C01 Introduction in Computer Security PDF
C01 Introduction in Computer Security PDF
Objectives
2.
Conficker (20082009)
Threats to Security
Malware
Intruders
Types of Intruders
10
11
Insiders
12
Criminal Organizations
13
14
Critical Infrastructures
15
Security Trends
16
Unauthorized access
DNS attacks
Avenues of Attack
17
It is specifically targeted.
It is a target of opportunity.
2
3 Finger
printing
4
18
Gather
Check the SEC EDGAR web site
information on the (www.sec.gov/edgar.shtml), whois look up, google
target
organization
Determine
systems available
Determine the
OS and open
ports
Discover
applicable
exploits
Execute exploit
Patching
Limiting
information
19
Types of Attacks
20
Basic Terms
Hacking
Phreaking
21
Confidentiality
Integrity
Availability
Additional Concepts
22
Authentication
Nonrepudiation
Auditability
Protection = Prevention
23
Previous model
24
Security Principles
Security approaches
Least privilege
Separation of duties
Implicit deny
Job rotation
Layered security
Defense in depth
Keep it simple
25
Security Approaches
Host Security
Network Security
26
Least Privilege
27
Separation of Duties
28
Implicit Deny
29
Job Rotation
30
Layered Security
31
Diversity of Defense
32
33
Keep It Simple
34
Security Topics
35
Access control
Authentication
Social engineering
Access Control
36
Authentication
37
38
Group policy
Password policy
39
Social Engineering
40
41
42
43
Need-to-know policy
44
45
Mandatory vacation
46
Security Models
Confidentiality models
47
Integrity models
Biba model
Clark-Wilson model
48
Two principles
Biba Model
49
Clark-Wilson Model
50
Model Summary
Model
BellLaPadula
Biba
Objective
Policies
Confidentiality
No read up
No write down
Integrity
No read down
No write up
Clark-Wilson
Integrity
51
Summary
52
References
53
[princ00] Principles of Computer Security: CompTIA Security+ and Beyound, Second Edition, Wm. Arthur Conklin, et. al.,
McGraw Hill, 2010
[spr00] The Spread of the Code-Red Worm
http://www.caida.org/research/security/code-red/coderedv2_analysis.xml
[time00] Timeline of Computer Viruses and Worms
http://en.wikipedia.org/wiki/Notable_computer_viruses_and_worms
[what00] The What, Why, and How of the 1988 Internet Worm (Morris Worm)
http://snowplow.org/tom/worm/worm.html
[conf00] The Inside Story of the Conficker Worm
http://www.newscientist.com/article/mg20227121.500-the-inside-story-of-the-conficker-worm.html
[love00] "No 'sorry' from Love Bug author"
http://www.theregister.co.uk/2005/05/11/love_bug_author/
[priv00] Least privilege
http://www.infoworld.com/d/security-central/computer-security-why-have-least-privilege-398
[priv01] Least privilege
http://www.ibm.com/developerworks/linux/library/l-sppriv.html?ca=dgr-lnxw04Privileges
[poli00] Policies Templates
http://www.sans.org/security-resources/policies/
[pbs00] PBS "Cyber War"
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/
[war00] 60 Minutes "Cyber War"
http://www.cbsnews.com/stories/2009/11/06/60minutes/main5555565.shtml
[defe00] Defense-in-depth program introduces availability, confidentiality, integrity, authentication, and nonrepudiation
integrated into government. http://niatec.info/mediacontent/InTodaysWorld.wmv
[mccu00] Introduces the McCumber model in a humorous manner
http://niatec.info/mediacontent/The%20Cube.WMV