Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Similar documents
Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Implementing a Successful Security Assessment Process

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

AS/400 & iseries: A Comprehensive Guide to Setting System Values to Common Best Practice Securit

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about security? Securing e-commerce Web Sites. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about security? SANS Windows Security Training. Copyright SANS Institute Author Retains Full Rights

The Security Mechanism for IEEE Wireless Networks

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about security? The Achilles Heal of DNS. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about security? The OSI Model: An Overview. Copyright SANS Institute Author Retains Full Rights

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Implementing a Successful Security Assessment Process

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about cyber security training? Securing e-commerce Web Sites. Copyright SANS Institute Author Retains Full Rights

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Understanding and Implementing Microsoft Terminal Services & Citrix MetaFrame

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

716 West Ave Austin, TX USA

Interested in learning more about cyber security training? SANS Windows Security Training. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

SANS/REN-ISAC Partnership

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

SANS Vendor Offerings Detail

AS/400 & iseries: A Comprehensive Guide to Setting System Values to Common Best Practice Securit

Cyber Security Program

Six Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder data

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

SANS Vendor Offerings Detail

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

ACHIEVING FIFTH GENERATION CYBER SECURITY

Mastering The Endpoint

Windows XP and Full Raw Sockets: A New Security Concern from Home-based PC's or a Desirable N

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

netforensics - A Security Information Management Solution

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM

Make Digital Real Execute Smart. We engineer meaningful technology solutions to help businesses and societies flourish

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

A practical guide to IT security

The fast track to top skills and top jobs in cyber. Guaranteed.

Cybersecurity Survey Results

Interested in learning more about cyber security training? The Achilles Heal of DNS. Copyright SANS Institute Author Retains Full Rights

locuz.com SOC Services

Use offense to inform defense. Find flaws before the bad guys do.

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

E-guide Getting your CISSP Certification

Security in a Converging IT/OT World

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Make Digital Real Execute Smart. We engineer meaningful technology solutions to help businesses and societies flourish

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Security in India: Enabling a New Connected Era

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The five questions I am being asked by National Policy Makers and Utility CEOs; My Best Answers; And Where the Questions Don't Have Answers

Integrated Access Management Solutions. Access Televentures

Perspectives on Threat

The security challenge in a mobile world

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Wireless e-business Security. Lothar Vigelandzoon

TEL2813/IS2820 Security Management

Vulnerability Management Trends In APAC

Transcription:

Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec

Network Attack An InfoSec Topology Required Michael A. Bumpus December 30, 2000 High profile figures in the Information Security community have raised an interesting concept to describe network attack trends. They reveal that there have been three waves of network attack: physical, syntactic, and semantic. Identifying these attack trends helps set the conceptual framework for follow-on analysis, resulting in an increased level of professional understanding within InfoSec circles. Developing a profound knowledge of network attacks and other related aspects of InfoSec should help practitioners to better address today s threats and vulnerabilities (risk) and improve decision support. Key The alarming fingerprint situation, = AF19 however, FA27 2F94 is 998D that InfoSec FDB5 experts DE3D F8B5 are poorly 06E4 postured A169 4E46 to defend corporate and government resources against the current (syntactic) attack climate. As we progress further into the third wave era, the security situation worsens. Semantic attacks will force us to look beyond chic, cool, and expensive technology solutions to achieve only mediocre success. Security s scorecard in the war against network attacks means that we must also carefully address another aspect of security, the complex world of human factors also known as the soft side of information and network security. Optimistically, our actions to make appreciable strides in security requires researchers, vendors, management and practitioners to gain a deeper understanding of numerous security elements and to understand the interconnected nature of networks, technology, the use of technology, and the human interface an InfoSec topology. Attack trends Libicki s essay The Mesh and the Net discusses the future of military warfare from an information warfare perspective. 1 He codifies an approach to deal with network attack trends, and develops profiles according to the targets of such attacks. Cryptologist Bruce Schneier takes Libicki s three-wave scenario and explains them from an information security perspective. 2 The initial, or physical, wave dealt with attacks against targets such as electronics, computers, switches, databases, and power sources. This target set can be characterized as generally easy problems with which to contend, and normally of limited impact. This attack profile was mitigated by the use of distributed protocols and architectures, which created redundancies to prevent single critical nodes or points of failure. The next phase, syntactic, employs attacks against a different target, that of the operating logic of computers and networks. This type of attack has been occurring for several years and continues today: against software vulnerabilities, cryptographic algorithms, protocols, and denial of service vulnerabilities. This category is a tougher problem set than the previous one. Significant expenditures are spent on efforts to combat this wave Key which fingerprint includes a = distinct AF19 FA27 reliance 2F94 upon 998D technology FDB5 DE3D such F8B5 as firewalls, 06E4 A169 intrusion 4E46 detection, and anti-virus scanning software.

