message that gives the same hash
•
•
We call duplicate hashes a collision
Like a digital fingerprint of the message
Jason R.C. Nurse | @jasonnurse
25
signing and using a Hash
•
Alice writes her message
•
Alice makes a hash of the message
•
Alice encrypts the hash with her private key
•
Alice includes the encrypted hash with message
•
So, message is sent plaintext
•
•
Not a problem in this particularly scenario. Remember,
attacker would have the public key anyway… Its public!
Bob decrypts the hash using Alice’s public key, and re-hashes
the message to check that it matches
•
If the message has been tampered with, it won’t match!
Jason R.C. Nurse | @jasonnurse
26
keeping your private key private
“Customers of HTTPS certificate reseller Trustico are reeling after being told
their website security certs – as many as 23,000 – will be rendered useless
within the next 24 hours.
This is allegedly due to a security blunder in which the private keys for said
certificates ended up in an email sent by Trustico. Those keys are supposed
to be secret, and only held by the cert owners, and certainly not to be
disclosed in messages. In the wrong hands, they can be used by malicious
websites to masquerade as legit operations.”
https://www.theregister.co.uk/2018/03/01/trustico_digicert_symantec_spat/
Jason R.C. Nurse | @jasonnurse
27
distributing public keys
•
To do asymmetric authentication, users need to know other users’ public keys
•
How do they find them out?
•
•
If Eve replaces Alice’s public key initially, nobody will believe Alice’s
messages are real, and Eve could still impersonate her
We use a trusted third party and certificates
What are examples of trusted third parties in the ‘real world’?
Jason R.C. Nurse | @jasonnurse
28
distributing public keys
•
The trusted third party has a public key known to everyone
•
Generates a certificate saying that a key belongs to a
person, encrypted with its private key, naturally
•
•
Certificate can’t be altered J
Trusted third party is a Certificate Authority
Jason R.C. Nurse | @jasonnurse
29
distributing public keys
•
You could always hand over a public key yourself… That’d
be pretty secure!
•
Get a public key from someone you already trust (a trusted
introducer)
•
Get a certified key from a public repository
Jason R.C. Nurse | @jasonnurse
30
trust models
•
Monopoly Model
•
•
Just one trusted entity
Oligarchy
•
•
What are the pros and
cons to these 3
approaches? (2-3mins)
Many root CAs, like we have in browsers
Anarchy (Web of Trust)
•
PGP – e.g., everyone can sign everyone else’s certificates –
a friend can sign another friend’s certificate to ‘validate’ that
friend’s identity.
Jason R.C. Nurse | @jasonnurse
31
certificate chains
•
•
There’s no one ring to rule them all trusted Certificate Authority
If you look at which SSL “root” certificates are trusted by your browser,
you’ll see about 50.
https://www.globalsign.com/images/apple-root-certificates.png
Jason R.C. Nurse | @jasonnurse
32
certificate chains
•
A certificate authority can sign a certificate for someone else, saying
they do a good job at checking other people, so they too can issue
certificates.
•
•
Verisign, Thawte, Comodo, DigiCert
We talk about chains of certificates, which means that a certificate
saying K is Alice’s public key is signed by C, and their certificate is
signed by D, all the way up to a root CA
Jason R.C. Nurse | @jasonnurse
33
certificate chains
https://www.youtube.com/watch?v=msBrdFiSvW4
Jason R.C. Nurse | @jasonnurse
34
certificate chains
https://www.youtube.com/watch?v=msBrdFiSvW4
Jason R.C. Nurse | @jasonnurse
35
issues with messing with certificates
“The critical threat is present on Lenovo PCs that have adware from a company called
Superfish installed. As unsavory as many people find software that injects ads into Web
pages, there's something much more nefarious about the Superfish package. It installs a
self-signed root HTTPS certificate that can intercept encrypted traffic for every website
a user visits. When a user visits an HTTPS site, the site certificate is signed and
controlled by Superfish and falsely represents itself as the official website certificate.”
https://arstechnica.com/information-technology/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/
Jason R.C. Nurse | @jasonnurse
36
issues with messing with certificates
https://www.thesslstore.com/blog/lenovo-settles-ftc-superfish-security-incident/
Jason R.C. Nurse | @jasonnurse
37
certificate formats
•
Two main certificate formats in use today:
•
X.509
•
•
•
•
Widely accepted, industry standard format
Used by MS, Verisign, etc.
Signed by a single certification authority
PGP
•
•
•
Allows multiple owners for a key
Allows multiple certifiers for a key
Supports self-certification, and anyone can certify anyone else’s
key
Jason R.C. Nurse | @jasonnurse
38
summary
• Symmetric authentication protocol
• Key distribution
• Needham Schroeder
• Asymmetric authentication
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
39
next time…
Security controls:
Preventing, detecting and
recovering from attacks
Jason R.C. Nurse | @jasonnurse
further reading
The following slides will be helpful at understanding
the topics discussed. You are strongly advised to read
them, and conduct your own independent research.
