Lecture 1

advertisement
Physical Layer Security
Lecture 2
Supakorn Kungpisdan
supakorn@mut.ac.th
NETE4630
1
Roadmap
• Defending the Physical Layer
• Attacking the Physical Layer
2
NETE4630
Defending the Physical Layer
• The point at which protection should begin
• Security Controls have three primary goals:
– Deter: security lighting and “Beware of Dog” sign
– Delay: fences, gates, locks, access controls, and
mantraps
– Detect: intrusion detection systems (IDSes) and
alarms
• Higher layers focus on preventing disclosure,
denial, or alteration of information
• Physical security focuses on intruders, vandals,
and thieves
3
NETE4630
Physical, Technical, and Administrative Controls
4
NETE4630
Design Security
• Design security should begin during the design
phase, not at the time of deployment
• Physical security of assets and employees
should be considered when designing a new
facility; well-designed facilities are comfortable
and secure
5
NETE4630
Key Issues of Design Security
•
•
•
•
•
•
Location
Construction
Accessibility and Transportation
Climatology
Utilities
Access Control
6
NETE4630
Perimeter Security
• What to examine:
– Natural boundaries at the
location
– Fences or walls around the
site
– The design of the outer
walls of a building
– Divisions and choke points
within a building
• A series of mechanisms
includes:
– Fences
– Perimeter Intrusion
Detection and Assessment
Systems (PIDAS)
– Security lighting
– Closed-circuit television
(CCTV)
– Security guards and guard
dogs
– Warning signs and notices
7
NETE4630
Fencing
• A fence with proper design and height can delay
an intruder and work as a psychological barrier
• A risk analysis should be performed to evaluate
types of physical assets to be protected
– 4-foot fence will deter a casual trespasser
– 8-foot fence will keep a determined intruder out
• Need to consider gauge and mesh size of the
wire
– The smaller the mesh, the more difficult it is to climb
– The heavier the gauge, the more difficult it is to cut
8
NETE4630
Gauge and Mesh
16G with 50mm vs 25 mm mesh
9
NETE4630
Fencing (cont.)
10
NETE4630
PIDAS
• Perimeter Intrusion Detection and Assessment
Systems
• PIDAS has sensors that detect intruders and
feel vibrations along the fence
• The system may produce false positives due to
stray deer, high winds, or other natural events
11
NETE4630
Gates, Guards, and Ground Design
• UL Standard 325 details requirements for fates with 4
classifications:
–
–
–
–
Residential Class 1
Commercial Class 2
Industrial Class 3
Restricted Access Class 4
• Bollards are made of concrete or steel and used to
block vehicle traffic or to protect areas where
pedestrians are entering or leaving buildings
• Security guards need to have job references and be
subjected to a background check
– Web site operation and private investigators
12
NETE4630
Bollards
13
NETE4630
Gates, Guards, and Ground Design (cont.)
• Dogs are loyal but can be unpredictable.
– Dogs are restricted to exterior control and should be used with
caution
• Lighting can discourage criminals
• Most standards list two candlefoot power as the norm for
facilities using nighttime security.
• Too much light causes over-lighting and glare. It may
bleed over adjacent property
• With CCTV, activities can be monitored live by a security
officer or recorded and reviewed later
– British government has installed over 1.5 million CCTV cameras
• Warning signs or notices should be posted to deter
trespassing
14
NETE4630
Facility Security
• “Anyone with physical access has the means
and the opportunity to commit a crime”
• Least Privilege: providing only the minimum
amount of access that is required, and restricted
non-authorized individuals from entering
sensitive areas
• Can achieve by examining windows, doors,
locks, walls, access control, intrusion detection
15
NETE4630
Entry Points
• Doors, windows, roof access, fire escapes,
delivery access, and chimneys
16
NETE4630
Entry Points: Doors
• Door functions determine its construction,
appearance, and operation
• A door designed for security purpose is very
solid and durable, with hardened hardware
• Interior doors are made of hollow-core wood;
exterior doors are made of solid-core wood
• Need to perform risk assessment on interior
applications
17
NETE4630
Entry Points: Doors (cont.)
