security. myths about business risks in the information age zsecurity is only about protecting...

35
Security

Upload: malcolm-martin

Post on 12-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Security

Page 2: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Myths about Business Risksin the Information Age

Security is only about protecting “things” We don’t have any information anyone would

want Security problems have never happened here. Firewalls provide enough security Technology will solve the security problem The “enemy” is outside Our people won’t tolerate tight security My PC is secure, so I’m secure The Internet can’t be used for secure

communications

The Economist and Arthur Andersen

Page 3: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

SECURITY:

DeterDetectMinimize InvestigateRecover

Page 4: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Security Risks

Accidental Intentional

DestructionAlterationAccess

InternalExternal

Page 5: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Threats

Disaster and breakdownsAccess and disclosureAlteration or destructionImproper use

Page 6: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

RISK ASSESSMENT

P1 Probability of attack P2 Probability of successL Cost of Loss

Expected Loss = P1 * P2 * L

Minimize Threat Categories

Page 7: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Security Policy

Security is always a cost to efficiency. It must be promoted to be effective.

From the topBefore installing hardwarePolitically charged

Page 8: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Writing a Security Policy

Assess the types of risksIdentify vulnerabilitiesAnalyze user needsWrite the policyDevelop change proceduresPlan implementationImplement

Page 9: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Risk Areas

Personnel Risk Background checks Segregation of

duties Terminated

employees

Physical Access Risk

Disaster Risk Disaster Recovery Backup/hot sites

Integrity RiskAccess RiskAvailability Risk

Infrastructure Capability

Denial of service

Page 10: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Integrity Risk

Risks associated with the authorization, completeness and accuracy of transactions

User interfaceProcessingError Processing Interfaces with other systems/databasesChange ManagementData

Privacy Backup

Page 11: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Access Risk

Risks associated with inappropriate access to systems or data

Identification, authentication and nonrepudiation What you know, what you have, what you are Encryption (algorithm and key)

Secret key, private/public keysmart cards, hardware tokens

Digital Signature (hashing and public key; encrypt with private key, send with private key, and then decode with public key)

Certification authority and digital certificates Security Protocols

Firewalls and Guards

Page 12: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Elements of Risk

Access

Threat

Asset

Page 13: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Administrative Controls:Limit the Threat

Standards, rules, procedures and discipline to assure that personnel abide by established policies. Includes segregation of functions.

Page 14: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Administrative Controls

Security organizationAuditsRisk assessmentAdministrative standards and

procedures

Page 15: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Protecting the Assets

Resource managementDisaster recoverySystem segregation

Page 16: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Resource Management

Backup planningJob schedulingRedundant designSelective decoupling

Page 17: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Disaster Management

Redundancy and fault tolerant systems

Backups and off site storageHot and cold sitesPlanning and procedures

Page 18: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Elements of Risk

Access

Threat

Asset

Page 19: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Vulnerabilities

ServersSecuring operating systems and

applicationsNetworks

Access protection from snooping, attacks, spoofing

Clients and modemsUser verification for PCAnywhere etc.

Viruses

Page 20: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Operating Systems

UNIXNovell NetwareWindows and Windows NT

Page 21: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Secure Operating Systems

U.S. Government Certification A1, B1, B2, B3, C1, C2 (most

commercial systems), DEase of useCERT (Computer Emergency

Response Team) www.cert.org

Page 22: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Top 12 SecurityRisks

1. Hosts run unnecessary services

3. Information leakage through network service programs

4. Misuse of trusted access5. Misconfigured firewall

access lists7. Misconfigured web servers10.Inadequate logging,

monitoring or detecting

Page 23: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Top 12 Security Risks

2. Unpatched, outdated or default configured software

6. Weak Passwords8.Improperly exported file

sharing services9. Misconfigured or

unpatched Windows NT servers

11.Unsecured remote access12.Lack of comprehensive

policies and standards

Page 24: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Tools

FirewallsNetwork partitioning and routersEncryptionTesting toolsConsultants

Page 25: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Firewall functions

Packet Filter: Blocks traffic based on IP address and/or port numbers.

Proxy Server: Serves as a relay between two

networks, breaking the connection between the two. Network Address Translation (NAT): Hides the

IP addresses of client stations in an internal network by presenting one IP address to the outside world.

Stateful Inspection: Tracks the transaction in order to verify that the destination of an inbound packet matches the source of a previous outbound request. Generally can examine multiple layers of the protocol stack.

Page 26: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Firewall Operation

Page 27: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Firewall Operation

1.A router sits between two networks

2.A programmer writes an access control list, which contains IP addresses that can be allowed onto the network.

3.A message gets sent to the router. It checks the address against the access control list. If address the is on the list, it can go through.

4.If the address isn't on the list, the message is denied access to the network.

Page 28: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Encryption

Keys and key lengthPublic key/private keyProcessing problemsLocation

Application Network Firewall Link

Page 29: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Encryption Techniques

Page 30: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

How Public Encryption Works

1. Sue wants to send a message to Sam, so she finds his public key in a directory.

2. Sue uses the public key to encrypt the message and send it to Sam.

3. When the encrypted message arrives, Sam uses his private key to decrypt the data and read Sue's message.

Page 31: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Encryption at the Firewall

Page 32: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Authentication

Passwords“Credit” cardsBiometricsIsolationRemote location verification

Page 33: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Biometrics: how it works

Users "enroll" by having their fingerprints, irises, faces, signatures or voice prints scanned.

Key features are extracted and converted to unique templates, which are stored as encrypted numerical data.

Corresponding features presented by a would-be user are compared to the templates in the database.

Matches will rarely be perfect, and the owners of the system can vary a sensitivity threshhold so as to minimize either the rate of false rejections, which annoy users, or false acceptances, which jeopardize security. This offers far more flexibility than the binary

"Yes" or "No" answers given by password technologies.

Page 34: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

INTRUSIVNESS EFFORT ACCURACY COST

Dynamic signatureverification

Excellent Fair Fair Excellent

Face geometry Good Good Fair Good

Finger scan Fair Good Good Good

Hand geometry Fair Good Fair Fair

Passive iris scan Poor Excellent Excellent Poor

Retina scan Poor Poor Very Good Fair

Voice print Very good Poor Fair Very Good

Common biometric techniques and how they rate

International Biometric Group, New Yorkas reported in Computerworld, Quick Study: Biometrics, 10/12/98

Page 35: Security. Myths about Business Risks in the Information Age zSecurity is only about protecting “things” zWe don’t have any information anyone would want

Security