Jason R.C. Nurse | @jasonnurse
do not invent your security protocol
• A friendly warning
• do not invent, modify or try to implement security protocols by yourself:
things can go wrong rather quickly, e.g., mutual authentication challenge
response
[slightly different notation:
• K(M) for encrypting M with K
• KA,B to highlight key is shared
between A and B]
Jason R.C. Nurse | @jasonnurse
44
... or things will go wrong
• It seems a very long exchange… let's try to piggyback some
message
• Since A is going to authenticate B, let's challenge B in the
first round
Jason R.C. Nurse | @jasonnurse
45
... very quickly
New session:
I’m (claiming
to be) Alice,
prove to me
you’re Bob
I’m (claiming to be) Alice, prove to me you’re Bob
I’m Bob, prove to me you’re Alice
I’m Bob, prove to
me you’re Alice
Original
session:
Here’s my
(ill-gotten)
proof
that I’m Alice
• Reflection attack
• An attacker can request the response of the challenge! (fix: use even for request, odd for response)
• Key wearing
• An active attacker can solicit use of the key
(causing
wearing”)
Jason
R.C. Nurse |“key
@jasonnurse
46
Kerberos v5
Kerberos - Network
Authentication Protocol
https://www.youtube.com/
watch?v=WXgKiiFqJbI
Kerberos Authentication
https://www.fortinet.com/re
sources/cyberglossary/kerb
eros-authentication
Adds a Ticket Granting Server (for scalability), and Timestamps
Jason R.C. Nurse | @jasonnurse
Diffie-Hellman protocol
●
●
Key agreement protocol...
Everyone agrees 2 initial (public) numbers
● P which is prime (and normally big)
● q which is an integer – generator of Zp
Alice and Bob pick (private) random numbers, Alice picks a and
Bob picks b
●
Now, Alice and Bob compute a public key based from their
private numbers (a* & b* )
●
Alice does: a* = qa mod p
b
● Bob does: b* = q mod p
●
Jason R.C. Nurse | @jasonnurse
Diffie-Hellman protocol
Alice and Bob can now compute the same session key (x)
Nobody else can do it, because they don’t know a or b, just the
public keys
●
Alice uses: x = (b*)a mod p
b mod p
● Bob uses: x = (a*)
●
See Public Key Cryptography: Diffie-Hellman Key Exchange
(short version)
https://www.youtube.com/watch?v=3QnD2c4Xovk
●
A problem is Man-In-The-Middle attacks
Jason R.C. Nurse | @jasonnurse
© 2022/2023
Security controls:
Preventing, detecting and
recovering from attacks
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
jasonnurse.github.io
@jasonnurse
@drjasonnurse
but first…
• What did we cover in the last lecture?
• What’s the purpose of the Needham Schroeder
Protocol?
• Explain how certificate chains work?
Jason R.C. Nurse | @jasonnurse
2
outline
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Jason R.C. Nurse | @jasonnurse
3
what are security controls?
• Security controls are used to mitigate/reduce attacks or threats,
and their impact
• Types of control:
• preventive
• detective
• reactive
• corrective - actively reduces impact
• recovery - restores the asset after impact
Jason R.C. Nurse | @jasonnurse
4
types of security controls
• Preventative – controls intended to stop an unauthorised or
undesired incident from occurring.
• E.g., firewalls, intrusion prevention systems, employee vetting
• Detective – controls intended to detect that an unauthorised or
undesired incident has occurred.
• E.g., intrusion detection systems, system audit logs, CCTV
• Reactive – controls intended to support a response to an
unauthorised or undesired incident that has occurred.
• E.g., recovery systems
Jason R.C. Nurse | @jasonnurse
5
levels of security controls
• Physical – controls related to physical presence/access.
• E.g., locks, CCTV
• Technical/logical – controls related to software/hardware.
• E.g., antivirus software, application whitelisting
• Administrative – controls related to policies, procedures,
guidelines.
• E.g., acceptable usage policy (AUP), organisational security policy
Jason R.C. Nurse | @jasonnurse
6
types/levels of security controls
Types of
security
control
Levels of security control
Physical
Technical Administrative
Preventative
??
??
??
Detective
??
??
??
Reactive
??
??
??
What are some examples of controls for each of the areas?
Jason R.C. Nurse | @jasonnurse
7
types/levels of security controls
Levels of security control
Physical
Technical
Administrative
Types of
security
control
Preventative
Locks, gates
Firewalls, IPS,
antivirus, system
access rights
Employee vetting,
Security awareness
training
Detective
CCTV, security
cameras
IDS, audit logs,
honeypots
Employee reporting
of suspicious
behaviour/incident
Reactive
Restoration,
detain
perpetrator
Reduce/change
system access
Execute incident
response plan
Jason R.C. Nurse | @jasonnurse
8
outline
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Jason R.C. Nurse | @jasonnurse
9
Cyber Essentials (2016-2021)
• Cyber Essentials (CE) is a Government backed scheme to help
organisations, whatever their size, against a whole range of the
most common cyber attacks.
• CE notices the fact that most cyber-attacks have a common
basis, and exploit certain key vulnerabilities
• Proposes 5 security controls as the “essentials”
https://www.ncsc.gov.uk/cyberessentials/overview
Jason R.C. Nurse | @jasonnurse
10
Cyber Essentials
1. Use a firewall to secure your internet connection
You should protect your Internet connection with a firewall. This
effectively creates a ‘buffer zone’ between your IT network and other,
external networks.
