Computer Security Notes
Computer Security Notes
Lecturer prefers us to give real life examples of computer security breach examples versus
hypothetical examples. (Big bonus marks, credit -> distinction, distinction -> high distinction,
looking at like 10% extra).
Assignment Structure:
- Test 5%
- Assignment 1 20%
- Assignment 2 25%
- Exam 50%
In order to pass the unit, students must achieve 50% or more overall AND 50% or more in the
exam.
Aims of Security
Generally the following are considered to be the aims of computer and information security:
- Confidentiality
- Integrity
- Availability
- Authenticity
- Non-repudiation/Accountability
Some consider all five to be the aims of security.
Others consider only the first three.
Security is Difficult to Sell (Exam Question ??) (Most people fail this question)
Management may ask:
Selling Security -> What management wants to know about if you are trying to sell them security
systems.
1. Link you internal business case to legislative requirements and best practice
2. Communicate the consequences of a breach as it relates to each asset
3. Use internal metrics, logs and data to demonstrate potential breaches
4. Present a complete security strategy avoid bolting on quick fixes to existing infrastructure
5. Present a realistic breakdown of time, cost and quality management
6.
7.
8.
(Look at slides later in term)
Instead of copying something word for word, paraphrase it into your own words.
Original sentence: “It is of considerable concern that so many enterprise level hard disks still
contained recoverable data.”
Paraphrased sentence: “Since large corporations are disposing of hard disk with data intact
(Valli & Woodward, 2007), one could question how the data could be misused if it fell into the
wrong hands.”
Assignment 1:
Install virtual machine on computer.
Mac - Oracle Virtual Box (Free & have used it before)
Report Requirements:
Title Page
Table of contents
Introduction
Main content
Summary
Reference list
Assume target audience has little expertise in cyber security, as a result must communicate
findings in a simple manner.
What is a Threat?
An entity likely to cause damage or danger.
An act designed to obtain a negative response.
What is a Vulnerability?
A flaw or weakness in the design, implementation, or operations of a system.
How open something is to an attack.
Threats act on or exploit vulnerabilities.
Risk Assessment
Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the asset
minus the percentage of risk mitigated by current controls plus the uncertainty of current
knowledge of vulnerability.
- A CP is used to anticipate, react to, and recover from events that threaten information assets,
it involves:
> A business impact analysis (BIA)
> Incident response plan (IRP)
> Disaster recovery plan (DRP)
> Business continuity plan (BCP)
Generic Threats
- Interception
- Modification
- Fabrication
- Interruption
Information Warfare
Malware
Espionage
Eavesdropping/surveillance
Motivations of Attackers
- Financial
- Emotional, revenge
- Ideological, activities, hacktivists
- Opportunistic
- Compulsion/addiction
- Social acceptance
- Challenge
Capabilities of Attackers
Risk Aversion
Modelling Threats
Attack Trees
- Put ourselves in the position of the attacker
What is Malware?
- Malware (malicious software)
- Software designed to infiltrate, damage or distrust a computer system without the owner’s
informed consent.
- A set of instructions that run on your electronic deice and make it do something that an
attacker wants it to do.
Why attackers are targeting small devices such as phones, tablets etc, is because patches by
vendors are less likely to be brought out, or in a timely matter than large vendors such as
Microsoft or Apple.
Consequences of Malware?
Malware may:
- Steal your personal information
- Monitor your computer activity
- Install additional software
- Create backdoors
- Lower the overall state of security
- Display forced advertising
- Enable profiteering scams
- Use your computer resources (CPU, RAM etc.)
Evolution of Malware
Complexity of attacks overtime.
1990-2000:
Attacks: Against web server.
Motivations: Defacement, glory.
2000-2004:
Attacks: Against web server, data and infrastructure.
Motivations: Corporate information and financial gain.
2004-2009:
Attacks: Against web application, data infrastructure and end-user computers
Motivation: Corporate information, personal information and financial gain.
Research has shown you can remotely install malware in vehicles which use electronic
systems.
