Uploaded by Andrew

conklin principlesofcomputersecurity 6e Chap001 PPT

advertisement
Principles of Computer Security, Sixth Edition
Introduction and Security
Trends
Chapter 1
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Objectives
• Define computer security
• Discuss common threats and recent computer crimes
that have been committed
• List and discuss recent trends in computer security
• Describe common avenues of attacks
• Describe approaches to computer security
• Discuss the relevant ethical issues associated with
computer security
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Key Terms (1 of 2)
• Advanced persistent
threat (APT)
• Computer security
• Critical infrastructure
• Cybersecurity kill chain
• Elite hacker
• Hacker
• Hacking
• Hacktivist
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
• Highly structured threat
• Information Sharing and
Analysis Center (ISAC)
• Information Sharing and
Analysis Organization
(ISAO)
• Information warfare
• Open source intelligence
(OSINT)
Principles of Computer Security, Sixth Edition
Key Terms (2 of 2)
•
•
•
•
Script kiddie
State actors
Structured threat
Tactics, techniques, and
procedures (TTPs)
• Threat Intelligence
• Unstructured threat
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
The Computer Security Problem (1 of 2)
• Fifty years ago companies did not conduct business
across the Internet
– Today millions of people perform online transactions every
day
– Companies rely on the Internet to operate and conduct
business
– Vast amounts of money are transferred via networks, in
the form of either bank transactions or simple credit card
purchases
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
The Computer Security Problem (2 of 2)
• There are many different ways to attack computers
and networks
– Identity theft is so common today that most everyone
knows somebody who’s been a victim of such a crime, if
they haven’t been a victim themselves
– Many other types of criminal activity and all are on the rise
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Definition of Computer Security (1 of 2)
• Computer security is not a simple concept to define
– If one is referring to a computer, then it can be considered
secure when the computer does what it is supposed to do
and only what it is supposed to do
– The security emphasis has shifted from the computer to
the information being processed
• Information security is defined by the information
being protected from unauthorized access or
alteration
– Available to authorized individuals when required
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Definition of Computer Security (2 of 2)
• Information is stored, processed, and transferred
between machines
– All of these different states require appropriate protection
schemes
– Information assurance is a term used to describe not just
the protection of information, but a means of knowing the
level of protection that has been accomplished
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Historical Security Incidents (1 of 3)
• Electronic crime can take a number of different forms
– Two basic categories
• Crimes in which the computer was the target
• Incidents in which a computer was used to perpetrate
the act (e.g., bank fraud)
• Virus activity existed prior to 1988
– Started in the early 1980s
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Historical Security Incidents (2 of 3)
• The Morris Worm
(November 1988)
• Citibank and Vladimir
Levin (June–October
1994)
• Kevin Mitnick (February
1995)
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
• Worcester Airport and
“Jester” (March 1997)
• The Melissa Virus
(March 1999)
• The Love Letter Virus
(May 2000)
Principles of Computer Security, Sixth Edition
Historical Security Incidents (3 of 3)
• The Code Red Worm
(2001)
• The Slammer Worm
(2003)
• Cyberwar? (2007)
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
• Operation Bot Roast
(2007)
• Conficker (2008–2009)
• U.S. Electric Power Grid
(2009)
• Fiber Cable Cut (2009)
Principles of Computer Security, Sixth Edition
The Current Threat Environment (1 of 2)
• More organized elements of cybercrime have
entered the picture along with nation-states
– From 2009 and beyond, the cyber threat landscape
became considerably more dangerous, with new
adversaries out to:
• Deny the use of your computer systems
• Use systems for financial gain including theft of
intellectual property or financial information including
personally identifiable information
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
The Current Threat Environment (2 of 2)
• Advanced Persistent
Threats (APTs)
• GhostNet (2009)
• Operation Aurora
(2009)
• Stuxnet, Duqu, and
Flame (2009–2012)
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
• Sony (2011)
• Saudi Aramco
(Shamoon, 2012)
• Data Breaches
(2013–present)
• Nation-State Hacking
(2013–present)
Principles of Computer Security, Sixth Edition
Infrastructure Attacks (1 of 2)
• Ukraine electric grid
– Cyber-attacked on December 23, 2015
– Full restoration took more than a year
