Del PDF
Del PDF
Cyber Security
1
What is a Cyber Security?
2
What is a Cyber Space?
‘Cyberspace is a worldwide network of computers and the equipment
that connects them,which by its very design is free and open to the
public (the Internet)’
Internet-enabled crime
• Criminals see lower risks and high rewards from cyber crime than through‘physical’
crime
• Stealing confidential and national secrets by intelligence agencies and others now
involves illegally accessing digitized information.
• Nation states have the potential to disrupt an enemy’s economy and perhaps reach
their strategic objectives without risk to their armed forces
• There are fewer online barriers to anti- social behavior on the net than in face to face
interaction. 3
• Cybersecurity = security of cyberspace (information systems and
networks)
and assets. 4
Scope of cybersecurity
• Techniques of threat and attack analysis and mitigation
the Internet
Cyber attack
•A malicious attempt, using digital technologies, to cause personal or property loss or
damage, and/or steal or alter confidential personal or organizational data.
Insider attacks
•Attacks to an organization carried out by someone who is inside that organization.
•Difficult to counter using technical methods as the insider may have valid credentials to access
the system.
External attacks
•Attacks to an organization carried out by an external agent.
•Requires either valid credentials or the exploitation of some vulnerability to gain access to
the systems. 6
Threat Model
•Threat modeling is among the hardest tasks of a security
researcher
• Adversary resources and capabilities:
-Every power that the adversary has
-E.g. parts of the system observed, parts of the system that can be
influenced, parties they can corrupt
• Strategic Adversary:
-The adversary will chose to commit resources optimally to violate the
security properties
7
Protection
• What is it that you want to protect?
- Defining assets
• What are the goals of the protection efforts?
- Security properties
• What do you want to protect against?
- Attack: any maliciously intended act against a system or a population of
systems; any action that violates a given security policy
8
Threats vs Vulnerabilities
• Threats
- Define who might attack against what assets, using what
resources, with what goal in mind, when/where/why, and with
what probability
• Vulnerabilities
- Specific weakness in security that could be exploited by
adversaries with a wide range of motivations and interest in a lot
of different assets
9
• Example 1:
-Threat: Thieves could break into our facility and steal our
equipment
-Vulnerability: The lock we are using on the building doors is
easy to pick
• Example 2:
- Threat: Adversaries might install malware so they can steal
social security numbers for identity theft
- Vulnerability: My computer does not have up-to-date virus
signatures and/or has an insecure browser
10
Harm vs Attack
• Harm
-Negative consequence of an actualized threat
-E.g., a stolen computer, modified or lost file, revealed private letter, or
denial of access
- Usually, harm occurs when a threat is realized against a vulnerability
• Attack
- An attempt by an adversary to cause harm to valuable assets, usually
by trying to exploit one or more vulnerabilities
11
More definitions
• Threat Assessment
- Attempting to predict the threat
• Vulnerability Assessment
- Attempting to discover security vulnerability
• Risk
- The combination of the probability of an event and its
consequence
• Risk Management
- Attempting to minimize (security) hazards by deciding intelligently how to
deploy, modify, or re-assign security resources. 12
Countermeasures
• Countermeasure (or control):
- A means to counter threats
- To protect against harm, we can neutralize the threat, close the
vulnerability, or both.
