IS 302: Information Security and Trust Week 1: Introduction to IST, Security, and Networks 2013 Course material – My web site – eLearn © Yingjiu Li 2005 2 Basic Modules Background (1 week) Applied Crypto (4 wks) Network Security (4 wks) Access Control (1 wk) Project Presentations (2 wk) © Yingjiu Li 2005 3 Information Security & Trust Security in Computing: International Edition Author: Charles P. Pfleeger Shari Lawrence Pfleeger Edition: 4th edition ISBN: 9780136012962 Available in your school bookshop! Grading • Individual Assignment (10%) – – • Group Project (25%) – – – – • • Presentation (15%) + report (10%) Outline due in week 9 (Friday) Presentation in weeks 12 and 13 (15%) Final report due in week 14 (10%) Midterm Quiz (15%; week 7) Final Exam (40%; week 15) – • Assignment 1(week 3) Assignment 2 (week 10) SMU final exam policy: Students are not allowed to reschedule their examination or request for special arrangements of the examination from instructors. Attendance and Participation (10%) © Yingjiu Li 2005 5 Policies • Honor code – No plagiarism or cheating (SMU Code of Student Conduct) • Due time (assignments, project, quiz, exam) – Strictly enforced – Points (~10%) may be deducted for late turn-in • Excuses – No excuse for project, midterm quiz, and final exam – Must be approved before hand • Class arrangement © Yingjiu Li 2005 6 Introduction to Networks Network Architecture Host A Host B App A App A App B App B Subnet 2 Subnet 1 Router Internet Robert Deng/SMU Link Level 8 The Internet Protocol Layers Apps TCP/UDP Host A Host B TCP/UDP IP IP D-Link D-Link Physical Apps Internet Physical IP datagram/packet Src IP Adr; Des IP Adr IP header Src Port#; Des Port# TCP/UDP header Robert Deng/SMU Payload 9 Terminology • IP Address: An Internet identifier for each network interface (Address of a building) – Example: 202.161.41.246 • Port Number: An identifier for an application in a host (Room number in a building) • Hostname: An Internet name of a host (Name of a building) – Example: www.smu.edu.sg • Domain name: An identifier of a domain, which is a network of associated hosts – Example: smu.edu.sg 10 Router • The postman in the Internet – stores and forwards IP packets • On arrival of an IP packet, it makes a routing decision based on the packet’s destination IP address. • Routing decision: to choose the next router to forward the packet, based on a routing table 11 Domain Name System (DNS) A service translating “Names” to “IP addresses” local DNS server 4. 74.125.79.105 1. www.google.com ns01.staff.smu.edu.sg authoritative DNS server dns.google.com www.google.com your laptop 12 Transport services and protocols Host A • Provide logical communication between app processes running on different hosts • Transport protocols run in end systems – sending side: breaks app messages into segments, passes to network – receiving side: reassembles segments into messages, passes to applications • More than one transport protocol available to apps – Internet: TCP and UDP application TCP/UDP network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical application TCP/UDP network data link physical Host B 13 Internet Transport Layer Protocols application TCP/UDP network data link physical • Reliable, in-order delivery (TCP) – connection setup network data link physical network data link physical network data link physical • Unreliable, unordered delivery: UDP • Services not available: network data link physical network data link physical application TCP/UDP network data link physical – delay guarantees – bandwidth guarantees 14 Port Number • Port: identity of an application • IP address + port number can uniquely identify an application running in a host in the Internet. • Well-known Port numbers: – – – – Web: TCP port 80 Email Transportation: TCP port 25 Email Retrieval: TCP port 110 DNS: UDP port 53 • Both the client and the server need to specify their port numbers for data transmission. 15 HTTP overview HTTP has nothing to do with how a web page is interpreted HTTP: hypertext transfer protocol • Web’s application layer protocol PC running Explorer • client/server model – client: browser that requests, receives, “displays” Web objects Server running Apache Web server – server: Web server sends objects in response to requests • HTTP 1.0: RFC 1945 Mac running Navigator • HTTP 1.1: RFC 2068 17 Server: • always on • fixed address Electronic Mail Three major components: • User agents • Mail servers • Simple mail transfer protocol: SMTP user agent user mailbox mail server SMTP User Agent • “mail reader” • Composing, editing, reading mail messages • e. g., Eudora, Outlook, elm, Netscape Messenger • Outgoing, incoming messages stored on server outgoing message queue SMTP mail server 18 user agent SMTP user agent user agent mail server user agent user agent Mathematic Notation • x mod n, where x and n are natural numbers – means the remainder of x divided by n – e.g. 111 mod 879 equals to 111, – e.g. 8913 mod 2 equals to 1 • x=y (mod n) – means that x and y are congruent to n – in other words, x and y have the same remainder when divided by n. – e.g. 8913=8927 (mod 2) • x-1 mod n – means the inverse of x with respect to n or mod n, – Namely, xx-1 =1 (mod n) – this is NOT 1/x !!!!! – e.g. 3-1 mod 5 = 2, because 2*3=6 =1 (mod 5) -1 mod 15= 4, because 4*4 = 16=1 (mod 15) e.g. 4You Good–news: are not required to compute the modular inverse. 