Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Similar documents
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Malware, , Database Security

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

NetDefend Firewall UTM Services

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Module 11. Security Methods

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.

CompTIA E2C Security+ (2008 Edition) Exam Exam.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

e-commerce Study Guide Test 2. Security Chapter 10

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Airtel PC Secure Trouble Shooting Guide

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

3.5 SECURITY. How can you reduce the risk of getting a virus?

Copyright

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Seqrite Antivirus for Server

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Elementary Computing CSC 100. M. Cheng, Computer Science

Symantec Client Security. Integrated protection for network and remote clients.

GCIH. GIAC Certified Incident Handler.

Unit 2 Assignment 2. Software Utilities?

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Seqrite Endpoint Security

Table of Contents. Chapter One. Domain 1.0: Systems Security... 1 Practice Questions... 1 Quick-Check Answer Key Answers and Explanations...

2 ZyWALL UTM Application Note

INTERNET SAFETY IS IMPORTANT

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

Antivirus Technology

CIS Controls Measures and Metrics for Version 7

Unique Phishing Attacks (2008 vs in thousands)

Exam : Title : symantec small Business security. Version : DEMO

CIS Controls Measures and Metrics for Version 7

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Quick Heal Total Security

QUARTERLY TRENDS AND ANALYSIS REPORT

Annexure E Technical Bid Format

Barracuda Networks Portfolio. Bartłomiej Moczulski Sales Engineer CEE

CS 356 Operating System Security. Fall 2013

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

Computer Security. Solutions

Online Security and Safety Protect Your Computer - and Yourself!

Web Application Security. Philippe Bogaerts

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Lecture 12. Application Layer. Application Layer 1

What s New in Version 3.5 Table of Contents

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Training UNIFIED SECURITY. Signature based packet analysis

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Computer Network Vulnerabilities

Get Max Internet Security where to buy software for students ]

McAfee Public Cloud Server Security Suite

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

A Review Paper on Network Security Attacks and Defences

COMPUTER NETWORK SECURITY

2. INTRUDER DETECTION SYSTEMS

CIH

SOLUTION MANAGEMENT GROUP

The security of Mozilla Firefox s Extensions. Kristjan Krips

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

BEST PRACTICES FOR PERSONAL Security

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Managing SonicWall Gateway Anti Virus Service

ClearPath OS 2200 System LAN Security Overview. White paper

INDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C

BUFFERZONE Advanced Endpoint Security

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422

Cyber Security Guide for NHSmail

epldt Web Builder Security March 2017

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Chapter 9. Firewalls

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

How To Remove Virus From Computer Without Using Antivirus In Windows Xp


OWASP Top 10 The Ten Most Critical Web Application Security Risks

Chapter 10: Security and Ethical Challenges of E-Business

Activation Screen Virus

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Chapter 11: Networks

NETWORK THREATS DEMAN

DO NOT OPEN UNTIL INSTRUCTED

BUFFERZONE Advanced Endpoint Security

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Solutions Business Manager Web Application Security Assessment

Access Controls. CISSP Guide to Security Essentials Chapter 2

Stopping Advanced Persistent Threats In Cloud and DataCenters

Transcription:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems

Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define SQL injection and explain how to protect against it Explain how to protect systems from communications-based attacks Describe various software security applications 2

Hardening the Operating System Hardening the operating system to resist attacks is often a three-pronged approach that involves: Managing updates to the operating system Protecting against buffer overflows Configuring operating system protections 3

Managing Operating System Updates Update terminology The task of writing a secure operating system is daunting Due to the increased length and complexity of operating systems Unintentional vulnerabilities were introduced and then these were exploited by attackers 4

Managing Operating System Updates (continued) 5

Managing Operating System Updates (continued) 6

Managing Operating System Updates (continued) Update terminology (continued) Security patch A general software security update intended to cover vulnerabilities that have been discovered Hotfix addresses a specific customer situation Often may not be distributed outside that customer s organization Service pack A cumulative package of all security updates plus additional features 7

8

Managing Operating System Updates (continued) Patch management techniques Install updates automatically Download updates but let me choose whether to install them Check for updates but let me choose whether to download and install them Never check for updates Patches can sometimes create new problems 9

10

Managing Operating System Updates (continued) Automated patch update service Used to manage patches locally instead of relying upon the vendor s online update service Advantages to an automated patch update service Can save bandwidth and time Computers that do not have Internet access can receive updates Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs 11

Managing Operating System Updates (continued) Advantages to an automated patch update service (continued) Specific types of updates that the organization does not test can be automatically installed whenever they become available Administrators can approve updates for detection only Users cannot disable or circumvent updates 12

13

Buffer Overflow Protection Buffer overflow Occurs when a process attempts to store data in random access memory (RAM) beyond the boundaries of a fixed-length storage buffer Extra data overflows into the adjacent memory locations and under certain conditions may cause the computer to stop functioning Attackers also use a buffer overflow in order to compromise a computer 14