• Doors have fire rating with various
configurations:
–
–
–
–
–
Personal doors
Industrial doors
Vehicle access doors
Bulletproof doors
Vault doors
• Must examine hardware used to install a door
• Mantrap is designed so that when the outer
door opens, the inner door locks
18
NETE4630
Doors (cont.)
Vault door
Bullet-proof door
19
NETE4630
Doors (cont.)
Industrial door
Vehicle access door
20
NETE4630
Mantrap
21
NETE4630
Entry Points: Doors (cont.)
• Automatic door locks: fail-safe or failsecure
– Fail-safe (unlocked) state allows employees
to exit, but also allows other unauthenticated
access
– Fail-secure (locked) configuration is when
the doors default to being locked, thereby
keeping unauthorized individuals out while
also preventing access
22
NETE4630
Entry Points: Windows
• Alarms or sensors may be installed on windows
• Window types include:
– Standard: lowest security, least expensive, easily
shattered (แตกละเอียด)
– Polycarbonate Acrylic: more stronger than standard
glass
– Wire Reinforced: adds shatterproof protection
– Laminated: similar to those used in automobiles,
strengthen the glass
– Solar Film: provide moderate level of security and
decrease potential for shattering
– Security Film: highest security
23
NETE4630
Walls (cont.)
24
NETE4630
Entry Points: Walls
• A reinforced wall can keep a determined
attacker from entering an area
• Walls should be designed with firewalls, and
emergency lighting should be in place
25
NETE4630
Access Control
• Access control is any mechanism by which an
individual is granted or denied access
• Many types include:
– Mechanical locks
– Identity card technology
26
NETE4630
Access Control: Locks
• Warded locks and tumbler locks
• Warded locks work by matching wards to keys,
are cheapest mechanical lock and easiest to
pick
• Tumbler locks contain more parts and are
harder to pick
• Another type of tumbler lock is the tubular lock,
which is used for computers, vending machines,
and other high-security devices
27
NETE4630
Warded Locks
28
NETE4630
Access Control: Locks (cont.)
29
NETE4630
Tumbler Locks (cont.)
30
NETE4630
Access Control: Locks (cont.)
• Three basic grades of locks include:
– Grade 3: The weakest commercial lock (designed for
200,000 cycles)
– Grade 2: Light duty commercial locks or heavy duty
residential locks (designed for 400,000 cycles)
– Grade 1: Commercial locks of the highest security
(designed for 800,000 cycles)
31
NETE4630
Access Control: Physical Controls
• Network cabling
– Select the right type of cable
– Should be routed through the facility so that it
cannot be tampered with
– Unused network drop should be disabled; all
cable access points should be secured
32
NETE4630
Access Control: Physical Controls (cont.)
• Controlling individuals:
– ID cards with photograph of an individual
– Intelligent access control devices: contact and
contactless
• Contact access cards come with different
configurations including:
–
–
–
–
Active Electronic: can transmit electronic data
Electronic Circuit: has a circuit embedded
Magnetic Strips: has a magnetic stripe
Optical-coded: contains laser-burned pattern of
encoded dots
33
NETE4630
Optical Card
34
NETE4630
Access Control: Physical Controls (cont.)
• Contactless cards function by proximity e.g. RFID (Radio
Frequency ID)
– Passive: powered by RFID reader
– Semi-passive: has battery only to power microchip
– Active: battery-powered
• Multi-factor authentication is recommended
• Physical Intrusion Detection
–
–
–
–
Motion Detectors: audio, infrared, wave pattern, or capacitance
Photoelectric sensors
Pressure-sensitive devices
Glass breakage sensors
• Keep in mind that IDSes are not perfect
35
NETE4630
Intrusion Detection (cont.)
Photoelectric sensor
Motion detection sensor
(photoelectric infrared)
Glass break sensor
36
NETE4630
Device Security
• Device security addresses controls
implemented to secure devices found in
an organization
– Computers, networking devices, portable
devices, cameras, iPods, and thumb drives
37
NETE4630
Device Security: Identification and
Authentication
• Identification: the process of identifying
yourself
• Authentication: the process of proving your
identity
• Three categories of authentication
– Something You Know
– Something You Have
– Something You Are
38
NETE4630
Device Security: Sth You Know
• Passwords are most commonly used
authentication schemes
• Gartner study in 2000 found that:
– 90% of respondents use dictionary words or names
– 47% use their name, spouse’s name, or a pet’s name
– 9% used cryptographically strong passwords
39
NETE4630
Device Security: Sth You Know (cont.)
