information security - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...type subtype examples...

16
INFORMATION SECURITY 1. Introduction to Information Security (2 ) Motivation (2 ) Goals (3 ) Threats/attacks to computer systems: classification, examples, “solutions” (4 ) Protecting a computer system (6 ) Projecting a security system (9 ) Some global points to consider: what to control? (12 ) Other points to consider (14 ) “Last” point: trusting the system (15 ) Phrases... (16 ) J. Magalhães Cruz Information Security – Introduction (short) 1-16

Upload: vodat

Post on 19-Mar-2018

226 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

INFORMATION SECURITY

1. Introduction to Information Security (2)Motivation (2)Goals (3)Threats/attacks to computer systems: classification, examples, “solutions” (4)Protecting a computer system (6)Projecting a security system (9)

Some global points to consider: what to control? (12)Other points to consider (14)“Last” point: trusting the system (15)

Phrases... (16)

J. Magalhães Cruz Information Security – Introduction (short) 1­16

Page 2: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

1. Introduction to Information Security

Motivation● Man­in­the­Middle Attack Against Chip and PINs

○ Nice attack against the EMV ­­ Eurocard Mastercard Visa ­­ the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without knowing the PIN. (…) The upshot is that you can buy stuff using a stolen card and a PIN of 0000 (or anything you want). We did so, on camera, using various journalists' cards. The transactions went through fine and the receipts say "Verified by PIN". In http://www.schneier.com/blog/archives/2010/02/man­in­the­midd_1.html.

● Fraudulent Digital Certificates Could Allow Spoofing○ Comodo advised Microsoft on March 16, 2011 that nine certificates had been signed on behalf of a third

party without sufficiently validating its identity. These certificates may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. (…) [they affect] all supported releases of Microsoft Windows, Windows Mobile 6.x, Windows Phone 7 (…). In Microsoft Security Advisory 2524375: http://technet.microsoft.com/en­us/security/advisory/2524375.

● Faking a message in current email systems (demo)...

J. Magalhães Cruz Information Security – Introduction (short) 2­16

Page 3: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Goals● To assure that only the information's owner (or her representative) is able to:

○ know it (existence and content) → Confidentiality1

○ alter it → Integrity○ access it → Availability (Disponibilidade)○ (All of this independently of the place where the info

is stored or passes through.)● To assure, as well:

○ the identification    of the information's user→  Authenticity2

1 Confidentiality encompasses Privacy, Secrecy, Anonymity2 Authenticity encompasses Authentication, Authorization, Access Control

J. Magalhães Cruz Information Security – Introduction (short) 3­16

Availability

C I

A

crypto-graphy

Page 4: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Threats1/attacks2 to computer systems: classification, examples, “solutions”

Type Subtype Examples “Solution”

Intent

none(act of God?!)

administrator's error,hardware's malfunction

hire godlike administrators,redundant hardware

on­purpose cyber­pirates,disgruntled employees

prevention software,contented employees

Origin

internal users' curiosity,deficient system's configuration

access control,pre-production tests

externalattacks to military's targets,eavesdropping communication's lines

enemy's monitoring,communication's encipherment

1 Threat    (or risk) is the possibility of occurrence of a (nasty) event in the future2 Attack    is the actual occurrence (or concretion) of the threat, usually in a deliberate way

J. Magalhães Cruz Information Security – Introduction (short) 4­16

Page 5: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Type Subtype Examples “Solution”

Operation mode

passive reading of exposed documents, inference

safeguarding of sensitive information,“randomization” of activities

active virus,server's flooding

anti­virus' software,system's load monitoring

Predictabilitynormal human malice and curiosity,

software bugstake the human factor into account,face the truth: most software sucks

difficult employee's madness,pipe's rupture in upstairs' room

detection of abnormal use,close monitoring of environment

Severitynormal

obstruction of communications lines,information's leaking with complicity

redundancy of communication paths,control of personal life of employees 

catastrophic destruction by tsunamis,destruction by arson

monitoring of oceans,being paranoid

J. Magalhães Cruz Information Security – Introduction (short) 5­16

Page 6: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Protecting a computer system

Core!

● define security policy -> who can do what, how and whenEx: file F can be read only by users U1 and U2

● use security mechanisms -> enforce the defined policyEx1: concede, by means of the operating system, to users U1 and U2 reading access to file FEx2: encipher F by means (algorithm or key) only known to U1 e U2

Exs. of security mechanisms:

● Ciphering● access control (after authorization, after authentication)● logging (monitoring, auditing)

J. Magalhães Cruz Information Security – Introduction (short) 6­16

Page 7: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Protecting a computer system (cont.)

