Identifying Who Is Responsible for Information Security

advertisement
Security+ Guide to Network Security Fundamentals, 2e
Chapter 3
Security Basics
At a Glance
Instructor’s Notes

Chapter Overview

Chapter Objectives

Technical Notes

Lecture Notes

Quick Quizzes

Discussion Questions

Additional Activities
3-1
Security+ Guide to Network Security Fundamentals, 2e
3-2
Instructor’s Notes
Chapter Overview
This chapter discusses the basics of security computer systems and networks. It begins by examining who is
responsible for creating and maintaining information security schemes. It also offers principles for designing a
secure system and explores the three pillars of basic security: access control, authentication, and auditing.
Chapter Objectives
After reading this chapter, students will be able to:





Identify who is responsible for information security
Describe security principles
Use effective authentication methods
Control access to computer systems
Audit information security schemes
Technical Notes
HANDS-ON
PROJECTS
Project 3-1
HARDWARE
DEVICES REQUIRED
Computer PC
OPERATING SYSTEM
REQUIRED
Windows XP
Project 3-2
Project 3-3
Computer PC
Computer PC
Windows XP
Windows XP
Project 3-4
Computer PC
Windows 2000 or XP
Project 3-5
Project 3-6
Computer PC
Computer PC
Windows XP with NTFS hard disk
Windows XP
OTHER RESOURCES
Possible special permissions
if working in a school’s lab
Microsoft office
Possible special permissions
if working in a school’s lab
Possible special permissions
if working in a school’s lab
None
None
This chapter should not be completed in one class session. It is recommended that you split the chapter into at least
two class sessions, if possible. The amount of subject matter to be covered can be covered in anywhere between a 3to 6-hour period, plus any at-home exercises you wish to assign.
Lecture Notes
Identifying Who Is Responsible for Information Security
When an organization secures its information, it completes a few basic tasks. First, it must analyze its assets and the
threats these assets face from threat agents. Next, the organization identifies its vulnerabilities and how they might
be exploited. Finally, the organization regularly assesses and reviews the security policy to ensure that it is
adequately protecting its information.
The major tasks of securing information can be accomplished from the lower levels of the organization upwards, as
shown in Figure 3-1 on page 71 of the text. This bottom-up approach has one key advantage: the bottom-level
employees have the technical expertise to understand what to do to secure information and how to do it.
Security+ Guide to Network Security Fundamentals, 2e
3-3
The opposite of the bottom-up approach is the top-down approach. Returning to Figure 3-1 on page 71 of the text,
a top-down approach starts at the highest levels of the organization and works its way down. A security plan
initiated by top-level managers has the backing to make the plan work. Many organizations have a top-level
manager dedicated to overseeing the security plan and its implementation. Known as the chief information security
officer (CISO), this person helps develop the security plan and then ensures that it is carried out. The term human
firewall is sometimes used to describe the security-enforcing role of each employee.
Understanding Security Principles
Consider some of the ways that information can be attacked: crackers can launch distributed denial-of-service
(DDoS) attacks through the Internet, spies can use social engineering, employees can guess other users’ passwords,
and hackers can create back doors. Protecting against the wide range of attacks calls for a wide range of defense
mechanisms.
Layering
A layered security approach has the advantage of creating a barrier of multiple defenses that can be coordinated to
thwart a variety of attacks. Information security likewise must be created in layers. Figure 3-2 on page 74 of the text
shows some basic layers for securing a desktop computer connected to a network. To be effective, however, all the
security layers must be properly coordinated.
Limiting
Limiting access to information reduces the threat against it. Only those who must use data should have access to it.
In information security terminology, for a subject (such as a person or a computer program running on a system) to
interact with an object (such as a computer or a database stored on a server), the access must be limited. In addition,
the amount of access granted to someone should be limited to what that person needs to know or do. Figure 3-3 on
page 75 of the text illustrates this limited access to a payroll database.
Diversity
Diversity is closely related to layering. Just as you should protect data with layers of security, so too must the layers
be different (diverse) so that if attackers penetrate one layer, they cannot use the same techniques to break through
all other layers.
Using diverse layers of defense means that breaching one security layer does not compromise the whole system.
You can set a firewall to filter a specific type of traffic, such as all inbound traffic, while a second firewall on the
same system filters another traffic type, such as outbound traffic. In addition, using firewalls produced by different
vendors creates even greater diversity.
Obscurity
Obscuring what goes on inside a system or organization and avoiding clear patterns of behavior make attacks from
the outside difficult. In information security, defending systems through obscurity can be a valuable tool.
Simplicity
Complex security systems can be difficult to understand, troubleshoot, and feel secure about. The challenge is to
make the system simple from the inside but complex from the outside.
Security+ Guide to Network Security Fundamentals, 2e
3-4
Quick Quiz
1.
Most ___________ security approaches wither in a few weeks or fragment into practices that protect a few
select devices or a unit of the business. ANSWER: bottom-up
2.
A(n) __________ is an employee who tries to prevent security attacks from passing through him or her.
ANSWER: human firewall
3.
A(n) ____________ security approach has the advantage of creating a barrier of multiple defenses that can be
coordinated to thwart a variety of attacks. ANSWER: layered
4.
_____________ access to information reduces the threat against it. ANSWER: Limiting
5.
______________ includes using physical and electronic security measures. ANSWER: Diversity
Using Effective Authentication Methods
Information security rests on three key pillars: authentication, access control, and auditing. A trusted user is
approved to access a secure computer system. However, when someone claiming to be that user requests access to
the system, how can his or her identity be verified? This process of proving identity is known as authentication.
Quick Reference
Discuss the three main categories of authentication as described on page 78 of
the text.
Username and Password
The most common authentication method is providing a user with a unique username and a secret password. A
technology that is increasing in popularity attempts to address the problem of users having individual usernames and
passwords for each account (and thus resorting to simple passwords that are easy to remember). Known as ID
management, a user’s single authenticated ID is shared across multiple networks or online businesses. ID
management can be not only for users, but also for computers that share data.
Tokens
Whereas passwords are based on what you know, tokens are based on what you have. A token is a security device
that authenticates the user by having the appropriate permission embedded into the token itself. A new type of token
is called a proximity card. A proximity card is a plastic card with an embedded thin metal strip that emits a lowfrequency short-wave radio signal.
Biometrics
Biometrics uses a person’s unique characteristics to authenticate that person, and is an example of authentication
based on what you are. Some of the human characteristics that can be used for identification include:



Finger print
Hand
Retina
 Face
 Iris
 Voice
The most common biometric device is a fingerprint scanner, shown in Figure 3-4 on page 81 of the text.
Security+ Guide to Network Security Fundamentals, 2e
3-5
Certificates
Although encrypting messages with keys is an excellent means of sending messages so that unauthorized users
cannot read them, the key system does not prove that the senders are actually who they claim to be. To let the
receiver verify who sent the message, the sender can provide a certificate (sometimes called a digital certificate). A
certificate links or binds a specific person to a key. Digital certificates are issued by a certification authority (CA),
which is an independent third-party organization.
Kerberos
Kerberos is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to
verify the identity of networked users. Using Kerberos is like using a driver’s license to cash a check.
A state agency, such as the Department of Motor Vehicles (DMV), issues a driver’s license that has these
characteristics:




It is difficult to copy.
It contains specific information (name, address, height, etc.).
It lists restrictions (must wear corrective lenses, etc.).
It expires on a specified date.
Kerberos is typically used when someone on a network attempts to use a network service, and the service wants
assurance that the user is who he says he is. The user is provided a ticket that is issued by the Kerberos
authentication server (AS), much as a driver’s license is issued by the DMV.
Challenge Handshake Authentication Protocol
The Challenge Handshake Authentication Protocol (CHAP) is considered a more secure procedure for
connecting to a system than using a password.
Quick Reference
Discuss the steps listed on page 83 of the text that describe how CHAP works.
Mutual Authentication
Two-way authentication, known as mutual authentication, can be used to combat identity attacks, such as man-inthe-middle and replay attacks. With mutual authentication, the server authenticates the user through a password,
tokens, or other means. Mutual authentication is illustrated in Figure 3-6 on page 84 of the text.
Multifactor Authentication
Implementing two or more types of authentication is known as multifactor authentication. Multifactor
authentication is a common security strategy. Multifactor authentication is being strongly proposed to verify the
authentication of cell phone users who use their phones to purchase goods and services.
Security+ Guide to Network Security Fundamentals, 2e
3-6
Controlling Access to Computer Systems
When an operating system is configured to restrict a user’s access, most operating systems store this information in
an access control list (ACL). An ACL is a table in the operating system that contains the access rights each subject
(a user or a device) has to a particular system object, such as a folder or file. In Microsoft Windows, an ACL has one
or more access control entries (ACEs) consisting of the name of a subject or group of subjects. Table 3-1 on page
85 of the text illustrates an ACL. When a user receives rights based on membership in a group, these rights are
called inherited rights.
Quick Reference
Discuss the basic folder and file permissions in a Windows Server 2003 system
as listed on pages 85 and 86 of the text.
Mandatory Access Control
The most restrictive model is known as Mandatory Access Control (MAC). In this model, the subject is not
allowed to give access to another subject to use an object.
Role Based Access Control
Instead of setting permissions for each user or group, you can assign permissions to a position or role and then
assign users and other objects to that role. The users and objects inherit all of the permissions for the role. This
model is known as Role Based Access Control (RBAC). Figure 3-7 on page 87 of the text shows roles created for a
variety of job classifications.
Discretionary Access Control
The least restrictive model is known as Discretionary Access Control (DAC). In this setting, one subject can adjust
the permissions for other subjects over objects. DAC is the type of access that most users associate with their
personal computers.
Auditing Information Security Schemes
The third pillar of information security is auditing. You can audit a security system in two ways: logging and system
scanning. Logging records which user performed a specific activity and when. Whereas logging keeps track of what
was done on the system, system scanning checks the permissions assigned to a user or role. These results are
compared to what is expected to detect any differences.
Security+ Guide to Network Security Fundamentals, 2e
3-7
Quick Quiz
1.
A(n) ____________ is a security device that authenticates the user by having the appropriate permission
embedded into itself. ANSWER: token
2.
______________ authentication provides a means for both sides of a connection to verify one another’s
authenticity. ANSWER: Mutual
3.
Implementing two or more types of authentication is known as ______________ authentication. ANSWER:
multifactor
4.
_____________ consists of the mechanisms for limiting access to resources based on users’ identities and their
membership in various groups. ANSWER: Access control
5.
______________ can be initiated by an administrator as a routine check or when it appears that a user is
accessing a resource for which she should not have permission. ANSWER: System scanning
Discussion Questions
1.
In an organization, how do you determine who will be responsible for securing information?
2.
How often should security schemes be changed in an organization?
Additional Activities
1.
Have students conduct research looking for software and hardware that can be used to authenticate users.
2.
Have students research the effectiveness of several biometric devices and summarize what they find.
Download