In the simplest case, this means between your computer (or computers)
and ‘the internet’. Within this buffer zone, incoming traffic can be
analysed to find out whether or not it should be allowed onto your
network.
There will be network firewalls and device firewalls.
https://www.ncsc.gov.uk/cyberessentials/advice
Jason R.C. Nurse | @jasonnurse
11
Cyber Essentials
2. Choose the most secure settings for your devices and software
Manufacturers often set the default configurations of new software and
devices to be as open and multi-functional as possible. They come with
‘everything on’ to make them easily connectable and usable.
Unfortunately, these settings can also provide cyber attackers with
opportunities to gain unauthorised access to your data, often with ease.
Organisations should always:
• Check the settings, Use passwords, Use extra security
https://www.ncsc.gov.uk/cyberessentials/advice
Jason R.C. Nurse | @jasonnurse
12
Cyber Essentials
3. Control who has access to your data and services
To minimise the potential damage that could be done if an account is
misused or stolen, staff accounts should have just enough access to
software, settings, online services and device connectivity functions for
them to perform their role. Extra permissions should only be given to
those who need them.
Organisations should pay close attention to:
• Administrative accounts, Access to software
https://www.ncsc.gov.uk/cyberessentials/advice
Jason R.C. Nurse | @jasonnurse
13
Cyber Essentials
4. Protect yourself from viruses and other malware
Malware is short for ‘malicious software’. Defending against malware:
•
•
•
Anti-malware measures are often included for free within popular operating
systems. For example, Windows has Defender. These should be used on all
computers and laptops.
Allowed list can also be used to prevent users installing and running applications
that may contain malware. The process involves an administrator creating a list of
applications allowed on a device.
Sandboxing. Where possible, use versions of the applications that support
sandboxing. For instance, most modern web browsers implement some form of
sandbox protection. A sandboxed application is run in an isolated environment with
very restricted access to the rest of your device and network.
https://www.ncsc.gov.uk/cyberessentials/advice
Jason R.C. Nurse | @jasonnurse
14
Cyber Essentials
5. Keep your devices and software up to date
No matter which phones, tablets, laptops or computers your
organisation is using, it’s important that the manufacturer still supports
the device with regular security updates and that you install those
updates as soon as they are released. This is true for both Operating
Systems and installed apps or software. Happily, doing so is quick, easy,
and free.
Also known as ‘Patching’: Manufacturers and developers release regular
updates which not only add new features, but also fix any security
vulnerabilities that have been discovered.
https://www.ncsc.gov.uk/cyberessentials/advice
Jason R.C. Nurse | @jasonnurse
15
Cyber Essentials
• Two levels of certification
• Cyber Essentials – Organisations assess themselves against five basic
security controls and a qualified assessor verifies the information
provided.
• Cyber Essentials Plus – A qualified assessor examines the same five
controls, testing that they work through a technical audit.
• Cyber Essentials readiness toolkit
• https://getreadyforcyberessentials.iasme.co.uk/questions/
What do you think are some of the pros/cons to Cyber Essentials?
https://www.ncsc.gov.uk/cyberessentials/overview
https://www.ncsc.gov.uk/information/cyber-essentials-faqs
Jason R.C. Nurse | @jasonnurse
16
outline
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Jason R.C. Nurse | @jasonnurse
17
NCSC 10 Steps to Cyber Security
This guidance is
aimed at medium to
large organisations
that have someone
dedicated to
managing the
organisation's cyber
security.
Jason R.C. Nurse | @jasonnurse
https://www.ncsc.gov.uk/c
ollection/10-steps
18
NCSC 10 Steps to Cyber Security
Risk management: Take a risk-based approach to securing your data and systems.
Engagement and training: Collaboratively build security that works for people in
your organisation.
Asset management: Know what data and systems you have and what business
need they support.
Architecture and configuration: Design, build, maintain and manage systems
securely.
Vulnerability management: Keep your systems protected throughout their
lifecycle.
https://www.ncsc.gov.uk/collection/10-steps
Jason R.C. Nurse | @jasonnurse
19
NCSC 10 Steps to Cyber Security
Identity and access management: Control who and what can access your systems
and data.
Data security: Protect data where it is vulnerable.
Logging and monitoring: Design your systems to be able to detect and
investigate incidents.
Incident management: Plan your response to cyber incidents in advance
Supply chain security: Collaborate with your suppliers and partners
https://www.ncsc.gov.uk/collection/10-steps
Jason R.C. Nurse | @jasonnurse
20
Cyber Essentials & NCSC 10 Steps
to Cyber Security
Where do these standards overlap? How do they differ?
If you were the head of security at the following organisations,
which of these standards would you aim to implement, and why?
Jason R.C. Nurse | @jasonnurse
21
outline
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Jason R.C. Nurse | @jasonnurse
22
CIS Cyber Security Controls
The CIS Controls are a prioritized set of Safeguards to mitigate the most prevalent
cyber-attacks against systems and networks. They are mapped to and referenced
by multiple legal, regulatory, and policy frameworks.
