security last update 2013.10.14 1.0.0 copyright kenneth m. chipps ph.d. 2013 1

65
Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 1

Upload: magnus-haynes

Post on 17-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security

Last Update 2013.10.14

1.0.0

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com

1

Page 2: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Common Security Challenges

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 2

Page 3: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Legal Requirements

• HIPPA• Sarbanes Oxley• Gramm Leach Billey

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 3

Page 4: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

• To defend against attacks use the same methods the attacker uses so as to develop and test the defenses against these attacks– Perform footprint analysis or reconnaissance

• For example, a company web page can lead to information, such as the IP addresses of servers

• From there, an attacker can create a picture of the company's security profile or footprint

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 4

Page 5: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

– Enumerate information• An attacker can expand on the footprint by

monitoring network traffic with a packet sniffer such as Wireshark, finding information such as version numbers of FTP servers and mail servers

• A cross-reference with vulnerability databases exposes the company's applications to potential exploits

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

5

Page 6: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

– Manipulate users to gain access• Sometimes employees choose passwords that are

easily crackable• In other instances, employees can be duped by

talented attackers into giving up sensitive access-related information

– Escalate privileges• After attackers gain basic access, they use their

skills to increase their network privileges

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

6

Page 7: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

– Gather additional passwords and secrets• With improved access privileges, attackers use

their talents to gain access to sensitive information

– Install back doors• Back doors give the attacker a way to enter the

system without being detected• The most common back door is an open listening

TCP or UDP port

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

7

Page 8: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

– Leverage the compromised system• After a system is compromised an attacker uses it

to stage attacks on other hosts in the network

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

8

Page 9: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

• Specific methods to defend against attacks include– Host-and Server-Based Security

• Host-and server-based security must be applied to all network systems

• Mitigation techniques for these devices include – Device hardening – Antivirus software – Personal firewalls– Operating system patches

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

9

Page 10: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Firewalls

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 10

Page 11: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Defense Against Attacks

• Intrusion Detection and Prevention – IDS - Intrusion detection systems detect

attacks against a network and send logs to a management console

– IPS - Intrusion prevention systems prevent attacks against the network and should provide the following active defense mechanisms in addition to detection

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

11

Page 12: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security Policy

• The first step any organization should take to protect its data and itself from a liability challenge is to develop a security policy

• A security policy is a set of principles that guides decision-making processes and enable leaders in an organization to distribute authority confidently

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

12

Page 13: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security Policy

• RFC 2196 states• A security policy is a formal statement of the

rules by which people who are given access to an organization's technology and information assets must abide

• A security policy can be as simple as a brief Acceptable Use Policy for network resources, or it can be several hundred pages long and detail every element of connectivity Copyright 2010-2011 Kenneth M. Chipps Ph.D.

www.chipps.com13

Page 14: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security Policy

• The security policy also varies based on business type, company size, number of users, type of industry, threats, and vulnerabilities

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

14

Page 15: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security Policy

• A security policy meets these goals– It informs users, staff, and managers of their

obligations for protecting technology and information assets

– It specifies the mechanisms through which these requirements can be met

– It provides a baseline from which to acquire, configure, and audit computer systems and networks for compliance with the policy

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

15

Page 16: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Security Policy

Copyright 2010-2011 Kenneth M. Chipps Ph.D. www.chipps.com

16

Page 17: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Disaster Management

• There are many elements to a good disaster management plan

• Each of these elements must be in place, monitored for effectiveness, and updated as required

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

17

Page 18: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Elements

• Backup• Spare Parts• Complete Disaster Plan• Business Continuity Planning

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

18

Page 19: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• Why do we back things up• Who cares• What difference does it make• Well, actually sometimes it is important• For example

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

19

Page 20: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

20

Page 21: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

21

Page 22: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

22

Page 23: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

23

Page 24: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

24

Page 25: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• Right inside the door there and slightly to the left was the LAN room

• So, sometimes it is a good idea to back things up after all

• The first thing to do is develop a plan• This plan should include what will be

backed up, who should do the backup, and what will be done with the backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

25

Page 26: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• Certainly the data should be backed up• You may also wish to backup everything

else on the drive or just parts of it such as configuration files

• In some cases it is easier to just reload everything from scratch than to attempt a restore

• Be sure you know where the data is

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

26

Page 27: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• Is all data on the servers or do users store some on their workstations

• Some operations will store data on the workstations and just copy it over to the server once a week or once a month

• You must account for all data, no matter where it is

• Where should the backup be stored

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

27

Page 28: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• A copy should be kept onsite in a sealed and fireproof box or vault

• Not in a fire resistant, but an absolutely I do not care how hot it gets fireproof box

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

28

Page 29: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

29

Page 30: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• A copy must also be stored off site on a regular basis

• For small and medium size operations a safe deposit box is a good choice

• If you have two locations copy the data from one to the other over the Internet

• Third party companies will also come by and pickup the backup tapes on a regular basis

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

30

Page 31: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• What can you see wrong in the picture shown below

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

31

Page 32: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• This picture was taken in the LAN room referred to above before the tornado rearranged things

• I found the tapes laying on the floor in a pool of water

• Notice all of the backup tapes in a cardboard box out in the open, right beside the tape drive

• No, this arrangement was not my ideaCopyright 2000-2009 Kenneth M. Chipps Ph.D.

www.chipps.com32

Page 33: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• The schedule of backups depends on how much data can be lost

• If it is not too much trouble to redo a week’s worth of work, then backup once a week

• If you cannot loose even a second of data, then use a solution to meet that problem

• The business model and procedures will drive the backup plan to a large extent

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

33

Page 34: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup

• Who should do the backup• It does not matter as long as it is always

done• Someone needs to be assigned the task of

doing and verifying the backup• Be certain they maintain a log that shows

the date of the backup, the number of the media used, and the success or failure of the attempt