Attack Sources
A significant malware development is the change from attackers being individuals motivated to
demonstrate their technical competence… to organised and dangerous attack sources i.e.:
- Politically motivated attackers
- Criminals
- Organised crime
- Organisations that sell their services to companies and nations
- National government agencies
Malware Categories
- Viruses
- Trojan horses
- Worms
- Rootkit
- Botnets
- Logic bombs
- Spyware
- Scareware
- Ransomware
Malware Specimens
Rather than infecting one computer, infect the router that the network relies on, to have
unrestricted control of who, and how the connection is used, while being monitored.
Works on human ignorance, that people do not change the default password for the router.
Power cycling devices will remove infected devices as the malware resides in temporary
memory storage.
Classifying Malware
Malware can be classified into several categories, depending on the propagation, concealment
and payload.
Propagation e.g.
- Human assisted (i.e. viruses in email attachment)
- Automatic propagation (without human assistance… a worm)
Concealment:
- Modifies OS to hide its existence (rootkit)
- Provides desirable functionality (Trojan)
Payload:
- Amusing/annoying pranks
- Destroy or corrupt files
- Denial of Service attacks
- Install backdoor(s)
- Alter web browsing settings to display advertising
Viruses
Piece of software that infects programs:
- Modifies them to include a copy of the virus
- Replicates and goes on to infect other content
- Easily spread through networked environments
When attached to an executable program a virus can do anything that the program was
permitted to do.
Virus Structure
Infection mechanism
- Means by which a virus spreads or propagates
Trigger
- Event or condition that determines when the payload is activated or delivered i.e. logic bomb
Payload
- What the virus does besides spreading
- Could be damaging or benign
Virus Classifications
By target:
- Boot sector infector
- File infector
- Macro virus
- Multipartle virus
By concealment strategy:
- Encrypted virus
- Stealth virus
- Polymorphic virus
- Metamorphic virus
Worms
A computer worm is a program that spreads without needing to insert itself into other files and
usually without human interaction.
A worm will encompass a malicious payload such as: deleting files or creating a backdoor.
Most worms spread by exploiting vulnerabilities or poorly configured systems.
Worm Propagation
1. Scan for targets on network
2. Locate a target with a vulnerability that could be explored by the worm
3. Exploit the identified vulnerability and establishes itself on that host
4. Repeats the process by scanning for new targets that can be exploited
Worm Types
- Electronic mail or instant messenger facility
- File sharing
- Remote execution capability
- Remote file access or transfer capability
- Remote login capability
Trojan Horses
- A trojan horse is a program that appears to be useful, but also performs a negative task to the
computer, smartphone, IoT devices etc.
- Can be resultant payload or its own program.
Rootkits
A stealthy application designed to hide the fact that an operating system has been
compromised.
Typically encompasses three components:
- Concealment
- Command and control
- Surveillance
Types of Rootlets
User-mode rootlets:
- Run on infected device with admin/root access
- May alter/hide security settings, processes, files, system drives, network ports, and system
services.
- Can typically be removed with AV software but (some) damage to the system may be
unrepairable.
Kernel-mode rootkits:
- Kernal-mode rootlets run at the operating system level by adding to or changing critical system
files.
- Modify kernel data structures to return manipulated information to user application.
- System is infected vi updates/patches
- Removing kernel-mode rootlets is extremely problematic.
Firmware rootkits:
- Hides in firmware stored on flash memory.
- Restarting/power cycling the infected device will result in a re-contamination.
- Removal of a firmware rootkit is temporary until the infected devices is restarted.
- May require an entire firmware update to be loaded resulting in data/settings have been lost.
Botnets
Bonnet (or robot network) is a collection of compromised computers.
Logic Bombs
- A logic bomb (usually) performs a malicious action as a result of a certain logic condition.
- A programmer puts code into software for the patrol system that makes the program crash
should it ever process two consecutive payrolls without paying him.
- Some trial programs work for a certain period of time and then disable themselves.
Spyware
1. Spyware infects a computer
2. Spyware process collects keystrokes, passwords and screen captures.
3. Spyware process periodically sends collected data to spyware data collection agent.
Adware
1. Adware infects a computer.
2. Adware engine requests ads from adware agent.
3. Adware agent delivers ad content to user.
Ransomware
- Software that kidnaps a users computer by encrypting a drive or files, then demanding
payment (usually in Bitcoins) to decrypt it.
