ecture 2 - Philadelphia University

advertisement
Module 2
Security Methodology
MModified by :Ahmad Al Ghoul
PPhiladelphia University
FFaculty Of Administrative & Financial Sciences
BBusiness Networking & System Management Department
RRoom Number 32406
EE-mail Address: ahmad4_2_69@hotmail.com
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
1
Some standards bodies
 the IETF (the Internet Engineering Task
Force).
 AES the Advanced Encryption Standard
 ETSI (the European Telecommunications
Standards Institute)
 IEEE the Institute of Electrical and
Electronics Engineers
 ISO international standard organization
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
2
The 10 Major Headings










Security Policy
Security Organisation
Asset Classification and Control
Personnel Security
Physical and Environmental Security
Operational Management
Access Control
Systems Development and Maintenance
Business Continuity Management
Compliance
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
3
International Standards
 International Standards in Information
Security are developed by Security
Techniques Committee ISO/IEC
JTC 1 SC 27
 Three Areas
– WG 1 - Security Management
– WG 2 - Security Algorithms/Techniques
– WG 3 - Security Assessment/Evaluation
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
4
Participating Members
 SAI Australia
 KATS Korea, Rep of
 IBN Belgium
 DSM Malaysia
 ABNT Brazil
 NEN Netherlands
 SCC Canada
 CSBTS/CESI









 NTS/IT Norway
China
CSNI Czech Rep
DS Denmark
SFS Finland
AFNOR France
DIN Germany
MSZT Hungary
BIS India
UNINFO Italy
JISC Japan
Network Security
Philadelphia University
 PKN Poland
 GOST R Russian Fed
 SABS South Africa
 AENOR Spain
 SIS Sweden
 SNV Switzerland
 BSI UK
 DSTU Ukraine
 ANSI USA
Ahmad Al-Ghoul 2010-2011
5
WG 1 Security Management
 Two key standards:
– Guidelines for Information Security Management (GMITS) (TR
13335)
– Code of Practice for Information Security Management (IS 17799)
 Other standards:
– Guidelines on the use and management of trusted third parties (TR
14516)
– Guidelines for implementation, operation and management of
Intrusion Detection Systems (WD 18043)
– Guidelines for security incident management (WD 18044)
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
6
WG 2 Security Techniques
 There are International Standards for:
– Encryption (WD 18033)
– Modes of Operation (IS 8372)
– Message Authentication Codes (IS 9797)
– Entity Authentication (IS 9798)
– Non-repudiation Techniques (IS 13888)
– Digital Signatures (IS 9796, IS 14888))
– Hash Functions (IS 10118)
– Key Management (IS 11770)
– Elliptic Curve Cryptography (WD 15946)
– Time Stamping Services (WD 18014)
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
7
WG 3 Security Evaluation
 Third Party Evaluation
– Criteria for an independent body to form an
impartial and repeatable assessment of the
presence, correctness and effectiveness of
security functionality
 “Common Criteria” (CC) (IS 15408
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
8
Common Criteria
 Produced by a consortium of Government bodies
in North America / European Union
– Mainly National Security Agencies
 Influenced by International Standardisation
committee
– Adopted as International Standard 15408
 Adopted and recognised by other major
Governments
– All EU, Australia, Japan, Russia
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
9
 Security Architecture
– For end-to-end communications
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
10
Security Architecture
for End-to-End Communications
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
11
 Authentication is the process of confirming a
user's identity.
 Authentication is one of the basic building blocks
of computer security. It is achieved through the
execution of an authentication protocol between
two or more parties. One such protocol, the Secure
Socket Layer (SSL) protocol
 Authorization determines what services and
access a user is authorized for.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
12
Authentication
3 types of authentication:

Something you know - Password, PIN,
mother’s maiden name, passcode.
Something you have - ATM card, smart
card, token, key, ID Badge, driver license,
passport