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

34

Page 35: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Backup Retention

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

35

Page 36: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Spare Parts

• It is wise to keep common spare parts on hand for critical systems

• Or even better design redundancy into the network

• Common spares to keep are– Power supplies– Memory– Hard drives– In short as much as possible for vital systems

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

36

Page 37: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

• What happens if everything falls apart• What do you do if everything is lost• Decide what is to be done before it

happens• This may be a plan to just rebuild the LAN• It may need to be a 24 X 7 hot site where

business can be shifted within a few hours• The main thing that drives this is how fast

you need to be back at workCopyright 2000-2009 Kenneth M. Chipps Ph.D.

www.chipps.com37

Page 38: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

• The key point is to think about it before it happens

• Because

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

38

Page 39: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

39

Page 40: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

40

Page 41: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

41

Page 42: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

• Address at least the following aspects– Are adequate backup systems in place– Are backup systems tested on a regular basis– How will data be recovered– Is there a disaster management team– Does the infrastructure include backup or

redundant connections

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

42

Page 43: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

– Is equipment completely documented including• Serial numbers• Specifications• Passwords• Naming plans

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

43

Page 44: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Complete Disaster Plan

– Will support materials be available such as• Installation disks• Startup disks• License numbers

– How will the groups in the organization be affected

– What groups need to be functional first– Will each group be able to function without

access to the network– If so for how long and how

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

44

Page 45: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Audit

• Most operating systems for networks produce security logs

• Check these logs• Also run a port monitoring program to see

what outside user is scanning your network

• They only do this to see where they can get in

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

45

Page 46: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Audit

• Do not let them in an open window in the basement you forgot about

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

46

Page 47: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Business Continuity Planning

• Recent events have called into question many of the disaster recovery plans organizations had made

• The potential catastrophic nature of a terrorists attack on a building or area has highlighted the need for a more complete approach to disaster recovery, than merely storing tapes off site

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

47

Page 48: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Business Continuity Planning

• The need to create an entire new site, rapidly has become more important

• One approach to this process is Business Continuity Planning

• Most of the following is word for word from an excellent article titled “Ensuring Business Continuity” by Wing Lam that appeared in IT Pro – an IEEE publication – in June 2002

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

48

Page 49: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Business Continuity Planning

• BCP - Business Continuity Planning is a cyclical approach

• This is the first error many organizations will make when doing this process

• They will proceed through it, then put it on the shelf

• This is an approach that must run in a cycle

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

49

Page 50: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Business Continuity Planning

• This is especially true of IT operations, as this field and the technology in it changes almost daily

• The plan must be revisited whenever the organization introduces changes to the business or alters its business priorities

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

50

Page 51: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

BCP Steps

• The steps in BCP are– Initiate the BCP project– Identify business threats– Conduct a risk analysis– Establish the business continuity team– Design the business continuity plan– Define the business continuity process– Test the business continuity plan– Review the business continuity plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

51

Page 52: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Initiate the BCP Project

• Obtain and confirm support from senior management

• Identify key business and technical stakeholders

• Form a business continuity working group• Define objectives and constraints• Establish strategic milestones and draw up

a road map

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

52

Page 53: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Initiate the BCP Project

• Begin a draft version of business continuity policy

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

53

Page 54: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Identify Business Threats

• Identify the community of business and technical stakeholders

• Conduct threat identification workshops• Delineate and document business threats

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

54

Page 55: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Conduct a Risk Analysis

• Conduct risk analysis workshops• Assess the likelihood and impact of threat

occurrence• Categorize and prioritize threats according

to risk level• Review outputs of risk analysis with

management

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

55

Page 56: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Conduct a Risk Analysis

• Ascertain level of risk acceptable to the organization

• Document outputs in business continuity policy

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

56

Page 57: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Establish the Team

• Identify key business, technical, and customer services stakeholders

• Form and empower the business continuity team

• Clarify and agree on team objectives and working mode

• Define roles and responsibilities; produce a work plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

57

Page 58: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Establish the Team

• Identify incident engagement and response processes

• Update business continuity policy

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

58

Page 59: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Design the Plan

• Identify critical and noncritical business services

• Establish preferred business continuity service levels and profiles for continuity and recovery

• Reaffirm key constraints, such as time and cost

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

59

Page 60: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Design the Plan

• For each threat, identify possible continuity strategies and evaluate them in terms of time, cost, and benefits

• Identify and engage potential business continuity partners

• Draft a set of continuity plans • Produce and execute an implementation

plan

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

60

Page 61: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Define the Process

• Identify, define, and document business continuity processes

• Review and verify business continuity processes with relevant stakeholders

• Identify training requirements• Develop training exercises, role-playing

scripts, and simulation case studies• Initiate training and awareness programs

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

61

Page 62: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Test the Plan

• Define business continuity acceptance criteria

• Formulate the business continuity test plan• Identify major testing milestones• Devise the testing schedule• Execute tests via simulation and

rehearsal; document test results

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

62

Page 63: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Test the Plan

• Assess overall effectiveness of business continuity plan; pinpoint areas of weakness and improvement

• Iterate tests until the plan meets acceptance criteria

• Check, complete, and distribute business continuity policy

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

63

Page 64: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Review the Plan

• Develop a review schedule for different types of review

• Arrange a business continuity review meeting or workshop

• Update the business continuity document• Kick off another BCP cycle if necessary

Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com

64

Page 65: Security Last Update 2013.10.14 1.0.0 Copyright Kenneth M. Chipps Ph.D. 2013  1

Sources

• Most of this is copied from– Management Information Systems– 12 Edition– Ken Laudon and Jane Laudon

Copyright Kenneth M. Chipps Ph.D. 2013 www.chipps.com 65