• A good password policy:
–
–
–
–
Passwords should not use personal information
Passwords should be 8 or more characters
Passwords should be changed regularly
Passwords should never be comprised of common
workds or names
– Passwords should be complex, use upper- and lowercase letters, and miscellaneous characters (e.g. !, @,
#, $, %, ^, &)
– Limit logon attempts to three successive attempts
40
NETE4630
Device Security: Sth You Have
• Tokens, smart cards, and magnetic cards
• Two basic groups of tokens:
– Synchronous token: synchronized to
authentication server
– Asynchronous challenge-response token
41
NETE4630
Device Security: Sth You Are
•
Basic operations:
1.
2.
3.
•
Accuracy of biometrics
–
–
•
•
User enrolls in the system
User requests to be authenticated
A decision is reached: allowed or denied
Type 1 Error (False Rejection Rate: FRR)
Type 2 Error (False Acceptance Rate: FAR)
The point at which FRR and FAR meet is known as
Crossover Error Rate (CER)
The Lower CER, the more accurate the system
42
NETE4630
Crossover Error Rate (CER)
43
NETE4630
Biometric
•
•
•
•
•
•
•
Finger Scan
Hand Geometry
Palm Scan
Retina Pattern
Iris Recognition
Voice Recognition
Keyboard Dynamics
44
NETE4630
Computer Controls
• Session controls
– System timeouts
– Screensaver lockouts
• Warning banners
45
NETE4630
Device Security: Mobile Devices and Media
• Samsung Corporation banned employees from
using Samsung’s cell phones with 8GB of
storage
• Sensitive media must be controlled, handled,
and destroyed in an approved manner
– Papers can be shredded: strip-cut and cross-cut
shredders
– CD can be destroyed
– Magnetic media can be degaussed
– Harddrive can be wiped
46
NETE4630
Information Classification Systems
• Government Information Classification System
– Focuses on secrecy
• Commercial Information Classification System
– Focuses on Integrity
47
NETE4630
Information Classification Systems (cont.)
48
NETE4630
Information Classification Systems (cont.)
49
NETE4630
Communications Security
• Communications Security examines electronic devices
and electromagnetic radiation (EMR) they produce
• Original controls for these vulnerabilities were named
TEMPEST, now changed to Emissions Security
(Emsec)
• Newer technologies that have replaced shielding are
white noise and control zones
• PBX must be secure
• Fax can be intercepted
– Fax ribbons can be virtual carbon copy of original document
– Solved by using fax server and fax encryption
50
NETE4630
Comm Security: Bluetooth
• To keep bluetooth secure, make sure bluetooth-enable
devices are set to non-discoverable mode.
• Use secure application to limit amount of cleartext
transmission
• It no bluetooth functionality is needed, turn if off
– It can be configured to access shared directories without
authentication, which open it up for viruses, trojans, and
information theft
• In 2005, AirDefense released BlueWatch, the first
commercial security tool designed to monitor bluetooth
devices and identify insecure devices
– www.airdefense.net/products/bluewatch/index.php
51
NETE4630
BlueWatch
• AirDefense BlueWatch can provide information
such as:
– Identify different types of Bluetooth devices,
including laptops, PDAs, keyboards and cell phones
– Provide key attributes, including device class,
manufacturer and signal strength
– Illustrate communication or connectivity among
various devices
– Identify services available on each device, including
network access, fax and audio gateway
52
NETE4630
802.11 Wireless Protocols
•
•
•
•
•
•
•
Retire WEP devices
Change default SSID
MAC filtering
Turn off DHCP
Limit access of wireless users
Use port authentication (802.1x)
Perform periodic site surveys and scan for rogue devices
e.g. using Kismet
• Update policies to stipulate requirements for wireless
users
• Use encryption
• Implement a second layer of authentication e.g. RADIUS
53
NETE4630
Roadmap
• Defending the Physical Layer
• Attacking the Physical Layer
54
NETE4630
Attacking Physical Layer
• Several techniques to attack physical
security:
– Stealing data
– Lock picking
– Wiretapping
– Hardware modification
55
NETE4630
Stealing Data
• Abe Usher wrote a program called “pod slurp” to steal
data from PC
• Purpose of Slurp
– To create a proof-of-concept application that searches for office
documents that can be copied from a Windows computer to an
iPod (or other removable storage device).
