CIT 480: Securing Computer Systems Putting It All Together
Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database. 2. Change control. 3. Threat analysis and prediction 4. Response coordination 1. Attack identification. 2. Incident response team.
Asset Identification Information Assets Databases, files, backup tapes, paper files. Software Assets Application and system software. Physical Assets Computers, network gear, storage media, generators. Services Subscriptions to databases like Lexis-Nexis Utility services like power, AC, etc. Outsourced services like voice, vending, etc.
Asset Valuation 1. How important is the asset to organization success? 2. How much revenue does the asset generate? 3. How expensive would the asset be to replace? 4. What other costs (legal liability, reputation damage) could be incurred by attacks on asset?
Evaluating Risk 1. Which threats present danger to asset? 2. What components of security (CIA) are threatened in which states of information? 3. What vulnerabilities exist that could lead to exploitation of asset? 4. What security controls could mitigate those vulnerabilities?
Components of Security Integrity Confidentiality Availability
Other Security Components Authenticity Anonymity Assurance
States of Information 1. Storage: information in memory or disk that is not currently being accessed. 2. Processing: information currently being used by processor. 3. Transmission: information in transit between one node and another on a network. Is your information protected in all three states?
Security Controls Security controls are policies, technologies, or human factors that avoid, reduce, or counteract security risks. Controls act in three main ways: Prevention: prevent attackers from violating security policy. Ex: firewall. Detection: detect attackers violation of security policy. Ex: anti-virus. Recovery: stop attack, assess and repair damage. Ex: backups.
Prevention Firewalls Prevent unauthorized network connections. Authentication Prevent unauthorized users from using system. File Access Control Prevent unauthorized access to files. Cryptography Prevent confidentiality violation even if intruder has access to data.
Detection Change management process Require security approval of network changes. Intrusion detection Automated network and/or host based intrusion detection systems. Network scans Audit network for rogue/missing machines. Verify security status of each network device. Log monitoring Monitor sensitive logs (e.g. firewall) in real time.
Recovery Snapshots Filesystem and VM snapshots allow reversion to a previous correct state of the system. Version Control Systems Version control systems like git allow sets of files to be reverted to a previous correct state. Configuration Management Systems like puppet automatically deploy servers based on configuration stored in a version control system. Backups Off-system/site backups permit recovery when all is lost.
Evaluating Security Controls 1. What assets are you trying to protect? 2. What are the risks to those assets? 3. How well does the security control mitigate those risks? 4. What additional risks does the security control cause? 5. What costs and trade-offs does the security control impose?
Authentication Authentication is the act of verifying than an entity is who or what they claim they are. Authentication can be based on 1. What the entity knows (e.g., passwords) 2. What the entity has (e.g., access card) 3. What the entity is (e.g., fingerprints) Or a combination of two or more of 1..3, which is known as Multi Factor Authentication (MFA).
Access Control
Cryptography The message M is called the plaintext. Alice will convert plaintext M to an encrypted form using an encryption algorithm E that outputs a ciphertext C for M. Sender Communication channel Recipient encrypt decrypt ciphertext plaintext plaintext shared secret key Attacker (eavesdropping) shared secret key
Detection Outcomes Actual Result Good Bad Measured Result Good Bad True Positive False Positive False Negative True Negative
Security Principles Compromise recording Economy of mechanism Fail-safe defaults Work factor Complete mediation Security Principles Psychological acceptability Open design Least common mechanism Least privilege Separation of privilege
Defense in Depth Data Application Host Internal network Perimeter Physical security Policies and procedures Authentication, ACLs, encryption, backups Secure programming, input validation, black and white box testing OS hardening, authentication, security patch management, AV, HIDS, nmap, and vulnerability scans Network segments (VLANs), NIDS, firewall, Nmap, and vulnerability scans Firewalls, border routers, VPNs, wireless security (802.11i) Guards, locks, cameras, RFIDs Security policies, procedures, and education
Threat Model A threat model describes which threats exist to a system, their capabilities, resources, motivations, and risk tolerance. Also known as an adversary model. Are you worried about broad or targeted threats? Are your threats able to develop their own tools or just use off the shelf tools? Do you keep enough data about historical incidents to know capabilities and motivations?
Who are the threats? IBM X-Force 2012 Trend and Risk Report
Incident Response 1. Preparation for attack (before attack detected) 2. Identification of attack 3. Containment of attack (confinement) 4. Damage assessment 5. Preserve evidence (if necessary) 6. Eradication of attack (stop attack) 7. Recovery from attack (restore to secure state) 8. Follow-up to attack (analysis and other actions)
Learning More at NKU Minors and Certificates Minors: Information Security, Computer Forensics Certificate in Cybersecurity (BS/IT cybersecurity track) Classes BIS 382: Principles of Information Security CIT 430: Computer Forensics CIT 484: Network Security CIT 481: Cybersecurity Capstone CSC 482: Computer Security CSC 483: Cryptology http://informatics.nku.edu/center-for-information-security/education.html
Local Security Groups NKU Cyber Defense Team https://norserage.com/ Cincinnati 2600 http://cinci2600.org/ Digital Forensics Working Group http://dfwg.co/ Infragard https://www.infragard.org/ Ohio Information Security Forum http://www.ohioinfosec.org/ OWASP Cincinnati https://www.owasp.org/index.php/cincinnati
Local Security Events Bsides Cincy (May) http://bsidescincy.org/ Ohio Infosec Forum (July @ Dayton, OH) http://www.ohioinfosec.org/anniversary.htm DerbyCon (September @ Louisville, KY) https://www.derbycon.com/ NKU Annual Security Symposium (October) http://informatics.nku.edu/center-for-information-security/events.html
Certifications General CISSP and related certifications from (ISC) 2 CISM from ISACA Security+ from CompTIA Technical GIAC certificate family from SANS Certified Ethical Hacker (CEH) from EC-Council Government CNSS 4011, 4012, and 4013 CAE (Cybersecurity Certificate) Vendor Specific CCNA Security, CCNP Security, CCIE Security
Security Careers Threat analysis and intelligence gathering Digital Forensics System and Data Administration Network Administration and Defense Systems Security Analysis Vulnerability Assessment and Management Incident Response Penetration Testing Information Systems Security Management http://www.cybersecurity-careers.com/
Job Titles Security Analyst Security Auditor Security Engineer Security Architect Security Administrator Security Specialist Forensic Analyst Incident Responder Malware Analyst Penetration Tester Vulnerability Researcher Job Prefixes Application Data Computer Information Mobile Network Software System Web
Released under CC BY-SA 3.0 This presentation is released under the Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license You are free: to Share to copy and redistribute the material in any medium to Adapt to remix, build, and transform upon the material to use part or all of this presentation in your own classes Under the following conditions: Attribution You must attribute the work to James Walden, but cannot do so in a way that suggests that he endorses you or your use of these materials. Share Alike If you remix, transform, or build upon this material, you must distribute the resulting work under this or a similar open license. Details and full text of the license can be found at https://creativecommons.org/licenses/by-nc-sa/3.0/