The third and emerging type is called the semantic wave. Schneier shows that targets in this category are no longer electronic devices, but instead the human interface. The effective response to this wave is less obvious than the first and second waves. In addition to continuing to devise technical expertise to defend against syntactic attacks, InfoSec professionals must also address the human dimension and know how people assign meaning to content. Responses reflect serious disconnect The overwhelming response to Schneier s The Third Wave Of Network Attacks article appear to miss the mark by dealing with only parts of the problem. Based on comments at Key Slashdot.com, fingerprint most = AF19 respondents FA27 2F94 failed 998D to understand FDB5 DE3D the F8B5 basic 06E4 premise A169 3 as 4E46 they focused on techniques or methods of attacks, vice the targets of attacks. Despite several assertions to the contrary, semantic does not equal social engineering nor does it solely mean insider abuse. A credible case can be made that social engineering and insider abuse certainly are elements of semantic attacks, but there are numerous other considerations as shown in the initial network attack topology below. Type Target Vulnerability Method Results Examples Mitigation Physical trunk wires, computers, electronics, switches, databases, power Design Procedures Security void Physical Electronic - malicious code: virus, Trojans, worms Limited: - single/few facility, computer, networks Laptop theft Physical, technology focus Redundancy, Distributed protocols Syntactic Semantic s/w products, protocols, crypto algorithms, operating logic -computers -networks Human Poor design Poor testing Accountability Electronic - malicious code: virus, Trojans, worms Widespread: - many different sites, computers, networks Morris worm DOS/DDOS Lovebug Melissa Mitnick Information - databases - raw - analyzed - reported - in-transit Human - trust level - naïveté - analysis threshold Information - access - data classification Social engineering Dumpster diving Competitive Intelligence Disinformation Key fingerprint = AF19 FA27 2F94 Hoax, 998D scams FDB5 Insider DE3D abuse F8B5 06E4 Cyber A169 4E46 - policy Data diddling Widespread or significant: - High $$$ - Life threatening Gain access Innaccurate intel Fraud Research, knowledge Emulex Hoax Web defacements MidEast conflict Techno focus - Intrusion detection - Incident response - Auditing - Passwords - biometrics - policy - - anti virus scanning - Firewalls Human/computer interface Human focused - situational awareness - education data handling -Intent

Subversion Espionage InfoWar False information Perception mgmt, Mass manipulation