CIS Controls v8 has been enhanced to keep up with modern systems and
software. Movement to cloud-based computing, virtualization, mobility,
outsourcing, Work-from-Home, and changing attacker tactics prompted the
update and supports an enterprise's security as they move to both fully cloud and
hybrid environments.
https://www.cisecurity.org/controls/cis-controls-list/
Jason R.C. Nurse | @jasonnurse
23
CIS Cyber Security Controls
CIS Controls™ https://www.youtube.com/watch?v=CX4UE9zT69Y
Jason R.C. Nurse | @jasonnurse
24
Jason R.C. Nurse | @jasonnurse
https://www.cisecurity.
org/controls/ciscontrols-list/
25
Jason R.C. Nurse | @jasonnurse
https://www.cisecurity.
org/controls/ciscontrols-list/
26
Jason R.C. Nurse | @jasonnurse
https://www.cisecurity.
org/controls/ciscontrols-list/
27
Implementation Groups (IGs) are the recommended guidance to prioritise implementation
of the CIS Controls. In an effort to assist enterprises of every size, IGs are divided into three
groups.
Each IG identifies a set of Safeguards that they need to implement. There is a total of 153
Safeguards in CIS Controls v8.
Every enterprise should start with IG1. IG1 is defined as “basic cyber hygiene,” the
foundational set of cyber defence Safeguards that every enterprise should apply to guard
against the most common attacks.
IG2 builds upon IG1, and IG3 is comprised of all the Controls and Safeguards.
https://www.cisecurity.org/controls/implementation-groups/
Jason R.C. Nurse | @jasonnurse
28
outline
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Jason R.C. Nurse | @jasonnurse
29
NIST Cyber Security Framework
The Framework is guidance, based on existing standards, guidelines, and
practices for organizations to better manage and reduce cybersecurity risk.
In addition to helping organizations manage and reduce risks, it was
designed to foster risk and cybersecurity management communications
amongst both internal and external organizational stakeholders.
https://www.nist.gov/cyberframework/framework
Jason R.C. Nurse | @jasonnurse
30
https://www.nist.gov/cyberframework/framework
Jason R.C. Nurse | @jasonnurse
31
https://www.nist.gov/cyberframework/framework
Jason R.C. Nurse | @jasonnurse
32
https://www.nist.gov/cyberframework/framework
Jason R.C. Nurse | @jasonnurse
33
summary
• Types of security controls
• Cyber Essentials (UK)
• NCSC 10 Steps to Cyber Security (UK)
• CIS Cyber Security Controls (US)
• NIST Cyber Security Framework (US)
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
34
next time…
Legal, professional and
ethical aspects in cyber
further reading
The following slides will be helpful at understanding
the topics discussed. You are strongly advised to read
them, and conduct your own independent research.
security control sets
• Cyber Essentials
•
•
https://www.ncsc.gov.uk/cyberessentials/overview
https://getreadyforcyberessentials.iasme.co.uk/
• 10 Steps to Cybersecurity
•
https://www.ncsc.gov.uk/collection/10-steps
• CIS CSC
•
https://www.cisecurity.org/controls/cis-controls-list/
• NIST CSF
•
•
https://www.nist.gov/cyberframework/framework
https://www.nist.gov/cyberframework/online-learning
© 2022/2023
Usable Security:
The what, the why, and
the how…
Jason R.C. Nurse
School of Computing
j.r.c.nurse@kent.ac.uk
jasonnurse.github.io
@jasonnurse
@drjasonnurse
but first…
• What did we cover in the last lecture?
• What are the main types of security control?
• Can you name some examples?
• How many years can you be imprisoned for
related to unauthorised access of computer
material?
Jason R.C. Nurse | @jasonnurse
2
outline
• What is Usable Security?
• Why is it important?
• How to do Usable Security:
• Guidelines
• Evaluation techniques
• But, it’s actually not this simple…
Jason R.C. Nurse | @jasonnurse
3
what is it?
• … A field concerned with making the security features of systems
easy to understand and use. (Nurse et al.)
• … Focuses on the design, evaluation, and implementation of
interactive secure systems. (Kainda et al.)
• … The study of interaction between humans and computers, or
human–computer interaction, specifically as it pertains to
information security. (Wikipedia)
https://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction_%28security%29
Kainda, R., et al. (2010, February). Security and usability: Analysis and evaluation. In Availability, Reliability,
and Security, 2010. ARES'10 International Conference on (pp. 275-282). IEEE.
Nurse, J.R.C. et al. (2011, September). Guidelines for usable cybersecurity: Past and present. In Cyberspace
Safety and Security (CSS), 2011 Third International Workshop on (pp. 21-26). IEEE.
Jason R.C. Nurse | @jasonnurse
4
what are security features?
Do you remember them? Can you describe them?
Jason R.C. Nurse | @jasonnurse
5
what are usability features?
• Usability is a central concept to HCI, which considers how easy a
system is to use.
• 5 main components:
• Learnability: How easy is it for users to accomplish basic tasks the first time
they encounter the design?
• Efficiency: Once users have learned the design, how quickly can they
perform tasks?
• Memorability: When users return to the design after a period of not using
it, how easily can they re-establish proficiency?
• Errors: How many errors do users make, how severe are these errors, and
how easily can they recover?
• Satisfaction: How pleasant is it to use the design?
http://www.nngroup.com/articles/usability-101-introduction-to-usability/
Jason R.C. Nurse | @jasonnurse
6
why is usable security important?
https://pressupinc.com/blog/2014/04/write-passwords-never-reuse/
Jason R.C. Nurse | @jasonnurse
7
why is
usable
security
important?
https://wiki.sei.cmu.edu/confluence/display/seccode/Top+10+Secure+Coding+Practices
Jason R.C. Nurse | @jasonnurse
8
why is usable security important?
