Home Computer and Internet User Security

Similar documents
NETWORK THREATS DEMAN

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: Networks

CS System Security Mid-Semester Review

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

The CERT Survivability and Information Assurance Curriculum Building Enterprise Networks on a Firm Educational Foundation

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Cyber Security Practice Questions. Varying Difficulty

Pass Microsoft Exam

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Cyber Security Basics. Presented by Darrel Karbginsky

GCIH. GIAC Certified Incident Handler.

Introduction to Information Security Dr. Rick Jerz

SECURING YOUR HOME NETWORK

Access Controls. CISSP Guide to Security Essentials Chapter 2

ECDL / ICDL IT Security. Syllabus Version 2.0

Certified Ethical Hacker (CEH)

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

SECURE USE OF IT Syllabus Version 2.0

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

SECURING INFORMATION SYSTEMS

CS System Security 2nd-Half Semester Review

2. INTRUDER DETECTION SYSTEMS

A practical guide to IT security

Internet Security Introduction. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok

The Protocols that run the Internet

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Wireless Attacks and Countermeasures

Chapter 4. Network Security. Part I

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Cyber Criminal Methods & Prevention Techniques. By

Technology in Action

Chapter 10: Security and Ethical Challenges of E-Business

Security and Authentication

ANATOMY OF AN ATTACK!

Syllabus: The syllabus is broadly structured as follows:

Education Network Security

Securing Information Systems

5. Execute the attack and obtain unauthorized access to the system.

Seqrite Endpoint Security

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Language-Based Protection

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Wireless LAN Security (RM12/2002)

CTS2134 Introduction to Networking. Module 08: Network Security

How Cyber-Criminals Steal and Profit from your Data

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CHAPTER 8 SECURING INFORMATION SYSTEMS

The Security Problem

Chapter 19 Security. Chapter 19 Security

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

VerifiedDumps. Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass

Network Security. Thierry Sans

5 Tips to Fortify your Wireless Network

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

Online Threats. This include human using them!

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Computer Security Policy

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Lecture 12. Application Layer. Application Layer 1

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Most Common Security Threats (cont.)

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Types of Attacks That Can Be Carried Out on Wireless Networks

Module 11. Security Methods

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Configuring your Home Wireless Network

Ethical Hacking and Prevention

Security Awareness Training June 2016

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

CompTIA Security+ E2C (2011 Edition) Exam.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

TWO Internet Set-up Instructions

Start the Security Walkthrough

Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ]

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Protection Against Malware. Alan German Ottawa PC Users Group

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

ECCouncil Exam v8 Certified Ethical Hacker v8 Exam Version: 7.0 [ Total Questions: 357 ]

Systems and Principles Unit Syllabus

Intruders, Human Identification and Authentication, Web Authentication

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

Network Security Issues and New Challenges

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

Carbon Black PCI Compliance Mapping Checklist

CEH: CERTIFIED ETHICAL HACKER v9

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Transcription:

Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 2005 Carnegie Mellon University CERT, CERT Coordination Center, and Carnegie Mellon are registered in the U.S. Patent and Trademark Office

Quotes to Ponder Homeland security begins at home. Various on the Internet Property has its duties as well as its rights. Thomas Drummond (1797-1840) Version 1.0.4 slide 2

Goals Aware Understand the issues Learn about Home Computer Security issues. Knowledgeable Skills to do something References contain specific technology examples and checklists. Educated Foundation for the future Fundamental issues are highlighted. Version 1.0.4 slide 3

Home Computer Security Guide to improving the security of your home computer Technology independent explanation Examples using Windows 2000 Checklists http://www.cert.org/homeusers/homecomputersecurity/ Version 1.0.4 slide 4

Topics Introduction Things you should know about security do to your home computer tasks do when using any computer practices Version 1.0.4 slide 5

Topics Introduction Things you should know about security do to your home computer tasks do when using any computer practices Version 1.0.4 slide 6

What Problem Are We Solving? What s yours is yours until you say otherwise! Keep computer-based possessions yours. Examples: CPU cycles memory disk space and contents - your files - software you ve bought Internet connectivity not a new idea What locks exist? How are they used? http://www.cert.org/homeusers/goalof_computersecurity.html Version 1.0.4 slide 7

Crime on the Internet Means + software or wetware Motive + Anything worth stealing on the Internet? Opportunity = Internet access readily available Internet crime! http://www.cert.org/homeusers/mmo.html Version 1.0.4 slide 8