In addition to the Slashdot responses, a McClure and Scambray weekly security commentary discuss the idea of mass manipulation and America s presidential race. They correctly comprehend the human aspect, quote Schneier s Third Wave article, and further assert, problems with misinformation aren t going to be fixed by technological magic wands because they target people, not code. 4 This commentary however, then jumps to the conclusion that policy is the answer. Convenient to use the network attack scenario to discuss policy, but there likely needs to be a more holistic approach, as situational awareness and security training are two other answers which quickly come to mind. To state the obvious, different InfoSec job functions yield different professional points of Key view. fingerprint Individuals = AF19 working FA27 intrusion 2F94 998D detection FDB5 issues DE3D focus F8B5 on technical 06E4 A169 aspects 4E46 to determine the answers to what, how, and when types of questions concerning unauthorized corporate intrusions, while intelligence analysts strive to determine the who, where, and why questions when looking at foreign penetration attempts. Meanwhile, law enforcement officials gather data on all categories to better apprehend perpetrators. There is a lack of, and therefore the opportunity for, social scientists to apply human factor research to the current network security problem set. The important point here is that it takes a convergence of technology and human factor perspectives to achieve InfoSec success. InfoSec soul searching As Schneier indicates, the InfoSec community is ill-prepared for such convergence. The SANS website also reflects a technology approach to InfoSec. The Northcutt Interview Whether Certification Matters and the About the SANS Institute page clearly focus on technical issues: the greatest threat to information security is the lack of people with technical security skills. 5 If one believes that SANS is an outstanding effort to reach consensus within the InfoSec community, then there is a strong reflection of the current InfoSec climate as being technology-oriented. In early November 2000, the topics covered by Level One security papers revealed that there were 26 topic areas with a total of 169 security research papers. 6 A quick view of the 26 topic areas to determine the number of technical versus non-technical topics led to an interesting imbalance as shown below:

A snapshot of the Information Reading Room articles reveals that 89% of the 169 papers were Technical in nature, while a mere 11% appeared by title to be Non-technical. Where we re heading e a profitable future for security vendors and consultants seeking solely technical solutions to information security problems. The SANS Security Alert for December 2000 s main article Expert predictions for Security Trends in 2001 includes several experts statements of continuing high levels of security expenditures. 7 However, Forrester Research takes a contrary view of increasing security budgets, stating Key that this fingerprint doesn t = necessarily AF19 FA27 equate 2F94 to 998D good FDB5 judgment DE3D or F8B5 effective 06E4 use A169 of company 4E46 resources. Despite estimates that security spending in the U.S. will grow by 300 percent through 2004, Forrester is concerned that much of this will be wasted effort. "Security managers aren't told what to secure so they oversecure business managers don't want to spend the time or make the investment in order to come up with good textured security they just want to tell the other guy to make it safe," according to Frank Prince, a senior analyst at Forrester. 8 The information security industry is unlikely to create silver bullets to completely safeguard e-commerce requirements. Imperfect technology is likely to reflect the capabilities of the fallible humans who design and maintain these technologies. 9 The key obstacle to overcome is that believing technology is the solution to the unreliability of human beings. Our high-level approach must blend human and technological considerations to improve security. One of the initial steps in this direction is for InfoSec professionals to develop an understanding of a comprehensive InfoSec topology. Endnotes: 1 Libicki, Martin. The Mesh and the Net Speculations on Armed Conflict In an Age of Free Silicon. Chapter 6, paragraph 6. March 1994. URL: http://www.ndu.edu/ndu/inss/macnair/mcnair28/m028ch06.html (26 Dec 2000). 2 Schneier, Bruce. Semantic Attacks: The Third Wave of Network Attacks. October 15, 2000. URL: http://www.counterpane.com/crypto-gram-0010.html (22 Dec 2000). 3 Swedish Lemon Angels. October 6, 2000. URL: http://slashdot.org/articles/00/10/06/055232.shtml (23 Dec 2000). 4 Schneier, Bruce. Secrets and Lies. Wiley Computer Publishing, 2000. p. 7.

5 McClure, Stuart and Scambray, Joel. Mass Manipulation Isn t Reserved Just For Presidential Elections: IT World Be Warned. November 23, 2000. URL: http://www.infoworld.com/articles/op/xml/00/11/20/001120opswatch.xml (19 Dec 2000) 6 Northcutt, Stephen. Northcutt Interview Whether Certification Matters. URL: http://www.sans.org/giactc/cert_dif.htm (15 Nov 2000). 7 SANS Institute. Information Security Reading Room. Version 2.66. URL: http://www.sans.org/onfosecfaq/index.htm (4 Nov 2000). 8 SANS Institute. Expert Predictions for Security Trends in 2001. December 2000. URL: http://www.sans.org/sanssecalert2_102000.pdf (15 Nov 2000). Key 9 Price, fingerprint Frank. Increased = AF19 FA27 Security 2F94 Spending 998D FDB5 Wasted DE3D November F8B5 06E4 2000 A169 URL: 4E46 http://www.forrester.com/er/research/report/excerpt/0,1338,10707,ff.html (2 Nov 2000). 10 Dumas, Lloyd. Lethal Arrogance. St. Martin s Press, 1999. p.12.

