CSE331: Introduction to Networks and Security Lecture 15

advertisement
CSE331:
Introduction to Networks
and Security
Lecture 15
Fall 2002
Announcements
• Midterm graded
– Average: 65
– Solutions available on the web
– Pick up after class or during office hours
Today
• Introduction Computer Security
CSE331 Fall 2002
2
Real World Security
• Value: what is being protected?
– Things that have worth
• Locks, walls, safes, fences, …
– Scaled for what they’re protecting
– Scaled for what they’re protecting against (threats)
– Minimal interference (or else they aren’t used)
• Police & Courts
– Follow up after an attack/violation
– Perhaps most important!
CSE331 Fall 2002
3
Real World: Risk Managment
• People pay for security based on perceived
needs
• Trade off security vs.
–
–
–
–
Convenience / ease of use
Functionality
Efficiency
Cost
• Security is holistic:
– Attacks go for the weakest link
CSE331 Fall 2002
4
Security Terminology
• Vulnerability
– Weakness that can be exploited in a system
• Attack
– Method for exploiting vulnerability
• Threat
– A motivated, capable adversary that would mount
attacks
CSE331 Fall 2002
5
Example Vulnerabilities
• Poorly chosen passwords
• Software bugs
– unchecked array access (buffer overflow attacks)
• Automatically running active content: macros, scripts,
Java programs
• Open ports: telnet, mail
• Incorrect configuration
– file permissions
– administrative privileges
•
•
•
•
Untrained users/system administrators
Trap doors (intentional security holes)
Unencrypted communication
Limited Resources (i.e. TCP connections)
CSE331 Fall 2002
6
Example Attacks
• Password Crackers
• Viruses:
– ILoveYou (VBscript virus), Melissa (Word macro virus)
• Worms
– Code Red: Port 80 (HTTP), Buffer overflow in IIS
(Internet/Indexing Service)
• Trojan Horses
• Root kits, Back Orifice, SATAN
• Social Engineering:
– “Hi, this is Joe from systems, can you tell me your
password?”
• Packet sniffers: Ethereal
• Denial of service: TCP SYN packet floods
CSE331 Fall 2002
7
Range of Threats
• Concerted Attack by a Foreign Government
– Money & Resources
– Strong Motivation
• …
• Teenage Hacker
– No money
– ? Motivation
• Note: the range above doesn’t necessarily
represent a range of sophistication!
CSE331 Fall 2002
8
CERT Vulnerabilities
# Vulnerabilities Reported
Vulnerabilities
3500
3000
2500
2000
1500
1000
500
0
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003
Year
CSE331 Fall 2002
9
CERT Incidents
CERT Incidents
# Incidents Reported
80000
70000
60000
50000
40000
30000
20000
10000
0
1986 1988
1990 1992
Check out www.cert.org
1994 1996
1998 2000
2002 2004
YEAR
CSE331 Fall 2002
10
Questions for Computer Security
• What are we protecting?
– What has value?
– What are its characteristics?
• What tools do we have to use?
– Hardware
– Software
– Knowledge
• How do we effectively use those tools?
– What principles apply?
– How do we know what we want to achieve?
– How do we know what we’ve done?
CSE331 Fall 2002
11
Quality 1: Confidentiality
Data
• Keep data or actions secret.
• Related to: Privacy, Anonymity, Secrecy
• Examples:
–
–
–
–
Pepsi secret formula
Medical information
Personal records (e.g. credit card information)
Military secrets
CSE331 Fall 2002
12
Quality 2: Integrity
Data
• Protect the reliability of data against unauthorized
tampering
• Related to: Corruption, Forgery, Consistency
• Example:
– Bank statement agrees with ATM transactions
– The mail you send is what arrives
CSE331 Fall 2002
13
Quality 3: Availability
Data
• Resources must be there to use
• Related to: Reliability, Fault Tolerance, Denial of
Service
• Example:
– You want the web-server to reply to your requests
– The military communication devices must work
CSE331 Fall 2002
14
What tools are there?
•
Authorization mechanisms
– Access control
– Specifies who is allowed to do what.
•
Authentication mechanisms
– A principal is an entity that has a stake in the security of a
system
– Authentication identifies principals
– Examples: User identifiers & Passwords, secret keys
•
Audit mechansisms
– Monitoring, or logging security-relevant activities
– Permits follow-up after a security breech
•
Au = Aurum = “Gold standard”
CSE331 Fall 2002
15
Example tools
• Cryptography
– Protects confidentiality & Integrity
– Can be used for authentication
• Firewalls, access control monitors
– Authorization mechanisms
• OS Kernels
– Resource allocation/monitoring
• Replication
– Provides fault tolerance
• Java bytecode verifier
– Protects against faulty/malicious code
CSE331 Fall 2002
16
Security Policy
• Set of security requirements for a system
– Takes into account trade-offs of value vs.
functionality
– Changes over time
– Depends on context
• Varying degrees of formality
– Informal: Don’t reveal my credit card information.
– Formal: Government’s “Orange Book”
• National Computer Security Center (1988)
• Trusted Computer System Evaluation Criteria (TCSEC)
• Classes D –- A1
CSE331 Fall 2002
17
Download