• Typical countermeasure involve:
- Prevention: blocking the attack or closing the vulnerability
- Dissuasion: making the attack harder but not impossible
- Deflection: making another target more attractive
- Mitigation: making its impact less severe
- Detection: either as it happens or some time after the fact
- Recovering from attack, making sure it doesn’t happen again 13
Some Numbers
• Adware industry is worth $2 billion/year, malware industry is $105 billion/year
• 50%-80% of computers connected to Internet are infected with spyware
• 81% of emails is spam (Symantec report 2011)
90% of web applications are vulnerable (Cenzic 2009)
• 5.5 billion malware attacks in 2011 (Symantec 2011) 2012: 42%
increase in target attacks
• In UK, £1B lost on cybersecurity attacks every year 1 in 5
individuals affected
• Good news:
- Cyber Security market in 2011 was worth $63.7 billion, expected to grow to
about $120.1 billion by 2017
14
Some reasons
• System and network administrators are not prepared
- Insufficient resources
- Lack of training
• Attackers leverage the availability of broadband connections
- Many connected home computers are vulnerable
- Collections of compromised home computers are “good“ weapons for
attacks
• High speed networking, powerful CPUs, always on
15
Bugs and failure
•Hardware and software are developed by humans and therefore
are not perfect
• A human error may introduce a bug (or fault)
• When a fault gets triggered, it might generate a failure…
- If the fault is “security-related”, it is usually called a vulnerability
- When the vulnerability is triggered (exploited) can lead to the
compromise
16
Changing Nature of the Threat
• Attackers are more prepared and organized
• Attacks are easy, low-risk and difficult to trace
• Increasingly sophisticated but also easy to use
• Source code is not required to find vulnerabilities
• The complexity of Internet-related applications and protocols
are increasing - and so is our dependency on them
17
Insecure Software
• Technical factors
- Complexity of task, composition, changes
• Economic factors
- Open-source vs closed-source
- Security is not a feature
- Deadlines
- Insufficient funding/resources
• Human factors
- Mental models
- Social factors
- Poor risk analysis 18
SOURCES OF
SECURITYTHREATS
19
FACTORS
• Developers of the network infrastructure and protocols also followed a policy to create
an interface that is user-friendly,efficient,and transparent
21
2. WEAKNESS IN NETWORK INFRASTRUCTURE
AND COMMUNICATION PROTOCOLS
• The Internet is a packet network that works by breaking data
• As packets are di-assembled, transmitted, and re-assembled, the security of each
individual packet and the intermediary transmitting elements must be granted
• Three-Way hand shake…..
• Half-open port remains open, an intruder can enter the system
• Packet transmissions between network elements can be intercepted and their contents
altered such as in initial sequence number attack
22
3. RAPID GROWTH OF CYBERSPACE
23
24 4.GROWTH OF HACKER COMMUNITY
25 5.VULNERABILITY IN OPERATING SYSTEM
PROTOCOL
• OS plays a crucial role in the security of the system in providing access to vital system
resources
• Hackers look for OS identifying information like file extensions for expliots
THE INTERNET IS FUNDAMENTALLY OPEN
Facts:
• We don’t know what’s on our own nets
• What’s on our nets is bad,and existing practices aren’t
finding everything
• Threat is in the“interior”
• Threat is faster than the response Global Internet
• “Boundaries” are irrelevant
• We don’t know what is on our partner’s nets nor on the
points of intersection
• Compromises occur despite defenses
• Depending on the motivation behind any particular
threat,it can be a nuisance,costly or mission threatening
6.THE INVISIBLE SECURITY THREAT – THE INSIDER
EFFECT
• The greatest threat to security in any enterprise is the guy down the hall
• Many company executives and security managers had for a long time neglected to deal
with the guys down the hall selling corporate secrets to competitors
• Company insiders intentionally or accidentally misusing information pose the greatest
information security threat to today’s internet-centric businesses
27
7. SOCIAL ENGINEERING
• The insider effect can also involve insiders unknowingly being part of of the security
threat through the power of social engineering
• Consists of an array of methods an intruder such as hackers can use to gain system
authorization through masquerading an an authorized user of the network.
28
8. PHYSICAL THEFT
• Demand for information by businesses to stay competitive and nations to remain strong
heats up,theft is on the rise
• E.g Laptops,PDA ,mobile devices
29
SECURITYTHREAT
MOTIVES
30
1.TERRORISM
• Cyber-terrorism is not only about obtaining information;it is also about instilling fear and
doubt and compromising the integrity of the data
31
2. MILITARY ESPIONAGE
32
3. ECONOMIC ESPIONAGE
33
4.TARGETING THE NATIONAL INFORMATION
INFRASTRUCTURE
• Foreign power-sponsored or foreign power-coordinated directed at a target country,
corporation, establishments, or persons
• Target specific facilities, personnel, information, or computer, cable, satellite, or
telecommunication systems
• Activities may include:
• Denial or disruption of systems, devices, etc.