15

Buffer Overflow Protection (continued) Basic defenses Write defensive program code that will protect against these attacks Use a programming language that makes these attacks more difficult For Windows-based systems, there are two defenses against buffer overflows Data execution prevention (DEP) Address space layout randomization (ASLR) 16

Buffer Overflow Protection (continued) Data Execution Prevention (DEP) Most modern CPUs support an NX (No execute) bit to designate a part of memory for containing only data DEP will not allow code in the memory area to be executed Windows Vista allows software developers to enable NX hardware protection specifically for the application software that they develop 17

18

Buffer Overflow Protection (continued) Address Space Layout Randomization (ASLR) Randomly assigns executable operating system code to one of 256 possible locations in memory This makes it harder for an attacker to locate and take advantage of any functionality inside these executables ASLR is most effective when it is used in conjunction with DEP 19

Configuring Operating System Protection Most organizations take a four-fold approach to configuring operating system protections: Security policy Configuration baseline Security template Deployment 20

Preventing Attacks That Target the Web Browser These attacks involve using: Cookies JavaScript Java ActiveX Cross-site scripting 21

Cookies Cookies are computer files that contain userspecific information Types of cookies First-party cookie Third-party cookie Cookies can pose a privacy risk Cookies can be used to track the browsing or buying habits of a user Defenses against cookies include disabling the creation of cookies or deleting them once they are created Security+ Guide to Network Security Fundamentals 22

JavaScript JavaScript Developed by Netscape Scripting language that does not create standalone applications Scripting language A computer programming language that is typically interpreted into a language the computer can understand Visiting a Web site that automatically downloads a program to run on a local computer can be dangerous 23

JavaScript (continued) 24

JavaScript (continued) Several defense mechanisms prevent JavaScript programs from causing serious harm: JavaScript does not support certain capabilities JavaScript has no networking capabilities Other security concerns remain: JavaScript programs can capture and send user information without the user s knowledge or authorization The defense against JavaScript is to disable it within the Web browser 25

Java Java A complete object-oriented programming language created by Sun Microsystems Can be used to create standalone applications Java applet A separate program stored on a Web server and downloaded onto a user s computer along with HTML code Can also be made into hostile programs 26

Java (continued) 27

Java (continued) Sandbox is a defense against a hostile Java applet Surrounds program and keeps it away from private data and other resources on a local computer Two types of Java applets: Unsigned Java applet: program that does not come from a trusted source Signed Java applet: has information proving the program is from a trusted source and has not been altered 28

Java (continued) 29

ActiveX Set of technologies developed by Microsoft Not a programming language but a set of rules for how applications should share information ActiveX controls Also called add-ons or ActiveX applications Represent a specific way of implementing ActiveX Can perform many of the same functions of a Java applet, but do not run in a sandbox Have full access to Windows operating system ActiveX poses a number of security concerns 30

ActiveX (continued) Nearly all ActiveX control security mechanisms are set in Internet Explorer ActiveX controls do not rely exclusively on Internet Explorer However, can be installed and executed independently The defense against ActiveX is to disable it within the Web browser 31

Cross Site Scripting (XSS) Cross Site Scripting (XSS) An attack in which malicious code is inserted into a specific type of dynamic Web page Typically involves using client-side scripts written in JavaScript or ActiveX Designed to extract information from the victim and then pass the information to the attacker Targeted to Web sites that dynamically generate Web pages that redisplay (echo) user input that has not been properly validated 32

Cross Site Scripting (XSS) (continued) Cross Site Scripting (XSS) attack steps An attacker searches for a Web site that redisplays a bad login (See Figures 3-8 and 3-9) The attacker then creates an attack URL that contains the embedded JavaScript commands A fake e-mail is sent to unsuspecting users with the attack URL as a modified embedded link in the e-mail The unsuspecting victim clicks on the attack URL and enters his username and password 33

Cross Site Scripting (XSS) (continued) 34

Cross Site Scripting (XSS) (continued) 35

36

Cross Site Scripting (XSS) (continued) Defenses against XSS involve both Web masters of legitimate sites as well as users Webmasters should check that all user input is validated and that attackers do not have the ability to inject code They also should be sure that all Web services and database software is patched to prevent XSS Users should never click on embedded links in e- mails 37

Hardening Web Servers Because of their open exposure, Web servers are prime targets for attackers SQL injection One of the most common types of attacks Uses a form of injection like XSS Hinges on an attacker being able to enter an SQL database query into a dynamic Web page SQL (structured query language) A language used to view and manipulate data that is stored in a relational database 38

Hardening Web Servers (continued) 39

Hardening Web Servers (continued) Variations to the SQL injection attack Deleting data from the database Accessing the host operating system through function calls Retrieving a list of all usernames and passwords 40

Hardening Web Servers (continued) 41

Protecting Systems from Communications-Based Attacks Communications protocols and applications can also be vectors for attacks Some of the most common communications-based attacks are: SMTP open relays Instant messaging Peer-to-peer networks 42