– The point of this exercise is to demonstrate (quantitatively) how
quickly data theft can occur with removable storage devices.
• Method:
– Searches for the "C:Documents and Settings" directory on a
Windows computer. It then recurses through all of the
subdirectories, discovering all of the documents (*.doc, *.xls,
*.htm, *.url, *.pdf, etc.) on the computer that it is running from.
56
NETE4630
How to Use Slurp
• Step 0:
– Stop the iPod Service in Windows (if iPod software is installed
and running).
• Step 1:
– Unzip slurp.zip
• Step 2:
– Copy the entire "slurp-audit" directory to your removable storage
device (iPod, external hard drive, etc.)
• Step 3
– Run the application file "slurp-audit.exe" and watch it find all of
the business files. After it is complete, check the report.html file
to find out what files could have been copied to an iPod or USB
thumbdrive.
• For more information, check: http://www.sharp-ideas.net
57
NETE4630
Slurp
58
NETE4630
Slurp Report
59
NETE4630
Lock Picks
• Basic components used to pick locks:
– Tension Wrenches: small, angled flathead
screwdrivers that come in various thicknesses and
sizes
– Picks: small, angled, and pointed, similar to a dentist
pick
60
NETE4630
Scrubbing
61
NETE4630
Lock Shim
62
NETE4630
Lock Shim (cont.)
63
NETE4630
Lock Shim (cont.)
64
NETE4630
Scanning and Sniffing
• Phreakers are interested in making free long-distance
calls
• Free loaders intercept free HBO. Prevented by
implementing videocipher encryption
• Cordless phone were attacked by tuning the same
frequencies other people to listen to active conversation
– Solved by switching to spread spectrum technologies
• 1st Gen mobile phones have been hacked by Tumbling
– Modify Electronic Serial Number (ESN) and mobile identification
number (MIN) after each call
• Also vulnerable to cloning attack
– Intercept ESN and MIN from listening to active calls
65
NETE4630
Scanning and Sniffing (cont.)
• Attacks on 2nd Gen Mobile phones:
– International Mobile Subscriber Identity (IMSI) catcher
• Tell mobile phone that it is a base station
– Cellphone jammer
• Transmit signals with same freq as cell phones; preventing
all communication within given area
– Cellphone detector
• Detect when a cell phone is powered on
66
NETE4630
Scanning and Sniffing (cont.)
• Bluejacking allows an individual to send
unsolicited messages over BT to other BT
devices
• Bluesnarfing is the theft of data, calendar
information and phonebook entries
67
NETE4630
Tools to Attack Bluetooth
• RedFang: small proof-of-concept application used to
find non-discoverable devices
• Bluesniff: a proof-of-concept tool for BT wardriving
• Btscanner: a BT scanning with the ability to do inquiry
and brute force scans, identify BT devices in range
• BlueBug: exploits a BT security hole on some BTenabled phones. Allows unauthorized downloading of
phonebooks and call lists, sending and reading SMSs
• Find those tools at
– http://www.remote-exploit.org/backtrack_download.html
68
NETE4630
Attacking WLANs
•
•
•
•
Eavesdropping
Open Authentication
Rogue Access Point
DoS
69
NETE4630
Hardware Hacking
• Hardware hacking is about using physical
access to bypass control or modify the device in
some manner
– Sometimes it is called “moding”
• Bypass BIOS password
• Router password recovery
– Prevented by issuing no service passwordrecovery command
• Bypass Windows authentication
70
NETE4630
Example: Modifying Bluetooth Hardware
• Objective:
– To extend BT range
71
NETE4630
Example: Modifying Bluetooth Hardware
1
2
72
NETE4630
Example: Modifying Bluetooth Hardware
3
4
73
NETE4630
Example: Modifying Bluetooth Hardware
5
6
74
NETE4630
To Read
• Hack-The-Stack: Page 70-84
75
NETE4630
Question?
Next week
Data Link Layer Security
NETE4630
76
Download