• Un authorized monitoring of ….
• Unauthorized disclosure of propriety or classified information stored within or communicated
through
• Modification or manipulation of systems, operations and data
34
5.VENDETTA/REVENGE
35
6. HATE
36
7. NOTORIETY/ GREED/ IGNORANCE
• Especially young hackers try to break into a system to prove their competence and to
show off to their friends that they are intelligent or superhuman in order to gain respect
• Many intruders into company systems do so to gain financially from their acts
• A novice in computer security stumbles on an exploit or vulnerability and without
knowing or understanding it uses it to attack other systems
37
SECURITY THREAT MANAGEMENT
38
• RiskAnalysis
• Security threats all targeting the same resource,each threat will cause a different risk
• Important to decide which threat to deal with first
• ForensicAnalysis
• Done after a threat has been identified and contained
39
SOMETYPES OF CYBERTHREATS
Type Motivation Target Method
Information Military or political Critical Attack, corrupt,
Warfare dominance infrastructure, exploit, deny,
political and conjoint with
military assets physical attack
Cyber Espionage Gain of intellectual Governments, Advanced
Property and companies, Persistent Threats
Secrets individuals
Cyber Crime Economic gain Individuals, Fraud, ID theft,
companies, extortion, Attack,
governments Exploit
Cracking Ego, personal Individuals, Attack, Exploit
enmity companies,
governments
Hactivism Political change Governments, Attack, defacing
Companeis
Cyber Terror Political change Innocent victims, Marketing, 40
recruiting command and
control, computer
based voilence
CYBER RISKSAREAN INCREASINGTHREATTO SOURCES OF
ENTERPRISE CAPABILITYAND BRAND COMPETITIVENESS
Now
Extortion • Phishing and pharming driving increased
customer costs, especially for financial
services sector
• DDOS extortion attacks Now
1.IdentifyAssets
2.Create anArchitecture Overview
3. Decompose theApplication
4. Identify theThreats
5. Document theThreats
6. Rate theThreats
42
VULNERABILITIES
43
• Definition
• System vulnerabilities are weaknesses in the software or hardware on a server or a
client that can be exploited by a determined intruder to gain access to or shut down
a network
• System vulnerability as a condition,a weakness of or an absence of security
procedure,or technical,physical,or other controls that could be exploited by a
threat
45
SOURCES OF VULNERABILITIES
• The frequency of attacks in the last several years, and the speed and spread of
these attacks indicate serious security vulnerability problems in our systems
• Most frequently mentioned sources
• Design flaws
• Poor security management
• Incorrect implementation
• Internet technology vulnerability
• Nature of intruder activity
• Difficulty of fixing vulnerabilities
• Limits in effective reaction solution
• Social engineering 46
1. DESIGN FLAWS
47
1.2 Software Complexity
• Complexity
• Difficult testing
• Ease of programming
48
1.3Trustworthy Software Sources
• Open source movement
49
2.POOR SECURITY MANAGEMENT
51
3. INCORRECT IMPLEMENTATION
52
• Incompatibility in system interfaces may be cause by a variety of
conditions usually created by things such as:
• Too much detail
• Not enough understanding of the underlying parameters
• Poor communication during design
• Selecting the software or hardware modules before
• understanding the receiving software
• Ignoring integration issues
• Error in manual entry 53
4. INTERNET TECHNOLOGY VULNERABILITY
• Port-based vulnerabilities
54
5. CHANGING NATURE OF HACKER TECHNOLOGIES
AND ACTIVITIES
• Factors:
• limited resources,and
• Number of vulnerability
57
VULNERABILITY ASSESSMENT
• VulnerabilityAssessment Services
• Vulnerability Scanning
• ApplicationAssessment
58
SECURITYATTACK
59
ATTACK
60
ATTACK
1. Reconnaissance
• Is the unauthorized discovery and mapping of systems,services,or vulnerabilities.