“We conclude that PGP
5.0 is not usable
enough to provide
effective security for
most computer users,
despite its attractive
graphical user interface,
supporting our
hypothesis that user
interface design for
effective security
remains an open
problem.”
Jason R.C. Nurse | @jasonnurse
9
the challenge of usable security
Can you think of any technology examples that do well in all
three, or at least Security & Usability? (2-3 mins)
Jason R.C. Nurse | @jasonnurse
10
summarising the main problems
• Security interfaces tend to be too confusing and clumsy
• Security is usually a secondary goal (and therefore users are unmotivated)
• Strain on users to remember several security settings, configurations and
passwords
• Task workload and increasing complexity of security systems and interfaces
• Abundance of technical terminology
• Forcing uninformed security decisions on users
Nurse, J.R.C. et al. (2011). Guidelines for usable cybersecurity: Past and present. In Cyberspace
Safety and Security (CSS), 2011 Third International Workshop on (pp. 21-26). IEEE.
Jason R.C. Nurse | @jasonnurse
11
outline
• What is Usable Security?
• Why is it important?
• How to do Usable Security:
• Guidelines
• Evaluation techniques
• But, it’s actually not this simple…
Jason R.C. Nurse | @jasonnurse
12
guidelines, or tips & tricks!
• Reduce mental load associated with cybersecurity system activities
• Make security state visible, and security functionality visible and accessible
• Give informative and useful feedback on security operations
• Design such that security does not reduce performance
• Give guidance on what tasks users need to perform and where necessary,
provide recommendations support
• Reduce the use of technical and security-specific terms and jargon
• Provide help, advice and documentation
Nurse, J.R.C. et al. (2011). Guidelines for usable cybersecurity: Past and present. In Cyberspace
Safety and Security (CSS), 2011 Third International Workshop on (pp. 21-26). IEEE.
Jason R.C. Nurse | @jasonnurse
13
example 1: passwords
Security says…
§ it is at least 8 characters in length,
§ contains at least three of the following
four character groups: an uppercase
letter (A - Z), a lowercase letter (a - z),
a number (0 - 9,), a non-alphanumeric character (e.g.!,
$, #, %)
§ has not been used in your previous 24 passwords, and
does not contain your username or full name.
But Usable Security
says…
Which guideline(s)
does this apply?
https://upload.wikimedia.org/wikipedia/commons/f/f1/Mediawiki_1.25_sign_in_form.png
Jason R.C. Nurse | @jasonnurse
14
example 1: passwords
Three random words or #thinkrandom (NCSC)
A good way to create a strong and memorable password is to use three
random words. Numbers and symbols can still be used if needed, for
example 3redhousemonkeys27!
Be creative and use words memorable to you, so that people can’t guess
your password. Your social media accounts can give away vital clues about
yourself so don’t use words such as your child’s name or favourite sports
team which are easy for people to guess.
Cyber criminals are very smart and know many of the simple substitutions
we use such as ‘Pa55word!” which utilises symbols to replace letters.
https://www.ncsc.gov.uk/blog-post/three-random-words-or-thinkrandom-0
Jason R.C. Nurse | @jasonnurse
15
example 2: passwords
Jason R.C. Nurse | @jasonnurse
16
example 3: pins
https://www.techlicious.com/blog/pattern-lock-for-android-easy-to-guess/
https://www.computerworld.com/article/3041302/
security/4-new-ways-to-bypass-passcode-lockscreen-on-iphones-ipads-running-ios-9.html
https://www.flickr.com/photos/intelfreepress/17199034187
Jason R.C. Nurse | @jasonnurse
17
Windows Hello
example 4: biometrics
http://www.techradar.com/how-to/software/how-to-use-windows-hello-1301455
Jason R.C. Nurse | @jasonnurse
18
example 4: biometrics
Making Windows 10 More Personal With Windows Hello
https://www.youtube.com/watch?v=1AsoSnOmhvU
Jason R.C. Nurse | @jasonnurse
19
outline
• What is Usable Security?
• Why is it important?
• How to do Usable Security:
• Guidelines
• Evaluation techniques
• But, it’s actually not this simple…
Jason R.C. Nurse | @jasonnurse
21
evaluation technique: expert evaluation
• Usability experts inspect usability aspects of a system using their
knowledge and a range of usability rules and heuristics
• Examples:
• cognitive walkthrough – walk through every task and assess it
• heuristic evaluations – compare with set of guidelines
• Benefits: Use of experts, allows focus on high-priority usability
principles
• Drawbacks: Unlikely to discover unforeseen usability problems
Nurse, J.R.C. et al. (2011). Guidelines for usable cybersecurity: Past and present. In Cyberspace
Safety and Security (CSS), 2011 Third International Workshop on (pp. 21-26). IEEE.
Jason R.C. Nurse | @jasonnurse
22
evaluation technique: expert evaluation
• A representative sample of users are recruited to participate in
experiments to test a cybersecurity system’s usability
• Examples:
• laboratory-based user testing, questionnaires, interviews, observing
users (one-way mirrors) and recording and assessing system use
• Benefits: Interaction with target group, supply rich sources of
data
• Drawbacks: Time consuming, expensive, need to find willing
participants
Jason R.C. Nurse | @jasonnurse
23
outline
• What is Usable Security?
