Network Security, Report 01
Network Security, Report 01
Exercise 1
1. Access to the device (re theft and possible hw modification that could compromis security)
➔ Mind it
➔ Keep out of sight when leaving in car, house, work
➔ Secure car with alarm
➔ Secure house with alarm, keep friendly with the neighbours.
2. Usability of device if stolen
➔ Trying to lock out usability of the device and access to data may render it so
unusable that it's easier to just leave it alone, or to collect a reward as 'finder' when
one realises it's useless for all but the most determined.
➔ Installation of a phone-home mechanism at the lowest possible level may help with
location and retrieval of the device if it is stolen.
➔ Prevent settings access in BIOS via a system lock (pw)
➔ Secure Hard Drive via a device lock (pw). With my model, apparently this remains
with HD if moved to another machine.
➔ Lock ability to Boot Up the machine via a BIOS level system lock (pw).
➔ Try to gauge effectiveness of System/BIOS and HD security mechanisms and act
appropriately to findings.
3. Sensitive Data
➔ Sensitive Data on the machine and elsewhere needs to be kept confidential or
removed [wipe] at the earliest convenience [backups, secure copies remain
elsewhere.]
➔ Need to consider risk associated with the varying data.
➔ Data access mechanisms such as VPN and SSH keys, passwords for e-mail, forums,
and other sites/services need to be protected in this consideration.
➔ Use of encrypted FS (virtual or in a partition or on other media ?) for storing
sensitive data, passwords/certs/etc, browser cache etc.
➔ Use of encryption where possible for data transfer across networks not under my
control [ practically all of them :) ] and paying more attention to the security of
services on the networks/web. (email, banks, govt., etc).
➔ Automate clearing of cached information and manually check at intervals for
anomalies.
4. The OS and Applications.
➔ Firewall
➔ Virus Protection
➔ Service Audit with a view to intrusion prevention. [e.g. Lock down open access
services such as DB installations, etc]
➔ Application research/audit prior to installation. Review application licence
agreements which are too often ignored and may contain agreement to allow
exposure of potentially sensitive information.
5. Usage Access
➔ Will set up a restricted account if it becomes necessary to allow other persons to use
the machine. Will not expose other security such as bios/system/hd access codes.
6. Virus Protection
✔ AVG
7. Spyware
✔ AdWare, Spybot search and destroy
8. Firewall
✔ Zonealarm
9. User Authentication
✔ no unsecured accounts
✔ all accounts have active idle timeout with pw protection (screen saver lock)
✔ further unuse causes power management to kick in, meaning use then requires system
startup security circumvention would also be required.
10. OS Auth protecting files
1. No. I have never seen this been shown to work outside of certain narrow cases.
2. FS and/or file encryption are the only potentially workable (imo) situations I have
seen, and are still prone to attack in the manner of their de/en-cryption. (memory
usage, temporary storage usage, the encryption controller/application and the
encryption scheme itself)
11. Up to date-ness
✔ os
✔ firewall
✔ virus
✔ applications, at least the most commonly used ones (openOffice, browser, email)
✔ check interval is satisfactory imo.
✔ Auto-matic-ness of updates is satisfactory imo.
1. :( recent report (ms watch ?) indicates that MS may be applying updates to certain
components even when auto-updating is not enabled.
12. Browser security
1. no confidence here.
2. Java and Javascript are enabled. There are plugins including flash enabled.
3. Browsers tend to store lots of info from history to form data, cookies, authed
sessions, and even passwords. Even when I set it to clear this info I sometimes find
during a browse information I would not have expected to be there.
4. They crash regularily, and chug lots of memory I don't see the need for, hinting imo
at lots of resource leaks. One can see from a quick scan of any security alert list that
resource usage (buffer overflows for e.g.) is well up there with the top [frequency]
mechanisms for intrusion.
13. Unencrypted network services
1. Print to network. I must get a local printer for the top secret document I'm churning
out by the dozen. A lot of printers in use nowadays are very conviently PS printers,
making conversion of sniffed data to PDF trivial.
2. Email. I have some accounts with no protection. Few with good authentication but
they don't have transport encryption for mail/sender/receipiant data (confidentiality).
3. IM. These are so convenient you could send the most sensitive data without realising
or giving a second thought. When I looked at these briefly years ago they were by no
means secure. The VOIP (V=voice and/or video) capabilitys of todays IM
application raise more interesting security considerations here.
4. Browsing. This is always an interesting one. Aside from the HTTP body itself, the
poor use of URI query strings (among other issues) can mean sensitive data is
exposed in proxies and even in the statistical records of web sites you visit. Consider
the simple and seemingly innocuous act of clicking a link in an email through web
based interface to that email, you could have your email account details on the target
of the link via the referrer information.
14. My Top 5
1. Lots of USB/SD/etc memory device usage. Small, easy to lose, non-encrypted.
2. Browser sync defaulted to include browser stored pw info for sites.
3. Network security at work.
4. Office (physical) security at work.
5. Location and movement of backups during house move.
6. Connecting a machine on a network after a long time off any network, specifically
no access to a network with web/internet access. The machine required many
updates to the OS and applications by the time it was finally re-joined to “the net”,
and during this (long) time to download the updates it was obviously online and thus
exposed to vunerabilities discovered during the time it was offline, and for the
duration of the update the (now very vunerable) browser was open ! All bad.
7. Blaster worm protection ?
15. Sans Top 20.
1. Still reading this one !
16. Machine Penetration testing (nmap) [ used on work pc ]
1. MsRpc, MsDs and netbios are open, though I have a personal firewall. I have not set
it at full blocking as I need to use certain network services (sharing etc). Still it's
interesting to see what is open. MsSql and mysql were found though noted as
filtered. This i didn't intend !
17. Online security Tips (US-CERT)
○ Some interesting points about posting information online, being careful about what you
advertise, etc.
○ Understanding the limits of firewall and virus protection packages
○ Power surge recommendations are something not often at the top of ones list. I have
some but not, interestingly, one that I bring with me and my portable pc.
○ Cell phone attacks is an interesting one i hadn't considered, but which will probably
become more of an issue as the technology improves in functionality and acceptance.
○