– May be attributable to Russian government using
BlackEnergy3 malware
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Infrastructure Attacks (2 of 2)
• Safety Instrumentation System Attack (TRITON)
– In 2017, security technicians discovered a new form of
malware in a Saudi Arabian petrochemical plant
• Targeted the plant’s safety instrumentation systems,
making this an interesting attack because, on its face, it
does nothing
– In the event of something going wrong with the plant
operations, the safety instrumentation system is there to
protect life and property
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Ransomware
• Ransomware originated back to the mid-to-late
1990s
– Now represents a $1 billion/year criminal enterprise
– Most current attacks use a hybrid encrypting scheme,
locking files on a victim’s computer until a ransom is paid
• Major attacks
– WannaCry
– NotPetya
– SolarWinds attack
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Threats to Security
• There are a number of ways we can break down the
various threats
– External versus internal threats
– Sophistication of the attacks: script kiddies versus elite
hackers
– Highly structured threats to unstructured threats
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Viruses and Worms (1 of 2)
• Generally you will not have to worry about your
employees writing or releasing viruses and worms
• Organization may be exposed to viruses and worms
as a result of employees not following certain
practices or procedures
– It is important to draw a distinction between the writers of
malware and those who release malware
– Debates over the ethics of writing viruses permeate the
industry, but simply writing them is not considered a
criminal activity
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Viruses and Worms (2 of 2)
• Viruses and worms are the most common problem
that an organization faces
– Literally thousands of them have been created and
released
– Antivirus software and system patching can eliminate the
largest portion of this threat
• Viruses and worms generally are nondiscriminating
threats
– Typically are also highly visible once released
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Intruders (1 of 4)
• Hacking: act of deliberately accessing computer
systems and networks without authorization
– Also applies to the act of exceeding one’s authority in a
system
– Hackers: individuals who conduct this activity
• Intruders are extremely patient
– Process takes persistence and dogged determination
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Intruders (2 of 4)
• Attacks by an individual or even a small group of
attackers fall into the unstructured threat category
– Attacks at this level generally:
• Are conducted over short periods of time (lasting at
most a few months)
• Do not involve a large number of individuals
• Have little financial backing
• Are accomplished by insiders or outsiders who do not
seek collusion with insiders
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Intruders (3 of 4)
• Intruders definitely come in many different varieties
and have varying degrees of sophistication
– Script kiddies do not have the technical expertise to
develop scripts or discover new vulnerabilities in software
– At the next level are those people who are capable of
writing scripts to exploit known vulnerabilities
– At the top are highly technical individuals, often referred
to as elite hackers
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Intruders (4 of 4)
Figure 1.1 Distribution of attacker skill levels
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Insiders
• Insiders are more dangerous in many respects than
outside intruders
– Have the access and knowledge necessary to cause
immediate damage to an organization
– Frequently have knowledge of the security systems in
place and are better able to avoid detection
• Numerous other individuals have physical access to
company facilities
– Custodial crews, contractors, or partners
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Criminal Organizations
• Criminal activity on the Internet is basically no
different from criminal activity in the physical world
– One difference is the level of organization that criminal
elements employ in their attack
• Attacks by criminal organizations usually fall into the
structured threat category
–
–
–
–
Greater amount of planning
Longer period of time to conduct the activity
More financial backing to accomplish it
Possibly corruption of, or collusion with, insiders
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Nation-States, Terrorists,
and Information Warfare (1 of 2)
• Many nations today have developed to some extent
the capability to conduct information warfare
– Warfare conducted against the information and
information processing equipment used by an adversary
• Information warfare falls into the highly structured
threat category
– Much longer period of preparation (years not uncommon)
– Tremendous financial backing
– Large and organized group of attackers