SMTP Open Relays E-mail systems use two TCP/IP protocols to send and receive messages Simple Mail Transfer Protocol (SMTP) handles outgoing mail Post Office Protocol (POP3 for the current version) handles incoming mail IMAP (Internet Mail Access Protocol) A more advanced protocol that solves many problems E-mail remains on the e-mail server Mail can be organized into folders and read from any computer Current version is IMAP4 43

SMTP Open Relays (continued) 44

SMTP Open Relays (continued) SMTP relay SMTP servers can forward e-mail sent from an e-mail client to a remote domain SMTP open relay If SMTP relay is not controlled, an attacker can use it to forward thousands of spam e-mail messages The defenses against SMTP open relay are to turn off mail relay altogether So that all users send and receive e-mail from the local SMTP server only or limit relays to only local users 45

Instant Messaging Instant messaging (IM) Real-time communication between two or more users Can also be used to chat between several users simultaneously, to send and receive files, and to receive real-time stock quotes and news Basic IM has several security vulnerabilities IM provides a direct connection to the user s computer; attackers can use this connection to spread viruses and worms IM is not encrypted by default so attackers could view the content of messages 46

Instant Messaging (continued) Steps to secure IM include: Keep the IM server within the organization s firewall and only permit users to send and receive messages with trusted internal workers Enable IM virus scanning Block all IM file transfers Encrypt messages 47

Peer-to-Peer (P2P) Networks Peer-to-peer (P2P) network Uses a direct connection between users Does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network P2P networks are typically used for connecting devices on an ad hoc basis For file sharing of audio, video, and data, or real-time data transmission such as telephony traffic Viruses, worms, Trojan horses, and spyware can be sent using P2P 48

Peer-to-Peer (P2P) Networks (continued) A new type of P2P network has emerged known as BitTorrent Torrents are active Internet connections that download a specific file available through a tracker Server program operated by the person or organization that wants to share the file With BitTorrent, files are advertised BitTorrent cannot be used to spread viruses or malware like traditional P2P networks 49

Applying Software Security Applications Software security applications that are commonly installed on systems include: Antivirus Anti-spam Popup blockers Personal software firewalls Host intrusion detection systems 50

Antivirus Antivirus (AV) software Scan a computer for infections as well as monitor computer activity and scan all new documents, such as e-mail attachments, that might contain a virus If a virus is detected, options generally include cleaning the file of the virus, quarantining the infected file, or deleting the file The drawback of AV software is that it must be continuously updated to recognize new viruses AV software use definition files or signature files 51

Popup Blockers Popup A small Web browser window that appears over the Web site that is being viewed Popup blocker Allows the user to limit or block most popups Can be either a separate program or a feature incorporated within a browser As a separate program, popup blockers are often part of a package known as antispyware Helps prevent computers from becoming infected by different types of spyware 52

53

Anti-Spam Two different options for installing a corporate spam filter Install the spam filter with the SMTP server See Figure 3-14 Install the spam filter with the POP3 server See Figure 3-15 54

Anti-Spam (continued) 55

Anti-Spam (continued) 56

Anti-Spam (continued) Another way to filter spam is for the organization to contract with a third-party entity That filters out spam All e-mail is directed to the third-party s remote spam filter Where it is cleansed before it is redirected back to the organization This can be accomplished by changing the MX (mail exchange) record 57

Anti-Spam (continued) A third method is to filter spam on the local computer Typically, the e-mail client contains several different features to block spam, such as: Level of junk e-mail protection Blocked senders Allowed senders Blocked top level domain list A final method of spam filtering is to install separate filtering software that works with the e-mail client software 58

Personal Software Firewalls Firewall, sometimes called a packet filter Designed to prevent malicious packets from entering or leaving computers Can be software-based or hardware-based Personal software firewall Runs as a program on a local system to protect it against attacks Many operating systems now come with personal software firewalls Or they can be installed as separate programs 59

Host Intrusion Detection Systems (HIDS) Host Intrusion Detection Systems (HIDS) Attempt to monitor and possibly prevent attempts to intrude into a system and network resources HIDS are software-based and run on a local computer These systems can be divided into four groups: File system monitors Logfile analyzers Connection analyzers Kernel analyzers HIDS work on the principle of comparing new behavior against normal behavior 60

Summary Hardening the operating system is key in resisting attacks A buffer overflow occurs when a process attempts to store data in random access memory (RAM) beyond the boundaries of a fixed-length storage buffer Most organizations use a four-fold approach to protecting operating systems: security policies, configuration baselines, security templates, and deployment Systems must also be protected from attacks that attempt to enter through a Web browser 61

Summary (continued) Attacks can also be based on communications protocols and applications Additional security-based software, whose sole purpose is to fend off attacks, is another important layer of security A firewall is designed to prevent malicious packets from entering or leaving the computer 62