• Why is it important?
• How to do Usable Security:
• Guidelines
• Evaluation techniques
• But, it’s actually not this simple…
Jason R.C. Nurse | @jasonnurse
24
graphical passwords – weaknesses
(via a study)
Study aim: Investigate the ability to predict graphical passwords i.e.,
where users would click.
Approach:
• Conducted online study with 150 participants
• Asked participants to select one of three images
• Asked them to create a password (using PassPoints, i.e., selecting 5 points in
sequence) using their image.
• Assessed where participants’ selected for their passwords and whether this could
be predicted based on the individual’s characteristics or any other factors, e.g.,
image saliency.
Devlin, M., Nurse, J.R.C., Hodges, D., Goldsmith, M., & Creese, S. (2015, August). Predicting graphical passwords. In International
Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 23-35). Springer, Cham.
Jason R.C. Nurse | @jasonnurse
25
graphical passwords – weaknesses
Pick an image,
and choose 3 points
that you would click.
(1 min)
Jason R.C. Nurse | @jasonnurse
26
graphical passwords – weaknesses
Jason R.C. Nurse | @jasonnurse
27
biometrics – weaknesses
https://www.flickr.com/photos/intelfreepress/17199034187
Jason R.C. Nurse | @jasonnurse
28
biometrics – weaknesses
How to fake a fingerprint and break into a phone https://www.youtube.com/watch?v=tj2Ty7WkGqk
Jason R.C. Nurse | @jasonnurse
29
usable security
“ User-centred design means understanding what your users
need, how they think, and
how they behave - and incorporating that understanding
into every aspect of your process (Jesse James Garrett)
”
Usable security applies all of the same principles, with a
focus on security.
Jason R.C. Nurse | @jasonnurse
30
summary
• What is Usable Security?
• Why is it important?
• How to do Usable Security:
• Guidelines
• Evaluation techniques
• But, it’s actually not this simple…
Thanks for coming!
Jason R.C. Nurse | @jasonnurse
31
Legal, professional and
ethical aspects:
Responsibility in Cyber
Sarah Turner, PhD Student and Research Associate
Institute of Cyber Security for Society
Stand for ambition.
kent.ac.uk
Overview of today’s talk
• Law
• Ethics
• How this might affect you
slt41@kent.ac.uk
thepublicturner
Unless otherwise credited, pictures from unsplash.com or iconfinder.com
The law
What type of things do you think of
when you think about how cyber
security and the law interact?
slt41@kent.ac.uk
thepublicturner
The law
What types of things related to
cyber security do you think could –
technically – be considered
criminal offences under English
law?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
• Unauthorised access to computer material
• Unauthorised access with intent to commit or facilitate commission of further offences
• Unauthorised modification of computer material
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
“…the CMA suffered a premature birth,
which left it weak and vulnerable when
the internet, as we know it, arrived…”
Macewan (2008)
Macewan, NF 2008, 'The Computer Misuse Act 1990: lessons from its past
and predictions for its future' , Criminal Law Review, 12 , pp. 955-967.
slt41@kent.ac.uk
thepublicturner
Image from Geekwire.com
The law
Computer Misuse Act 1990
• Unauthorised access to computer material
• Unauthorised access with intent to commit or facilitate commission of further offences
• Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of
computer
• Unauthorised acts causing, or creating risk of, serious damage
• Making, supplying, obtaining articles for use in offenses above
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
1) Unauthorised access to computer material
What does this mean?
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
1) Unauthorised access to computer material
What does this mean?
Knowingly accessing a computer – or parts of a computer system – that you are not allowed to.
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
1) Unauthorised access to computer material
What does this mean?
Knowingly accessing a computer – or parts of a computer system – that you are not allowed to.
What’s the punishment?
Up to 2 years imprisonment.
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
2) Unauthorised access with intent to commit or facilitate commission of further offences
What does this mean?
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
2) Unauthorised access with intent to commit or facilitate commission of further offences
What does this mean?
You do the offense in section 1 (accessing a computer you’re not allowed to access) to (try to)
carry out another offence – e.g. theft, blackmail (by using data on the computer).
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
2) Unauthorised access with intent to commit or facilitate commission of further offences
What does this mean?
You do the offense in section 1 (accessing a computer you’re not allowed to access) to (try to)
carry out another offence – e.g. theft, blackmail (by using data on the computer).
What’s the punishment?
Up to 5 years imprisonment.
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3) Unauthorised acts with intent to impair, or with recklessness as to impairing, operation
of computer
What does this mean?
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3) Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of
computer
What does this mean?
Doing something – intentionally or not – to hinder access to material on a computer
(the DDoS clause). Doesn’t have to be permanent impairment.
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3) Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of
computer
What does this mean?
Doing something – intentionally or not – to hinder access to material on a computer
(the DDoS clause). Doesn’t have to be permanent impairment.
What’s the punishment?
Up to 10 years imprisonment.
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3ZA) Unauthorised acts causing, or creating risk of, serious damage
What does this mean?
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3ZA) Unauthorised acts causing, or creating risk of, serious damage
What does this mean?