Something you are - Fingerprint, voice
scan, DNA
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
13
 Authentication is a process in which a
system identifies a user. Access control
determines what is permitted after
authentication. Authentication is often
closely tied to the concept of accounts,
which are, generically, a set of information
tied to a unique identifier. This information
usually comprises the data needed to let
someone use system resources. For
example, it provides the location of the
user's personal files or the user's real name.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
14
Models: Access Control
• What is access control?
– Limiting who is allowed to do what
• What is an access control model?
– Specifying who is allowed to do what
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
15
What is access control?
 Access control is the heart of security
 Definitions:
– The ability to allow only authorized users, programs or
processes system or resource access
– The granting or denying, according to a particular
security model, of certain permissions to access a
resource
– An entire set of procedures performed by hardware,
software and administrators, to monitor access, identify
users requesting access, record access attempts, and
grant or deny access based on reestablished rules.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
16
How can AC be implemented?
– Hardware
– Software
• Application
• Protocol (Kerberos, IPSec)
– Physical
– Logical (policies)
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
17
What does AC hope to protect?
 Data - Unauthorized viewing, modification
or copying
 System - Unauthorized use, modification or
denial of service
 It should be noted that nearly every network
operating system (NT, Unix, Vines,
NetWare) is based on a secure physical
infrastructure
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
18
Access control lists (ACL)
 A file used by the access control system to
determine who may access what programs
and files, in what method and at what time
 Different operating systems have different
ACL terms
 Types of access:
– Read/Write/Create/Execute/Modify/Delete/Ren
ame
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
19
Defending Against Threats
 When talking about information security, vulnerability is a
weakness in your information system (network, systems,
processes, and so on) that has the greatest potential of
being compromised. There might be a single vulnerability,
but typically there are a number of them. For instance, if
you have five servers that have the latest security updates
for the operating system and applications running, but have
a sixth system that is not current, the sixth system would
be considered a vulnerability. Although this would be a
vulnerability, it would most likely not be the only one. To
defend against threats, you must identify the threats to your
C-I-A triad, determine what your vulnerabilities are, and
minimize them.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
20
Building a Defense
 When building a defense, you should use a layered approach
that includes securing the network infrastructure, the
communications protocols, servers, applications that run on the
server, and the file system, and you should require some form of
user authentication.
 When you configure a strong, layered defense , an intruder has
to break through several layers to reach his or her objective. For
instance, to compromise a file on a server that is part of your
internal network, a hacker would have to breach your network
security, break the server's security, break an application's
security, and break the local file system's security. The hacker
has a better chance of breaking one defense than of breaking
four layers of defense.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
21
Methods of Defense
 Having controls does no good unless they are used
properly, the next are some factors that affect the
effectiveness of controls.
 Effectiveness of Controls
– Awareness of Problem
– Likelihood of Use: the suitable and effective use
– Overlapping Controls: combinations of controls could be
provided to one exposure.
– Periodic Review: few controls are permanently effective.
When we finds a way to secure assets, the opposition doubles its
efforts in an effort to defeat the the security mechanism. Thus,
judging the effectiveness of a control is an ongoing task.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
22
–Principle of Effectiveness:
Controls must be used to be effective. They must
be efficient, easy to use, and appropriate.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
23
Methods of Defense
 Controls
 In this section we will study some security
control tools that attempt to prevent exploitation
of the vulnerabilities of computing system.
 Encryption
 Software Controls
– internal program controls(data base): parts of the
program that enforce security restrictions, such as
access limitations in a data base management program.
– operating system controls: limitations enforced
by the system to protect each user from all other users.
– development controls: quality standards under
which a program is designed, coded, tested, and
maintained.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
24
Methods of Defense
 Hardware Controls
– use the devices which have been invented to assist in computer security
(e.g. smart card)
 Hardware security modules (HSM) perform cryptographic operations,
protected by hardware (PCI boards, SCSI boxes, smart cards, etc.)
 These operations include:
– Random number generation
– Key generation (asymmetric and symmetric)
– Private key hiding (security) from attack (no unencrypted private
keys in software or memory)
• Private keys used for signing and decryption
• Private keys used in PKI for storing Root Keys
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
25
Methods of Defense
 Policies
– operation policy: some of the simplest controls could do by change the
password frequently, and that can be achieved essentially no cost but with
tremendous effect.
– legal and ethical control:the law is slow to evolve, and the technology
involving computers has emerged suddenly. Although legal protection is
necessary and desirable.
– The area of computer ethics is unclear. It is not that computer people are
unethical, but rather that society in general and the computing community
in particular have not adopted formal standards of ethical behavior. Some
organizations are attempting to devise codes of ethics for computer
professionals.
 Physical Controls
– Some of the easiest, most effective, and least expensive controls
are physical controls. locks on door, guard at entry point, backup,
etc.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
26
Basic Encryption and Decryption
 Encryption and Decryption
– encryption: a process of encoding a message so that its
meaning is not obvious
– decryption: the reverse process
 encode(encipher) vs. decode(decipher)
– encoding: the process of translating entire words or
phrases to other words or phrases
– enciphering: translating letters or symbols individually
– encryption: the group term that covers both encoding
and enciphering
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
27
What is Encryption?
This is
confidential.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
28
What is Encryption?
CJIN Network
This is
confidential.
This
is
Confiden
tial.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
29
Plaintext vs. Ciphertext
 Plaintext vs. Ciphertext
– P(plaintext): the original form of a message
– C(ciphertext): the encrypted form
 Basic operations
– plaintext to ciphertext: encryption: C = E(P)
– ciphertext to plaintext: decryption: P = D(C)
– requirement: P = D(E(P))
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
30
Encryption Strategy
 Provide confidentiality of communications
 Ensure integrity of information
 Enhance Authentication
 Provide for non-repudiation of sender or
receiver
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
31
Encryption with key
–
–
–
–
encryption key: KE
daecryption key: KD
C = E(KE, P)
P = D(KD, E(KE, P))
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
32
Encryption with key
 Symmetric Cryptosystem: KE = KD
 Asymmetric Cryptosystem: KE  KD
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
33
Secret Key Encryption
Not a
secure
line
This is a
secret message
1. Bob types message to Jane and
encrypts the message with secret
key and sends it.
3. Somehow he lets her know
what his secret key is.
Network Security
Philadelphia University
This is a
secret message
1. Jane receives Bobs secret
message and is later told by Bob
the secret key to unlock the
message
2. She decrypts and reads the
message
Ahmad Al-Ghoul 2010-2011
34
Public Key Encryption
Bob
Jane,
This is a secret
message
- Bob
Jane
Not a
secure
line
Jane’s public key
Jane,
This is a secret
message
- Bob
Jane’s private key
1. Bob writes the message and
encrypts it using Jane’s public
key which is known to everyone
1. Jane receives the message
and decodes it with her private
key, which only she knows.
2. Bob sends the message over
the internet to Jane
2. The secrecy of the private
key is crucial
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
35
Uses of Encryption
 Digital Certificates use Public Key
 Web Access with SSL
 Virtual Private Networks (VPNs)
 Desktop Encryption
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
36
Digital signature
Digital signature is a sort of
protocol that provides authenticity
and identification of the user.
It is similar to the signature of a
person on a paper or check
It is used for many purposes in the
network security provision
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
37
Physical security
 Network security should begin by first
emphasizing the necessity for physical
security. Most organizations limit physical
access to hosts and servers, but it must talk
into consideration networking devices, such
as routers, switches, and the like. Even such
simple elements as cabling and wiring.
Network Security
Philadelphia University
Ahmad Al-Ghoul 2010-2011
38
Download