Action levels of security mechanisms

● Attack prevention○ prevent their success

■ disturbance of normal operation?...● Attack detection

○ perceive them as soon as possible■ 'cause prevention is not always possible (virus...)

● Attack recovery○ restore the original status

■ but eliminate the entry point of the attack!

J. Magalhães Cruz Information Security – Introduction (short) 7­16

Page 8: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Protecting a computer system (cont.)

Difficulties

● Combining the available security mechanisms to properly enforce the defined policy

● Paying attention to the overall picture: design, implementation, test and administration (deployment, configuration, updating) of the system...

J. Magalhães Cruz Information Security – Introduction (short) 8­16

Page 9: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Projecting a security systemRisk analysis:

● threats● what is likely and what is not● differentiate the importance of the information

Cost­benefit analysis (estimation):

● estimate the cost of the losses and the price of the repairs● a security system should not cost more that the information it is supposed to 

protect!

Specification:

● explanation of the desirable workings of the system● should be correct and complete (proof?...)● definition of the security policy!

J. Magalhães Cruz Information Security – Introduction (short) 9­16

Page 10: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Projecting a security system (cont.)

Design:

● search and selection of the components that will implement the specification● alternatives: openness or secrecy? (security by obscurity?)● should be faithful to the specification: correct and complete (proof?...)● planning of the security mechanisms!

Implementation :

● concretion of the system design● should follow the design correctly an completely (proof?...)● in place execution of the planned mechanisms

Tests:

● verification of the compliance of the specifications● how to verify everything? With which tools?● may compel a return to a previous step

J. Magalhães Cruz Information Security – Introduction (short) 10­16

Page 11: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Projecting a security system (cont.)

Difficulty of proof of correction: plain software example

● proof by formal method (mathematical...)● analysis with tools (compiler...)● verification by experimentation

○ test all cases? But... are the test tools correct?...

J. Magalhães Cruz Information Security – Introduction (short) 11­16

Page 12: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Projecting a security system (cont.)

Some global points to consider: what to control?

● the information itself (integrity!) (Fig­a)● the user (confidentiality+integrity) (Fig­b)● the access patterns (confidentiality+availability)

(IDS....)● the infrastructure (see below)

● various of the previous items. How to choose them?○ it all depends on where you put your distrust!

J. Magalhães Cruz Information Security – Introduction (short) 12­16

Page 13: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Some global points to consider: what to control (cont.)

Control the infrastructure

● the net (Fig.):○ critical services in (special) separated machines○ few, well protected, points of access

● the machine:○ at what level? application? middleware? operating system? one of the 

communication layers. Which one?

J. Magalhães Cruz Information Security – Introduction (short) 13­16

Page 14: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Projecting a security system (cont.)

Other points to consider

● the human factor!○ in normal use!○ in administration!

● laws and habits○ exportation rules (United States , France...)○ social (in)tolerance to patents or copyrights

● simplification and openness !○ eases the evaluation, fault elimination, and assurance process○ minimizes costs○ minimizes human factor risks○ builds trust (to enlightened users!)

J. Magalhães Cruz Information Security – Introduction (short) 14­16

Page 15: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

...Projecting a security system (cont.)

“Last” point: trusting the system

● “suspected” quality of the specification, design and implementation!○ vendor/author reputation

● important for business● important for attack dissuasion

J. Magalhães Cruz Information Security – Introduction (short) 15­16

Page 16: INFORMATION SECURITY - web.fe.up.ptjmcruz/seginf/seginf.1516/acetat/1-intro...Type Subtype Examples “Solution ... logging (monitoring, auditing) J. Magalhães Cruz Information Security

Phrases...● Cryptography is rarely ever the solution to a security problem. (D. Gollmann, Computer 

Security, p. 203)

● Feature­rich security systems and high assurance do not match easily. (D. Gollmann, Computer Security, p. 14)

● With every release, software gets more complex and less secure until the only security left is job security. (A. Eldridge, quoted by Kaufman et al., Network Security, p. 595)

● There are two ways to design a system. One is to make it so simple there are obviously no deficiencies. The other is to make it so complex there are no obvious deficiencies. (C. A. R. Hoare, quoted by Kaufman et al., Network security, p. 441)

● Adding more code, adds more bugs. (A. S.Tanenbaum, Modern Operating Systems, p. 865)

● Perfection is reached not when there is no longer anything to add, but when there is no longer anything to take away. (A. S. Exupery, quoted by Tanenbaum, Modern Operating Systems, p. 859)

● Il faut qu’il [le système cryptographique] n’exige pas le secret, et qu’il puisse sans inconvénient tomber entre les mains de l’ennemi. (A. Kerckhoffs, La Cryptographie Militaire, Journal des Sciences Militaires, 1883)

J. Magalhães Cruz Information Security – Introduction (short) 16­16