• Also known as information gathering and,which precedes an actual access or denial-
of-service (DoS) attack.
• Analogous to a thief casing a neighborhood for vulnerable homes to break into
• such as an unoccupied residence,easy-to-open doors,or open windows
• Reconnaissance attacks can consist of the following:
• Packet sniffers,Port scans, Ping sweeps, Internet information queries
61
ATTACK
2. Access
• Ability for an unauthorized intruder to gain access to a device for which the
intruder does not have an account or a password
• Entering or accessing systems to which one does not have authority to access
• involves running a hack, script, or tool that exploits a known vulnerability of the system
or application being attacked
• Consist of the following:
• Password attacks, trust exploitation, Port redirection, Man-in-the-middle attacks,
Social engineering, Phishing
62
ATTACK
4. Worms,Viruses,andTrojan Horses
• Malicious software is inserted onto a host to damage a system; corrupt a system;
replicate itself;or deny services or access to networks,systems or services.
• They can also allow sensitive information to be copied or echoed to other systems.
• Trojan horses can be used to ask the user to enter sensitive information in a commonly
trusted screen
64
CYBER ATTACK
• Cyber spying
• Cyber assault
• Cyber warfare
65
CYBERATTACK
• Cyber fraud
• Cyber attacks that are generally aimed at gaining monetary or related gains for the
perpetrator.
• Phishing attacks combined with fake websites to steal users’ personal details and, with
these,steal money from their accounts
• Fraudsters set up a fake website that looks like a bank website
• Emails are sent to large numbers of recipients with a link to this site and a message trying
to lure them to log on
• If the click on the link, their personal details are collected and then used by the fraudster
to access their legitimate site
66
CYBER ATTACK
• Cyber spying
• Cyber attacks aimed at gaining information for the perpetrator.
• One aim of cyber- spying may be to sell the information gained
67
CYBER ATTACK
• Cyber assault
• Cyber-attacks aimed at causing damage to information or equipment that is being
attacked
• Damage may be physical damage to equipment,reputational damage or corruption
or deletion of important information
• Cyber bullying is also a form of cyber assault as its aim is to cause psychological
damage
• Related to cyber fraud in that some attacks such as Distributed Denial of Service
(DDOS) attacks may be precursors to attempts to extort money from those
affected by the attacks 68
CYBER ATTACK
69
• The danger of cyber war and cyber terrorism
• Digital revolution and technology evolution
• Civilian (private/individual and public) as well as military life depend on digital infrastructure
and computer technology
• New type of battlefield for war and a new type of scene for terrorism
• Cyber war and Cyber terrorism:war and terror activity via Internet and information
systems
• Cyber terrorism:high-tech and without physical boundaries #the legal response:slow
and with obstacles
• Cyber war a military matter in the context of defense policy
70
CYBERATTACK
71
WEB-BASEDATTACKS
• Injection attacks
• In this type of attacks, some data will be injected into a web applications to
manipulate the application and get required information
• Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,
• SQL injection (SQLi) is most common type of injection attack
• In SQLi, customized string will be passed to web application further manipulating
query interpreter and gaining access to unauthorized information
• SQLi can be prevented upto some extent by proper validation of data and by
enforcing least privilege principle
72
WEB-BASED ATTACKS
• DNS Spoofing
• DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is
introduced into a Domain Name System (DNS) resolver's cache, causing the name server to
return an incorrect IP address, diverting traffic to the attacker's computer (or any other
computer)
74
WEB-BASED ATTACKS
75
WEB-BASED ATTACKS
• Brute force
• It is a trial and error method
• Generates large number of guesses and validate them to obtain actual data (passwords in
general)
• Dictionary attack
• Contains a list of commonly used passwords and validate them to get original password
• Buffer overflow
• Occurs when a program or process tries to store more data in a buffer (temporary data
storage area) than it was intended to hold
76
WEB-BASED ATTACKS