Attack Sophistication Attack Sophistication vs. Intruder Technical Knowledge email propagation of malicious code stealth /advanced scanning techniques widespread attacks using NNTP to distribute attack DDoS attacks increase in worms sophisticated command & control widespread attacks on DNS infrastructure executable code attacks (against browsers) automated widespread attacks GUI intruder tools hijacking sessions Internet social engineering attacks widespread denial-of-service attacks automated probes/scans packet spoofing techniques to analyze code for vulnerabilities without source code antiforensic techniques home users targeted distributed attack tools increase in wide-scale Trojan horse distribution Windows-based remote controllable Trojans (Back Orifice) 1990 Intruder Knowledge 2003 Version 1.0.4 slide 9

Why Should I Care? You are probably either a professional or SA at the office an owner of a home computer Therefore, you are a system administrator! same responsibilities same tasks And, for home computers they are a prime target because they are less secure http://www.cert.org/homeusers/ira_sysadmin.html Version 1.0.4 slide 10

Topics Introduction Things you should know about security do to your home computer tasks do when using any computer practices Version 1.0.4 slide 11

Trust -1 We are trusting by nature. The Internet is built on trust. But the world has changed. Trust by itself is no longer sufficient. Consider a cereal box. Version 1.0.4 slide 12

Trust -2 Now imagine a web browser showing the lock on a web page. Who says that the lock represents an SSL or otherwise encrypted page? Version 1.0.4 slide 13

Trust -3 Chain of custody of bits, from construction to consumption Version 1.0.4 slide 14

Information in the Clear Eavesdropping Identity theft Dumpster diving Version 1.0.4 slide 15

How the Internet Works -1 Version 1.0.4 slide 16

How the Internet Works -2 Version 1.0.4 slide 17

Email is in the Clear Email A Postcard Written in Pencil http://www.cert.org/homeusers/email_postcard.html Version 1.0.4 slide 18

Topics Introduction Things you should know about security do to your home computer tasks do when using any computer practices Version 1.0.4 slide 19

The Nature of Maintenance All things to do are straightforward. When new, they may even be fun. However, they can get old. The challenge is to continue to do the task. Levels of effort required to maintain: low setup plus light maintenance ( fire and forget ) medium setup plus medium maintenance high setup plus significant maintenance Version 1.0.4 slide 20

Task: Install and Use Antivirus Software Easy way to gain control of your computer or account Violates trust DURCH tests Demand Check files on demand? Update Get new virus signatures automatically? Respond What can be done to infected files? Check Test every file for viruses. Heuristics Does it look like a virus? Level of effort: low Version 1.0.4 slide 21

Task: Keep Your Systems Patched >95% Unpatched programs are weak spots. Intruders exploit these to gain access. ABU tests Affected Is my system affected? Break Does this patch break something else? Undo Can I undo patch installation? Level of effort: patching: low what breaks: medium to high undoing install: medium to high Version 1.0.4 slide 22

Task: Install and Use a Firewall Program Limit connections to computer Limit connections from computer based on application Portable follows the computer (laptop) PLAT tests Program What program wants to connect? Location Where does it want to connect? Allowed Yes or no? Temporary Permanent or temporary? Level of effort: install: low maintain: high Version 1.0.4 slide 23

Speaking of Firewalls http://www.cert.org/homeusers/homecomputersecurity/#4 Version 1.0.4 slide 24

Task: Use Care when Downloading and Installing Programs Program may satisfy needs but may harm computer What does it really do? LUB tests Learn What does the program do to your computer? Understand Can you return it and completely remove it? Buy Purchase/download from reputable source? Level of effort: high Version 1.0.4 slide 25

Task: Install and Use a Hardware Firewall Guards all computer systems at home First layer of defense Fast Provides logging Bundled with cable/dsl router Bundled with wireless Default deny setting Level of effort: install: low maintain: low Version 1.0.4 slide 26

Tasks Summary Install and Use Antivirus Software Keep Your Systems Patched Install and Use a Firewall Program Use Care when Downloading and Installing Programs Install and Use a Hardware Firewall Some easy, some not so easy All important Version 1.0.4 slide 27

Topics Introduction Things you should know about security do to your home computer tasks do when using any computer practices Version 1.0.4 slide 28