- If not paid within a certain amount of time (usually 72 hours) the key will be destroyed.
- Recent ransomware versions allow users to decrypted a few files for free to prove they can be
recovered.
Script kiddies have made it so that even after payment, files are not decrypted.
Therefore big cyber criminals allow victims to decrypted a few select files for free to prove the
legitimacy if they pay the bounty.
Future of Malware
What will malware look like in the future?
- Ransomware + IoT devices?
All electronic devices are prone to malware
- Implications for hospitals
- How about planes?
Cyber Warfare
It is easier to hie a dozen hackers than it is buy a dozen missiles
Will malware be the form of terrorism in the future
Robbing a bank with gun lacks class, why not just use malware?
- Integrity
- Availability
- Authenticity
- Non Repuitiation
1. Assume you find a USB memory stick in your work parking area. You are determined
to find out what digital content resides on this persistent storage.
a) What threats might this pose to your work computer should you just plug the memory
stick in and examine its contents?
Cache from USB could have illegal content on it, such as
Threats:
- Self executed virus
- Human assisted virus
Unsure Threats
- Is their cache (or some sort of temporary data) from the USB from e.g. Icon previews, image
previews etc, they contain harmful or illegal content.
-
b) What steps should you take to mitigate these threats, and safely determine the
contents of the USB memory sticks?
Run a virtual machine.
Not use.
Disable auto run or auto play.
Make sure your not logged in on admin account.
Assignment 1:
Per issue, 2-3 sentences of writing.
(Less than 10 pages)
Terminology
- Encryption
- Cipher
- Plaint text
- Cipher text (output of the encrypted plain text message)
- Privacy
- Confidentiality
Ciphers:
- Replacing individual characters, digits or bits
- “be right back could be replaced with “cf sjhiu cbdl”
Ciphers Categorised
Symmetric Encryption
Asymmetric Encryption
- One key is used for encryption and another for decryption
- Private key (recipients key)
> Must kept secret
> Security of system relies on secrecy of this key
- Public key
> Can be given to anyone
> Could be attached to emails
> Published on a web page
E.g. PGP Encryption
Block Ciphers
- Plaintext/ciphertext has a fixed length “b” (e.g. 128 bits)
- A plaintext of length “n” is partitioned into a sequence of m blocks, P[0], …, P[m-1], where n <
bm < n + b
- Each message is divided into a sequence of blocks and encrypted or decrypted in tiers of its
blocks
Plaintext []
Blocks of plaintext [] [] [] []
XOR
50% chance of getting a 1, and 50% chance of getting a 0 (binary), making encryption a lot
more secure.
Stream Cipher
- Symmetric crypto system where cipher text C is obtained as the exclusive OR of the plaintext
message M and a pseudo-randoms binary vector S generator from the secret key.
Seed -> Key stream generator -> Key stream + Message -> Cipher text
Computers are not capable of truly generating random numbers. They take something to begin
with (e.g. seed) to create the key stream generator.
It is continually generating random values.
- Selected by NIST in 2001 through open international competition and public discussion
- 128 bit blocks
- 128, 192 and 256 bit key lengths
- Exhaustive key search attack is not currently possible
Steganography
- Involves in hiding data within data
- A picture could be hidden in another picture
- Messages do not attract the intention
The more 1’s present in the sequence, the higher intensity of the colour (darker). More zeros,
lighter the colour.
Find out pixel colours of image, -> want to alter the least significant bit so the picture least
changes.
File size will not change between original picture and new picture.
Electronic Frontiers Foundation managed to create a machine that could cracked DES message
in 3 days.
Cracking AES?
According to NIST, if you had a machine that could crack DES in 1 second, it would that
machine 149 trillion years to crack 128 bit AES. So even though they managed to create
something to crack DES in 3 days it will not be able to crack 128 bit AES.
Traffic Analysis
However even if the content of the messages is not known, patterns of communication might
convert information
The number and timing of transmitted messages might convert certain information even if the
content of the messages is not known.
E.g. Even if you laptop is completely encrypted, the pattern of your transmission of data can be
used to prosecute you. Look at Defcon video, harvard university bomb threats, made from TOR
(user though they were protected), however looking at the campus network, they were the only
one using TOR network at that time on that network, and therefore was prosecuted.