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Nation-States, Terrorists,
and Information Warfare (2 of 2)
• An interesting aspect of information warfare is the
list of possible targets available
– Military forces are still a key target in information warfare
– Critical infrastructures are those whose loss would have
severe repercussions on the nation
• Water, electricity, oil and gas refineries and distribution,
banking and finance, telecommunications
• Dependent on computer systems
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Brand-Name Attacks
• In an effort to develop markets and brands, groups
have developed sets of malware
–
–
–
–
–
–
Energetic Bear
Sandworm
Shadow Brokers
Equation Group
Regin
Cozy Bear and Fancy Bear
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
- Vault7
- Lazarus Group
- Comment Crew
- Anonymous
Principles of Computer Security, Sixth Edition
Attributes of Actors
• Other ways to differentiate threat actors besides by
abilities are by:
–
–
–
–
Location (internal or external)
Level of sophistication
Level of resources
Intent
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Security Trends
• The computing environment has transformed from
large mainframes to a highly interconnected network
of smaller systems
– There is a switch from a closed operating environment to
one in which access to a computer can occur from almost
anywhere on the planet
• Greatly complicated the job of the security professional
• Attackers have become more focused on gain over
notoriety
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Targets and Attacks
• Two general reasons a particular system is attacked
– It is specifically targeted by the attacker
– It is an opportunistic target
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Specific Target
• Attacker has chosen the target not because of the
hardware or software the organization is running but
for another reason, perhaps a political reason
– An individual in one country attacking a government
system in another
– Attacker targeting the organization as part of a hacktivist
attack
– E.g., company website that sells fur coats defaced because
the attacker feels that using animals in this way is unethical
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Opportunistic Target
• Attack is conducted against a site that has software
that is vulnerable to a specific exploit
– The attackers are not targeting the organization
• They have learned of a vulnerability and are simply
looking for an organization with this vulnerability that
they can exploit
– An attacker might be targeting a given sector and looking
for a target of opportunity in that sector
• Targeted attacks are more difficult and take more time
than attacks on a target of opportunity
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Minimizing Possible Avenues of Attack
• There are multiple elements to a solid computer
defense, but two key elements involve limiting
avenues of attack
– Administrator can ensure that all patches for the operating
system and applications are installed
– Administrator can perform system hardening by limiting
the services that are running on the system
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Approaches to Computer Security (1 of 2)
• Correctness: ensuring the system is fully up to date
– All patches installed and proper security controls in place
• Isolation: protecting a system from unauthorized use
– Access control and physical security
• Obfuscation: making it difficult for an adversary to
know when they have succeeded
– Increasing the workload of an attacker makes it more
difficult for them to succeed in their attack
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Approaches to Computer Security (2 of 2)
• Cybersecurity kill chain
– Step-by-step process that attacks follow to target and
achieve results on victim systems
• Threat intelligence
– Set of actions taken to properly utilize resources to target
the actual threats an enterprise is facing
– Basis of understanding adversary tactics, techniques, and
procedures (TTPs)
• Open source intelligence
– Processes used to collect threat intelligence information
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Ethics
• Commonly defined as a set of moral principles that
guides an individual’s or group’s behavior
– Information security efforts frequently involve trusting
people to keep secrets that could cause harm if revealed
– Trust is a foundational element in the people side of
security
– Trust is built upon a code of ethics, a norm that allows
everyone to understand expectations and responsibilities
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Principles of Computer Security, Sixth Edition
Chapter Summary
• Define computer security
• Discuss common threats and recent computer crimes
that have been committed
• List and discuss recent trends in computer security
• Describe common avenues of attacks
• Describe approaches to computer security
• Discuss the relevant ethical issues associated with
computer security
Copyright © 2022 by McGraw-Hill Education. All rights reserved.
Download