19 © Yingjiu Li 2005 20 Motivation • To fight against cybercrime • I can attack U © Yingjiu Li 2005 21 Achieve CIA AVAILABILITY CONFIDENTIALITY INTEGRITY © Yingjiu Li 2005 22 Objectives • Confidentiality (secrecy, privacy) – Information is not exposed to unauthorized parties. • Integrity – Information is not modified by unauthorized parties. • Availability – Information can be accessed by authorized parties at proper time. © Yingjiu Li 2005 23 CIA-U USAGE CONFIDENTIALITY AVAILABILITY INTEGRITY © Yingjiu Li 2005 R. Sandhu 24 th 4 Objective • Usage – Information is not misused by authorized parties © Yingjiu Li 2005 25 Mitigate TVA • Threat – Something bad could happen • Vulnerability – Weakness in an information system could be exploited • Attack – Some vulnerabilities are actually exploited by some adversary, which may result in security incidents © Yingjiu Li 2005 26 Sources of Cybersecurity Threats (United States Government Accountability Office GAO-10-606) Bot-network operators Use a network, or bot-net, of compromised, remotely controlled systems to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available on underground markets. Criminal groups Seek to attack systems for monetary gain (e.g., identity theft and online fraud) or conduct industrial espionage. They hire or develop hacker talent. Hackers Break into networks for the thrill of the challenge, bragging rights in the hacker community, revenge, stalking others, and monetary gain, among other reasons Insiders Includes disgruntled employees, contractors hired by the organization, as well as employees who accidentally introduce malware into systems. Nations Nations use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Phishers Individuals, or small groups, execute phishing schemes in an attempt to steal identities or information for monetary gain Spammers Individuals or organizations distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service). Spyware/malware authors Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Terrorists Seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken a nation’s economy, and damage public morale and confidence. 27 Attacks Difficult to detect but relatively easy to counteract Difficult to prevent absolutely but relatively easy to detect; the goal is to detect them and to recover from any disruption Robert Deng/SMU 28 © Yingjiu Li 2005 29 Hardware and Software Grow • Moore’s law – (Hardware) processing power doubles every 18 months • Gates’ law – Software grows to use all processing power • Multics 1970: ~55k lines of code • Windows 2000: ~55M lines of code © Yingjiu Li 2005 30 More Vulnerabilities • Neumann’s law – Number of vulnerabilities is proportional to the square of software size © Yingjiu Li 2005 31 High Network Value • Metcalfe’s law – Value of a network is proportional to the square of number of users – Internet 1970: ~10K users – Internet 2005: ~1B users © Yingjiu Li 2005 32 High Security Risk • Evan’s Law – Security risk is the product of the number of vulnerabilities and the value of network © Yingjiu Li 2005 33 Even Worse: Defense is So Hard Principle of Easiest Penetration An intruder can exploit any vulnerability to launc an attack – An intruder only needs to find one vulnerability – Defender needs to control all possible vulnerabilities • Features of cyber attacks – Action at a distance (difficult to trace & prosecute) – Propagation of attacking techniques (hacker groups, bulletin boards; only the 1st needs skill, the rest just use the s/w) 34 © Yingjiu Li 2005 35 How to Achieve Security Objectives • Policy – What to protect • Mechanism Security – How to protect • Assurance Assurance – How well is protection Mechanism Policy © Yingjiu Li 2005 36 Can We Hide? • Security by Obscurity – A system would be secure if we hide its insides? • It won’t work well – Vendor independent standards – Open source – Widespread knowledge and expertise • Kerckhoffs Principle (1883): Only the key should be kept secret, while the algorithm itself should be publicly known. 37 Can We Instruct? • Security by legislation – A system will be secure if we instruct users to behave in a secure, ethical and lawful manner – Example: Corporate Acceptable Use Policy • It is not adequate – Users’ cooperation is important; however, it should not be our main focus for achieving security – Attackers (outsider and insider attackers) will not follow instructions 38 Tradeoffs • Security is not free Security Cost Functionality/ performance © Yingjiu Li 2005 Ease of use/ compatibility 39 Discussion • Good security and bad security © Yingjiu Li 2005 40 Project • Project (25%) – Investigation on a security/privacy related topic (each team chooses a different topic) – Project presentation (15%) • Presentation organization (5%); • Technical description(5%) • Q&A (5%) • Timing: 20~25 min presentation + 5~10 min Q&A – Final report (10%) • Breadth (5%) • Depth (5%) © Yingjiu Li 2005 41 Project – Due Time • Project outline is due in week 9. • Project presentation is scheduled in weeks 12 and 13. • Project report is due in week 14. © Yingjiu Li 2005 42 Topics 1) 2) 3) 4) Web browser security SSL security issues and solutions Privacy leakage and control in online social networks Authentication and anonymity in location based services 5) Differential privacy 6) Android permission models and enforcement 7) iOS malware and detection 8) Android malware and detection 9) Timing based attestation 10) Password strength measurements © Yingjiu Li 2005 43 Must do before next class • Download and install Cryptool – http://www.cryptool.org/en/ct1-download-en • CrypTool 1.4.30 - English version • CrypTool 1.4.31 Beta 05 - English version • We will use this tool frequently in class © Yingjiu Li 2005 44