Computer misuse where the aim is to cause damage to – for example – critical national infrastructure,
and the maximum penalty from the prior section (3) isn’t enough.
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3ZA) Unauthorised acts causing, or creating risk of, serious damage
What does this mean?
Computer misuse where the aim is to cause damage to – for example – critical national infrastructure,
and the maximum penalty from the prior section (3) isn’t enough.
What’s the punishment?
Up to 14 years imprisonment.
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3A) Making, supplying, obtaining articles for use in offenses above
What does this mean?
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3A) Making, supplying, obtaining articles for use in offenses above
What does this mean?
Makes an offence of creating, selling, buying and using tools that can be used maliciously –
although it has to be proved that the individual was using/intending to use them maliciously.
What’s the punishment?
slt41@kent.ac.uk
thepublicturner
The law
Computer Misuse Act 1990
3A) Making, supplying, obtaining articles for use in offenses above
What does this mean?
Makes an offence of creating, selling, buying and using tools that can be used maliciously –
although it has to be proved that the individual was using/intending to use them maliciously.
What’s the punishment?
Up to 2 years imprisonment.
slt41@kent.ac.uk
thepublicturner
The law
In discussion with Jim Browning,
a scam baiter:
First presenter: “So why is it
illegal? I don't see why this
should be illegal?”
slt41@kent.ac.uk
thepublicturner
https://www.bbc.co.uk/programmes/p0b259nv
The law
Jim Browning: “...if I access somebody's
computer without their permission I'm
breaking a law - how far this goes because
don't forget the only way that I can access their
computers is if they tried to scam me and in fact
they have effectively illegally accessed my
computer to begin with - ...it's probably not
a defense against this...
I run that risk and I certainly wouldn't encourage
other people to do exactly what I do but I think
it's a balanced risk because I do enough to find
out who these guys are to expose their
techniques to help people.
Although that's not really a big defense I
think it's the only way that anyone can
actually at the moment get back at these
scammers.”
slt41@kent.ac.uk
thepublicturner
https://www.bbc.co.uk/programmes/p0b259nv
The law
Second interviewer: "... I guess there's a piece
of me that wonders could you be doing what
you're doing or something similar in a legal
way? Is there a structure that's part of a police
force, for example, that is looking at catching
these kinds of scammers?”
Jim Browning: “Yeah I've actually asked the
police exactly that question - why don't you
do what I have been doing? - I think it's
because of the laws here. Everybody is a little
bit nervous about [the fact that] as soon as you
access somebody's computer without their
permission then you can get yourself in
trouble and I guess the police can't be seen to
be doing that either. For me what should be
changing is the law around that.”
slt41@kent.ac.uk
thepublicturner
https://www.bbc.co.uk/programmes/p0b259nv
The law
The difficulty of dual use
• Tor "used to access the dark web"
• Virtual Machines "hide operating systems –
like Kali Linux"
• Kali Linux "often used for hacking"
• Wifi Pineapple "used to capture sensitive
data"
• Discord "often used to share hacking tips"
• Metasploit "makes hacking simple"
slt41@kent.ac.uk
thepublicturner
https://twitter.com/G_IW/status/1227700420178567170
The law
Computer Misuse Act 1990
Will we see change?
slt41@kent.ac.uk
thepublicturner
https://www.cyberupcampaign.com/news/new-research-legitimate-cyber-security-activities-in-the-21st-century
The law
It’s not just CMA 1990…
• Interception of communications in
the course of transmission – s3(1)
of the Investigatory Powers Act
2016
• Data Protection Act 2018, ss170173
• Disclosing personal data
without consent
• Procuring personal data
without consent
• Selling personal data without
consent
slt41@kent.ac.uk
thepublicturner
The law
slt41@kent.ac.uk
thepublicturner
Not all cyber crimes are just about computers
https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022
The law
Cyber enabled crime
• Economic
• Fraud
• IP theft (piracy, counterfeiting, forgery)
• Illegal items being sold online
• Malicious and offensive comms
• Offenses that specifically target individuals
• Revenge porn
• Cyber stalking, harassment
• Coercion, control
• Child sexual offenses
• Extreme pornography, obscene publications, prohibited images
slt41@kent.ac.uk
thepublicturner
https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022
The law
• 24 CMA offences
• Voyeurism
• Possessing indecent
images of children
• Making indecent images
of children
• Possessing extreme
pornographic images
• 26 months in
prison...various other
restraining orders etc
slt41@kent.ac.uk
thepublicturner
The law
Remembering a
friend's login details to
use their computer
without their
knowledge, reading
their messages.
Using a tool to knock a
friend offline, to stop
them winning the
online game you are
playing together.
slt41@kent.ac.uk
thepublicturner
Using a friend's
unlocked tablet to
access their gaming
account and buy
credits with the
attached credit card.
Hacking into a police
network, resulting in
delays to answering
emergency calls –
even though you didn't
intend this.
