Information Security Summary

advertisement
Class 10
Information Security Summary
Chapter 9 of the Executive Guide to
Information Security
10 Essential Components of
Information Security
1. “C” level management owns the Information
Security program for appropriate resources
allocations
2. Assign a Full-time, Experienced, Senior-Level
staff responsibility for Information Security
3. Establish Cross-functional Information
Security Governance Board to develop and
enforce policies compliance
4. Establish Metrics and SLAs to monitor
program operation
5. Implement Ongoing Security Improvement
Program
6. Conduct Periodic Independent Audits
7. Layer Security at Gatway, Server, Client
8. Separate Computing Environment into Zone
9. Start with Basic & Improve Program
10.Consider Information Security an Essential
Investment
#
Critical Security Control
Control Description
1
Inventory of Authorized and
Unauthorized Devices
Actively manage (inventory, track, and correct) all hardware
devices on the network so that only authorized devices are given
access, and unauthorized and unmanaged devices are found and
prevented from gaining access.
2
Inventory of Authorized and
Unauthorized Software
Actively manage (inventory, track, and correct) all software on
the network so that only authorized software is installed and can
execute, and that unauthorized and unmanaged software is
found and prevented from installation or execution.
3
Secure Configurations for
Hardware and Software on
Mobile Devices, Laptops,
Workstations, and Servers
Establish, implement, and actively manage (track, report on,
correct) the security configuration of laptops, servers, and
workstations using a rigorous configuration management and
change control process in order to prevent attackers from
exploiting vulnerable services and settings.
4
Continuous Vulnerability
Continuously acquire, assess, and take action on new information
Assessment and Remediation in order to identify vulnerabilities, remediate, and minimize the
window of opportunity for attackers.
5
Malware Defenses
Control the installation, spread, and execution of malicious code
at multiple points in the enterprise, while optimizing the use of
automation to enable rapid updating of defense, data gathering,
and corrective action
#
Critical Security Control
Description
6
Application Software Security Manage the security lifecycle of all in-house developed and
acquired software in order to prevent, detect, and correct
security weaknesses
7
Wireless Access Control
The processes and tools used to track/control/prevent/correct
the security use of wireless local area networks (LANS), access
points, and wireless client systems.
8
Data Recovery Capability
The processes and tools used to properly back up critical
information with a proven methodology for timely recovery of it.
9
Security Skills Assessment
and Appropriate Training to
Fill Gaps
For all functional roles in the organization (prioritizing those
mission-critical to the business and its security), identify the
specific knowledge, skills, and abilities needed to support defense
of the enterprise; develop and execute an integrated plan to
assess, identify gaps, and remediate through policy, organizational
planning, training, and awareness programs.
10
Secure Configurations for
Network Devices such as
Firewalls, Routers, and
Switches
Establish, implement, and actively manage (track, report on,
correct) the security configuration of network infrastructure
devices using a rigorous configuration management and change
control process in order to prevent attackers from exploiting
vulnerable services and settings.
#
Critical Security Control
Control Description
11
Limitation and Control of
Network Ports, Protocols,
and Services
Manage (track/control/correct) the ongoing operational
use of ports, protocols, and services on networked devices
in order to minimize windows of vulnerability available to
attackers.
12
Controlled Use of
Administrative Privileges
The processes and tools used to
track/control/prevent/correct the use, assignment, and
configuration of administrative privileges on computers,
networks, and applications.
13
Boundary Defense
Detect/prevent/correct the flow of information
transferring networks of different trust levels with a focus
on security-damaging data.
14
Maintenance, Monitoring, Collect, manage, and analyze audit logs of events that
and Analysis of Audit Logs could help detect, understand, or recover from an attack.
15
Controlled Access Based
on the Need to Know
The processes and tools used to
track/control/prevent/correct secure access to critical
assets (e.g., information, resources, systems) according to
the formal determination of which persons, computers,
and applications have a need and right to access these
critical assets based on an approved classification.
#
Critical Security Control
Control Description
16
Account Monitoring and
Control
Actively manage the life-cycle of system and application
accounts - their creation, use, dormancy, deletion - in order to
minimize opportunities for attackers to leverage them.
17
Data Protection
The processes and tools used to prevent data exfiltration,
mitigate the effects of exfiltrated data, and ensure the privacy
and integrity of sensitive information.
18
Incident Response and
Management
Protect the organization's information, as well as its reputation,
by developing and implementing an incident response
infrastructure (e.g., plans, defined roles, training,
communications, management oversight) for quickly discovering
an attack and then effectively containing the damage,
eradicating the attacker's presence, and restoring the integrity of
the network and systems.
19
Secure Network Engineering
Make security an inherent attribute of the enterprise by
specifying, designing, and building-in features that allow high
confidence systems operations while denying or minimizing
opportunities for attackers.