Last Updated: December 21st, 2017 Upcoming Training SANS Security East 2018 New Orleans, LA Jan 08, 2018 - Jan 13, 2018 Live Event Northern VA Winter - Reston 2018 Reston, VA Jan 15, 2018 - Jan 20, 2018 Live Event SANS Amsterdam January 2018 Amsterdam, Netherlands Jan 15, 2018 - Jan 20, 2018 Live Event Mentor Session - SEC401 Minneapolis, MN Jan 16, 2018 - Feb 27, 2018 Mentor Las Vegas 2018 - SEC401: Security Essentials Bootcamp Style Las Vegas, NV Jan 28, 2018 - Feb 02, 2018 vlive SANS Las Vegas 2018 Las Vegas, NV Jan 28, 2018 - Feb 02, 2018 Live Event Community SANS Chantilly SEC401 Chantilly, VA Jan 29, 2018 - Feb 03, 2018 Community SANS SANS Miami 2018 Miami, FL Jan 29, 2018 - Feb 03, 2018 Live Event SANS Scottsdale 2018 Scottsdale, AZ Feb 05, 2018 - Feb 10, 2018 Live Event SANS London February 2018 London, United Feb 05, 2018 - Feb 10, 2018 Live Event Kingdom Community SANS Madison SEC401 Madison, WI Feb 05, 2018 - Feb 10, 2018 Community SANS Southern California- Anaheim 2018 - SEC401: Security Anaheim, CA Feb 12, 2018 - Feb 17, 2018 vlive Essentials Bootcamp Style SANS Southern California- Anaheim 2018 Anaheim, CA Feb 12, 2018 - Feb 17, 2018 Live Event Community SANS Columbia SEC401 Columbia, MD Feb 12, 2018 - Feb 17, 2018 Community SANS SANS Dallas 2018 Dallas, TX Feb 19, 2018 - Feb 24, 2018 Live Event SANS Secure Japan 2018 Tokyo, Japan Feb 19, 2018 - Mar 03, 2018 Live Event SANS New York City Winter 2018 New York, NY Feb 26, 2018 - Mar 03, 2018 Live Event SANS London March 2018 London, United Mar 05, 2018 - Mar 10, 2018 Live Event Kingdom Mentor Session - SEC401 Vancouver, BC Mar 06, 2018 - May 15, 2018 Mentor Mentor Session - SEC401 Birmingham, AL Mar 06, 2018 - May 08, 2018 Mentor SANS Paris March 2018 Paris, France Mar 12, 2018 - Mar 17, 2018 Live Event SANS Secure Singapore 2018 Singapore, Singapore Mar 12, 2018 - Mar 24, 2018 Live Event SANS Secure Osaka 2018 Osaka, Japan Mar 12, 2018 - Mar 17, 2018 Live Event San Francisco Spring 2018 - SEC401: Security Essentials San Francisco, CA Mar 12, 2018 - Mar 17, 2018 vlive Bootcamp Style SANS San Francisco Spring 2018 San Francisco, CA Mar 12, 2018 - Mar 17, 2018 Live Event SANS Northern VA Spring - Tysons 2018 McLean, VA Mar 17, 2018 - Mar 24, 2018 Live Event SANS Pen Test Austin 2018 Austin, TX Mar 19, 2018 - Mar 24, 2018 Live Event SANS Munich March 2018 Munich, Germany Mar 19, 2018 - Mar 24, 2018 Live Event SANS Secure Canberra 2018 Canberra, Australia Mar 19, 2018 - Mar 24, 2018 Live Event Mentor Session - SEC401 Studio City, CA Mar 20, 2018 - May 01, 2018 Mentor Mentor Session - AW SEC401 Mayfield Village, OH Mar 21, 2018 - May 23, 2018 Mentor