Downloading a tool to
bypass login
credentials – although
you haven't used it
yet...
https://www.nationalcrimeagency.gov.uk/who-we-are/publications/523-cyber-choices-hacking-it-legal-computer-misuse-act-1990/file
The law
slt41@kent.ac.uk
thepublicturner
The law
What was the most
commonly noted route
into cyber crime in the
National Crime Agency’s
“Pathways into Cyber
Crime” Intelligence
Assessment1?
slt41@kent.ac.uk
thepublicturner
1https://www.nationalcrimeagency.gov.uk/who-we-are/publications/6-pathways-into-cyber-crime-1/file
The law
Pathways into Cyber Crime (2017, based on research
between 2013-2017)
Primary gateway: online gaming forums (cheat websites,
modding forums)
Sense of community – wanting to learn and impress their
peers (and themselves): not necessarily a financial
motive at all
“Cyber crime is not solitary and anti-social…forum
interaction and building of reputation scores drives
you cyber criminals”
slt41@kent.ac.uk
thepublicturner
The law
https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/
slt41@kent.ac.uk
thepublicturner
Today’s Talk
• Law
• Ethics
• How this might affect you
slt41@kent.ac.uk
thepublicturner
Ethics
slt41@kent.ac.uk
thepublicturner
Tech and ethics is one of the most prevalent –
and tiring – problems of our time…
slt41@kent.ac.uk
https://twitter.com/pinkhairedcyn/status/1489062927785205760
https://www.bbc.com/worklife/article/20230127-how-worker-surveillance-is-backfiring-on-employers
https://www.technologyreview.com/2023/01/26/1067317/podcast-roomba-irobot-robot-vacuums-artificial-intelligence-training-dataprivacy-consent-agreement-misled/
thepublicturner
Ethics washing
slt41@kent.ac.uk
thepublicturner
Image from
https://twitter.com/alistairkyte/status/119904472100127
1297 / HBO “Silicon Valley” (2019)
Can corporations really ethics wash?
https://www.theverge.com/2021/4/13/22370158/google-ai-ethics-timnit-gebru-margaretmitchell-firing-reputation
https://www.businessinsider.com/twitter-trust-and-safety-council-member-dissolving-it-wasdangerous-2022-12?r=US&IR=T
slt41@kent.ac.uk
thepublicturner
So…what?
So, this is all well and good, but –
what does this mean for you?
slt41@kent.ac.uk
thepublicturner
So…what?
slt41@kent.ac.uk
https://www.wired.co.uk/article/internet-of-things-smart-home-domestic-abuse
https://nypost.com/2019/12/12/creep-hacks-familys-ring-camera-tells-tennessee-girl-hes-santa-claus/
https://themarkup.org/privacy/2021/12/06/the-popular-family-safety-app-life360-is-selling-precise-location-data-on-its-tens-of-millions-of-user
https://www.theguardian.com/technology/2022/jan/20/apple-airtags-stalking-complaints-technology
thepublicturner
So…what?
https://techmonitor.ai/technology/cybersecurity/rise-and-rise-of-bug-bounty-hunting
slt41@kent.ac.uk
thepublicturner
So…what?
Product Security and Telecommunications
Infrastructure Act 2022
Requires:
Manufacturers to receive and act on vulnerability
disclosures (section 10)
Authorised Representatives, Importers, Distributors
to limit sales or take other action in the case of knowing
about a manufacturer's failure to comply (e.g. with
updating on the back of vulnerability disclosures)
(sections 13, 16-20, 23-25)
slt41@kent.ac.uk
thepublicturner
Walking a tightrope…
https://youtu.be/gj4Ie_ausZ4
slt41@kent.ac.uk
thepublicturner
Walking a tightrope…
https://www.theregister.com/2021/02/12/footfallcam_twitter_kerfuffle/
https://arstechnica.com/tech-policy/2022/02/missouri-governors-wild-claims-about-journalist-debunked-in-police-report/
slt41@kent.ac.uk
thepublicturner
So…what?
https://www.sans.org/blog/ethical-phishing-the-slippery-slope-with-employee-deception/
slt41@kent.ac.uk
thepublicturner
So…what?
https://www.nytimes.com/2021/05/13/world/europe/phishing-test-covid-bonus.html
slt41@kent.ac.uk
thepublicturner
So…what?
https://twitter.com/ZetaZetan/status/1616628998314000384
slt41@kent.ac.uk
thepublicturner
What do you think about…
A researcher, intending to test the strength of an open-source
community's reviewing protocol, commits changes that fixes some issues
– but introduces other serious bugs – just to see if they get caught during
the review process. They do not get approval from anyone in the
community (or the university's ethics committee) to do this.
• Is this ethical?
• Who does this hurt?
slt41@kent.ac.uk
thepublicturner
What do you think about…
•
•
Is this ethical?
•
Is this white hat hacking?
•
What about the Hawthorne effect?
•
They pulled their commits before they made it too far...and no damage to the
system
Who does this hurt?
•
They wasted the time of the people checking their commits, who assumed they
were acting in good faith
•
"Nobody hired this group..."
•
Is it human experimentation?
https://www.theverge.com/2021/4/30/22410164/linux-kernel-university-of-minnesotabanned-open-source
slt41@kent.ac.uk
thepublicturner
What do you think about…
A student realises that some incorrectly flagged settings on Moodle
means that they can access the sample answers for all their upcoming
assessments. They tell their closest 50 friends. They do not flag it to
the course convenor.
• Is this ethical?
• Who does this hurt?
slt41@kent.ac.uk
thepublicturner
Thank
you
you.
Download