20
Penetration Tests and Red Test the overall strength of an organization's defenses
Team Exercises
(the technology, the processes, and the people) by
simulating the objectives and actions of an attacker.
SANS Critical Security Controls for
Effective Cyber Defense
Cyber Threat Watch as of 11/5/2014
https://cyberthreatwatch.wellsfargo.net/CyberThreatWatch/
Apple iTunes Breach Claimed by Anon-Sec
Posted on November 5, 2014 by Daniel Kalusz
•
•
•
Security researchers reported a data dump of approximately 3.8 million users
account with plain text passwords posted to a public website Pastebin. Anonymous
hacktivist group known as Anon-Sec claims to have breached iTunes and they are
in possession of 3.8 million accounts to various organizations. The initial post was
released on November 4, 2014, and was reported by the hackers as just a sample
of the first-thousand of the 3.8 million. Anon-Sec indicates that they will continue
to publicly post the remaining user accounts and clear-text passwords in small
portions until the account data is completely dumped. Currently, the Apple iTunes
data dump may have been attributed to multiple separate attacks over a period of
time using password guessing, brute force, and phishing campaigns, and not a
single breach event.
Apple has not addressed the alleged hack or publicly commented; however, the
usernames and passwords do not follow the current password policy length and
complexity. Therefore, it is suspected that this data dump may have been stolen
from other services such as password managers or online stores that use federated
IDs to Apple iTunes accounts.
CTI Analysis: Anon-Sec may have falsified claims that this data was from an iTunes
breach in an effort to gain notoriety for Guy Fawkes Day (November 5th). The data
could have been from other websites or older username and password lists the
hacker’s bulked together to make it look like a large data breach occurred. CTI will
continue to monitor Pastebin for additional warnings and indicators related to the
alleged data breach
AirHopper — Hacking Into an Isolated Computer Using FM Radio Signals
Posted on November 4, 2014 by Vijay Thavasi muthu
• The researchers in Israel have developed a malware called AirHopper
which uses a keylogger technique and can capture the keystrokes from a
computer using radio signals. The researchers’ claim that a computer with
no connectivity to any network can still transmit the data using radio FM
signals. The new application known as AirHopper works by using the FM
radio receiver included in some mobile phones. AirHopper captures the
keystrokes by intercepting radio transmissions emanating from the
monitor or display unit of an isolated computer. Radio signals that can
transmit modulated data is then received and decoded by the FM radio
receiver built into mobile phones. Researchers have demonstrated in a
video showing the ability of AirHopper to capture the keystrokes from an
isolated computer (air-gap) at a distance of 1-7 meters with a bandwidth
of 13-60 bytes per second
• CTI Analysis: The new technology using FM radio signals does pose a
serious concern with regard to data security. Though it was developed by
the researchers with the intent of protecting against such
attacks/intrusions in near future it can be used/exploited by the people or
organizations with malicious intentions. The frequency level of the
monitor that can be compromised using AirHopper is currently unknown.
CTI will continue to research to determine complexity and feasibility.
Ebola Phishing Scams and Malware Campaigns
Posted on October 31, 2014 by Justin Cunnane
•
•
•
•
•
•
•
•
Malicious campaigns utilizing Ebola-related topics began appearing sporadically
throughout the summer with a significant increase throughout October. These
scams prompted US-Cert to release an advisory warning the public on such
campaigns. The victims are not targeted with spear-phishing campaigns; anyone
with an internet presence could potentially be impacted. A few of the current
campaigns have been observed attempting to infect the user with malware
variants such as the DarkComet RAT and Zeus Trojan as well as leveraging recent
zero-day vulnerabilities in order to gain access and control over the victim’s
machine.
This type of ‘current event’ scam campaign generally breaks down into five
categories of purpose; listed below in order of potential severity to the victim:
Deliver malware
Phish for Basic User Information and Personally Identifiable Information (PII)
419 Scams – scams originating from Nigeria that attempt to trick victims into
providing money as an ‘advanced fee’ in order to receive a large amount of money
Click fraud/Web Traffic Generating
Nuisance/Trolling, but essentially harmless spam
The ongoing Ebola campaigns have touched on all of these categories. Social
networking sites have seen an array of click fraud-related scams that attempt to
lure the user into clicking links by using far-fetched headlines, such as:
Ebola Cont.
• The threat actors play on the victims desire to satisfy
their curiosity, click the link, and be sent through a
series of website redirects that ultimately end with the
victim presented with a scam survey (sometimes
referred to as ‘click fraud’) to fill out or prompts for
downloading software known as potentially unwanted
program (PUP) which are bundles of freeware that,
while not directly malicious, will negatively impact the
victim’s machine via unwanted activities, such as:
• Display pop-up ads
• Change the user’s default settings
• Install unwanted apps such as search bars and tool bars
in browsers
• Automatically redirect users to specific unwanted
browsers and search engines
Ebola Cont.