Data Integrity
The validity and trustworthiness of data.
Data may lose its integrity to:
- Human errors
- Errors during transmission over a network
- Software bugs
- Malware
- Hardware malfunctions
- Natural disasters
A hash function takes the object as an input and outputs a “has” or “digest”.
Terminology
Identification
- Establishing who what an entity persons claims to be
- Who is this entity
Authentication
- Establishing the the entity really is what it claims to be
- Is this entity really what they claim to be
Authorisation
- Establishing what the entity is allowed to do
- What resources can they access/interact with?
- Address
- Phone number
- Etc..
Success Factors^^
- For these offline attacks to work, the attacker needs:
- The passwords in their hashed form
- Knowledge of the hashing process/algorithm
- The ability to test for a match
- Significant amounts of time/computing power.
Rainbow Tables
- Large tables of pre-computed password hashes
Password salt
- Random data used as additional input to a one-way function.
- End users will naturally use short passwords
- Adding additional random characters will theoretically require additional computational power.
- Concatenate a salt with a password
- If the attacker knows the salt they still need to calculate a longer list of hash values requiring
additional time/resources before the correct value is found.
Barcodes
- The airline industry has been using two-dimensional barcodes into boarding passes.
- The barcode is encoded with an a unique indentifer allowing staff to look up the passenger’s
record with that airline.
- Barcodes provide convenience but are easy to duplicate
Magnetic Smartcards
Circuit based Smartcards
Tokens
RFID
Confidence Limits
Each sensor reading will be slightly different
- Ambient light, noise
- The subject’s alignment with the sensor
Confidence limits allow for slight variation
How to determine optimal confidence limits?
- Too relaxed and we might authenticate an impostor.
- Too tight and we might reject the real person.
- Unfortunately the confidence limits may be fixed by the device itself and may not be user
configurable.
Biometric Errors
False Acceptance
False Rejection
Type of Subject
Cooperative Subject
Non-Cooperative Subject
Uncooperative Subject
Inhibiting Factors?
If biometrics solve so many problems, why do we not use biometrics for everything?
Are the following factors inhibiting the adoption of biometrics?
- Social
- Cultural
- Religious
- Technical
- Economic
- Practical
- Other
Concluding Remarks
Is this ability to identify and authenticate necessarily a good thing?
- Will we get to a stage where every action can be:
> Recorded?
> Authenticated?
> Cross checked and matched with other actions?
- Is the notion of cash dead?
- In what areas of our lives to we still have any degree of anonymity?
Is there really any notion of privacy left?
- More on this in the privacy module…
Encrypted storage is often tamper resistant and tested by government agencies (i.e. ASD)
User Espionage:
- Keystroke sounds can be recorded and reconstructed to identify what was typed (Keyboard
acoustic emissions)
- Hardware device designed to capture keystrokes.(Hardware key logger)
- Wi-Fi Data Capture
Jailbreaking
Computer Forensics
- Sometimes we may employ best practice from our perspective to erase data, but this may still
be insufficient.
- Computer forensics is the process of extracting data from hard drives, memory cards, or RAM
for use in a court of law.
- Computer forensic tools may also be used to extract confidential and private end-user or
corporate data.
Data Storage
Backup Strategies
People typically recognise the importance of ongoing, reliable system backups.
However, people are also reluctant to perform this process.
Data could be deleted, corrupted or lost.
Ransomware has encouraged end user and organisations to rethink their backup strategies.
Backup Issues
Some questions need to be answered.
- What will be backed up?
- How often will backups be performed?
- Will a rotation strategy be used?
- What type of media will be used?
- Where will backups be stored?
- How will backups be protected?
- Plain text or cryptic?
- Verification and logging of backups
OS Security Concepts
- Identification, Authentication, Authorisation.
- Separation and protection of objects
- Auditing
- Permissions and File System Security
Separation of Objects
Authorisation
- An operating system controls accesses to object within the system
- Objects might include:
> Files
> Network shares
> External drives and peripherals
> Resources (processor, memory etc)
- Different Operating Systems have different capabilities in controlling access to these resources