• Session hijacking
• Web applications uses cookies to store state and details of user sessions
• By stealing the cookies,and attacker can have access to all of user data
• URL interpretation
• By changing certain parts of a URL,one can make a web server to deliver web pages for which he
is not authorized to browse
• Social engineering
• It is a non-technical method that relies heavily on human interaction and often involves tricking
people into breaking normal security procedures
77
WEB-BASED ATTACKS
• Man-in-the-middle attack
• Attacker intercepts the connection between client and server and acts as a bridge between them
• Attacker will be able to read,insert and modify the data in the intercepted communication
• Phishing
• Phishing is the attempt to acquire sensitive information,often for malicious reasons,by
masquerading as a trustworthy entity in an electronic communication
• Spear phishing
• targets specific organizations for confidential data
• Whaling
• the targets are high-ranking bankers,executives or others in powerful positions or job titles 78
SYSTEM-BASED ATTACKS
• Virus
• A computer virus is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed
• It can also execute instructions that cause harm to system
• Worm
• It works same as a computer virus
• Can spread into other systems in the network by exploiting the vulnerabilities
automatically
79
SYSTEM-BASED ATTACKS
• Trojan horse
• It appears to be a normal application, but when opened/executed some malicious
code will run in background
• These are generally spread by some form of social engineering
• Backdoors
• Backdoor is a method of bypassing normal authentication process
• The backdoor is written by the programmer who creates the code for the program
• It is often only known by the programmer
80
SYSTEM-BASED ATTACKS
• Bots
• Bot is an automated process that interacts with other network services
• Can be classified into
• Spyware
• Used to gather information of user without their knowledge
• Adware
• Mainly used for promotions of products
• Not so harmful
81
METHODS TO ASSIST IN CYBERATTACKS
• Spoofing
• In spoofing,one person successfully impersonates as another by falsifying the data
• Ex:IP spoofing,email spoofing etc.,
• Sniffing
• Sniffing a process of capturing and analyzing the traffic in a network
• Port scanning
• It is a method to probe a system for open ports
• Intruder can exploit the vulnerabilities of open ports
82
Attack Methods
• Eavesdropping
- Get copies of information without authorization
• Masquerading
- Send messages with other‘s identity
• Message tampering
- Change content of message
• Replaying
- Store a message and send it again later, e.g. resend a payment message
• Exploiting
- Use bugs in software to get access to a host
• Combinations
- E.g., Man in the middle attack 83
Security Overview
• Security issues at various stages of application life-cycle
- Mistakes, vulnerabilities, and exploits
- Avoidance, detection, and defense
• Architecture
- Security considerations when designing the application
• Implementation
- Security considerations when writing the application
• Operation
- Security considerations when the application is in production
84
The Security LIFE CYCLE
• Threats
• Policy
• Specification
• Design
• Implementation
• Operation and maintenance
85
ARCHITECTURE AND DESIGN
- Validation of requirements (building the right model)
- Verification of design (building the model right)
Common problems
- Authentication and privileges
• Session replay
• Principle of least privilege
- Communication protocol design
• Sniffing, man-in-the-middle
• Session killing, hijacking
- Parallelism and resource access
• Race conditions
- Denial of service
86
IMPLEMENTATION
- Verification of implementation
- Classic vulnerabilities (often programming-language-specific)
Common problems
- Buffer overflows
• Static: stack-based buffer overflows
• Dynamic: heap-based buffer overflows
- Input validation
• URL encoding
• SQL injection
- Back doors
87
OPERATION
- decisions made after software is deployed
- often not under developer’s control
Common problems
- denial of service (DOS)
• network DOS
• distributed DOS, zombies
- administration problems
• weak passwords
• password cracking
• unsafe defaults
88
SECURITY ARCHITECTURE
• Encryption
VPNs
• Checksums Intrusion Detection
• Key management Intrusion Response
Virus scanners
• Authentication Policy managers
• Authorization Trusted hw
• Accounting
• Firewalls