• The more severe Ebola-related campaigns have been observed
beginning in mid-October and come in the form of email spam with
malicious attachments and/or links. The emails claim to be from
various senders, primarily the World Health Organization (WHO)
under the guise of contacting the victim to provide ‘Ebola Safety
Tips’, which are conveniently provided in an email attachment. One
such campaign infected the user with the DarkComet Remote
Access Trojan (RAT) which essentially allows the attacker access and
control to the victim’s machine enabling them to proceed with a
long list of potentially malicious activity including data exfiltration,
keylogging, executing shell commands and more. Researchers at
Symantec also observed infections in the same manner that
involves malware variants such as Trojan.Zbot (Zeus), Trojan.Blueso,
Backdoor.Breut and W32.SpyRat (worm).
Sony Experia Devices Secretly Sending User Data to Servers in China
Posted on October 31, 2014 by Vijay Thavasi muthu
Sony Smartphones has been found sending User data secretly to the servers in China.
Users running Android version 4.4.2 or 4.4.4 on their phone found communications
with the servers back in China. The users have found a presence of a folder called
Baidu (which some claim to be created automatically and it is considered as spyware).
Deleting this folder yielded no result as the folder gets created again (automatically)
without the users knowledge. Even unchecking the folder from device administrator
has zero effect on this folder. It is claimed that with the help of Baidu folder the
following information can be retrieved:
• Read status and identity of your device
• Make pictures and videos without your knowledge
• Get your exact location
• Read the contents of your USB memory
• Read or edit accounts
• Change security settings
• Completely manage your network access
• Couple with Bluetooth devices
• Know what apps you are using
• Prevent your device from entering sleep mode
• Change audio settings
• Change system settings
Sony Experia Devices Secretly Sending User Data to Servers in China
Cont.
The affected devices includes Sony Experia Z3 and Z3 Compact, though it is not limited
to Sony as users with phones like HTC One M7, HTC One X also have the presence of
Baidu folder in their respective handsets.
• The following steps have been recommended for to disable Baidu Spyware for
Sony Smartphones:
• Backup important data and factory reset the device.
• Turn on the device and go to Settings -> Apps -> Running and Force stop both
“MyXperia” apps.
• Then remove the baidu folder using File Kommander app.
• Go to Settings -> About Phone -> Click 7 times on the Build Number to enable
developer mode.
• Download or Install the Android SDK on your computer and then connect the Sony
device to it using USB cable.
• Run the adb tool terminal : adb shell
• In adb shell, type the command: pm block com.sonymobile.mx.android
• Exit adb shell
• Reboot the device
CTI Analysis: It is unknown exactly how the reported spyware was embedded in the
new devices. Previously, the Huawei and Xiaomi have been discovered have backdoors
and spyware or secretly send data to servers in China on mobile devices.
Xiaomi Phones Secretly Sending Users’ Sensitive Data to Chinese Servers
Posted on October 30, 2014 by Vijay Thavasi muthu
Xiaomi (also known as Apple of China), which is Chinese telecoms equipment supplier made foray into
the Indian market with its mobile phone called RedMi 1S. The phone has a good configuration and is
available at a decent price attracting a lot of buyers. Researchers and users of the phone have found
that Xiaomi RedMi 1S phone is sending data from the phone to the servers in China
“api.account.xiaomi.com” even when the Backup – Data option is turned off. Xiaomi RedMi phone has
been sending data like IMEI of the phone, IMSI Number (through Mi Cloud – like ICloud in IPhone) ,
Contact details , Text messages.
•
Researchers have found that the Xiaomi phones keeps trying to make a connection with an IP
address based in Beijing, China even after turning off the cloud service on the phone called Micloud services (like ICloud in Apple Phone).
•
The Indian Government Agencies have already issued a circular to its personnel asking them to
avoid using the phone. Xiaomi did accept that RedMi 1S phone is sending information (Did not
mention sensitive information) to it servers based in China. They assured that they will route all the
users data to the servers based in Singapore and other locations other than China.
• (http://thehackernews.com/2014/08/xiaomi-phones-secretly-sending-users.html)
CTI Analysis: Many Chinese products have been reported in the past for suspected backdoor entry and
various organizations and institutions have banned the use of it us about using it. In 2012, ZTE and
Huawei Technologies Co Ltd smartphones were discovered to have a backdoor.
•
ZTE Confirms Security Hole in U.S. Phone
• (https://cyberthreatwatch.wellsfargo.net/CyberThreatWatch/?p=21397)
•
However, it is recommended to keep the people and other community aware of. The US
government is aware of backdoor entry features of Chinese products and has been caution these
new products to prevent personal information being used for any malicious activity.
Download