What are Practices? Practices are steps to follow no matter what computer system you are using. A home computer is but one instance. Version 1.0.4 slide 29

Practice: Use Care When Reading Email with Attachments Executable content Interesting to you (social engineering) Violates trust KRESV tests Know test Know the sender? Received test Received email before? Expect test Did you expect this email? Sense test Does this email make sense? Virus test Contain a virus? Doesn t pass all tests? Don t open! Level of effort: high Version 1.0.4 slide 30

Using KRESV Tests 1. Send introductory email (Know) - ask permission to send attachment 2. Qualifies as Received 3. If OK, they will then Expect the email 4. Subject line needs to make Sense 5. Scan attachments for Viruses 6. Send the mail Level of effort: medium to high Version 1.0.4 slide 31

Practice: Make Backups of Important Files and Folders Can you recover a file or folder if lost? Does your computer have a spare tire? FOMS tests Files What files should be backed up? Often How often should a backup be made? Media What kind of media should be used? Store Where should that media be stored? Level of effort: setup: medium to high maintaining: medium Version 1.0.4 slide 32

Practice: Use Strong Passwords Passwords are like house keys Different key for each lock Brute force attacks Sniffing clear text SUPR tests Strong Password strong (length and content)? Unique Unique and unrelated to other passwords? Practical Can you remember it? Recent Have you changed it recently? Level of effort: medium Version 1.0.4 slide 33

The Best Protection Version 1.0.4 slide 34

Something You Know Username Password PIN Passphrase Version 1.0.4 slide 35

Something You Have Smart cards multi-function Examples national ID card driver s license Version 1.0.4 slide 36

Something You Are Face Signature Fingerprint Retina Iris Palm geometry Version 1.0.4 slide 37

Information Security Model Confidentiality Integrity Availability Processing Storage Transmission Policy and Procedures Technology Education, Training, and Awareness Version 1.0.4 slide 38

Data Confidentiality Access http://www.cert.org/homeusers/piglatin.html Version 1.0.4 slide 39

Internet Friend or Foe? Example SA posts question to Internet Gives details of network - hardware - software - applications Email address and telephone for quick response What does a potential intruder now know? http://www.cert.org/homeusers/internet_friendorfoe.html Version 1.0.4 slide 40

Data Confidentiality Encryption Version 1.0.4 slide 41

Practice: Install and Use Access Controls and File Encryption Confidentiality Need to know only Limit access to files and folders to only those authorized Confidentiality of printed information WAF tests Who Which users can access? Access What kind of access? Files/Folders Which need access? Level of effort: medium to high Version 1.0.4 slide 42

Integrity Can You Prove It? Ever get a CD in the mail, at home or in the office? How do you know where it came from? How do you know what it contains? What should you do with it? http://www.cert.org/homeusers/prove-it.html Version 1.0.4 slide 43

Practices Summary Use Care When Reading Email with Attachments Make Backups of Important Files and Folders Use Strong Passwords Install and Use Access Controls and File Encryption Things you do everywhere Some easy, some not so easy All important Version 1.0.4 slide 44

Knowledge Apply to Wireless Confidentiality Cannot limit access to airwaves. This means encryption (WEP). But WEP is weak. So use VPN or WAP. Disable SSID broadcasts. Access control Use MAC address filtering. But MAC addresses can be spoofed. So use 802.11X for user identification. Version 1.0.4 slide 45

Is There an Intruder in My Computer? Normal What s normal behavior? - running programs - network traffic - performance - operating system hard to do vendors don t help Abnormal need to know what normal is first Level of effort: high http://www.cert.org/homeusers/intruder_in_computer.html Version 1.0.4 slide 46

There IS an Intruder in My Computer What Now? Questions to answer: 1. What changed? What was there before? How did it look? 2. How did they get in? specific files changed 3. Why did they get in? missing patches out-of-date virus list no firewall Level of effort: high http://www.cert.org/homeusers/intruder2.html Version 1.0.4 slide 47

Questions? Version 1.0.4 slide 48

References The Larry Stories (http://www.cert.org/homeusers) Home Computer Security Guide (http://www.cert.org/homeusers/homecomputersecurity) Before You Connect a New Computer to the Internet (http://www.cert.org/tech_tips/before_you_plug_in.html) Version 1.0.4 slide 49

Contact Information Lawrence R. Rogers Email: cert@cert.org CERT website: http://www.cert.org/ Version 1.0.4 slide 50