CO1508 Computer Systems & Security - Week 02 - Passwords, Patches and Mandatory Access Control (MAC)
CO1508 Computer Systems & Security - Week 02 - Passwords, Patches and Mandatory Access Control (MAC)
Summary
You’re going to learn how to create and enforce passwords’ policy, learn to recognise the
importance of applying patches to software and operating systems to protect your
computing assets, and learn how to implement and enforce mandatory access control
(MAC) policy using security labels to protect your assets and their integrity. Finally, you’ll
recognise the latest cyberthreats and start/continue working on your assignment.
Activities
As with all CyberCIEGE scenarios, you are encouraged to explore the effects of “wrong”
choices as well as trying to select the correct choices. Plan on playing the scenario several
times before finally going through it making what you believe are the correct choices.
• Use of passwords can help prevent one user from compromising information that is
only supposed to be accessible from another user’s account.
• Trivial passwords can be easily guessed, leading to compromise of information assets.
• Writing passwords on post-it notes hung from a monitor defeats the purpose of a
password.
• When workstations are unattended, they should be locked or logged off.
In this scenario you can largely ignore Zones and physical security issues. The scenario
requires that you modify procedural settings and configuration settings on one computer.
You may also choose to purchase training for one of your users to help ensure they abide by
the procedural security choices you select. Also, don’t worry about hiring or firing support
staff or the trustworthiness of your virtual users.
Hit “Play” and try to win! If any attack happens, you must play again. You should have
above $58000 left in your budget. If you need help, press F1 while playing.
Don’t move on to the next scenario until you’re done with the Passwords one.
The CyberCIEGE patches scenario explores the need to apply software patches to
applications and operating systems.
As with all CyberCIEGE scenarios, you’re encouraged to explore the effects of “wrong”
choices as well as trying to select the correct choices. Plan on playing the scenario several
times before finally going through it making what you believe are the correct choices.
• Many applications and operating systems have flaws that can be exploited by attackers
to compromise computers and/or assets stored on those computers;
• After specific flaws become publicly known, there are often a lot of attacks mounted
against systems that contain those flaws.
• Sometimes an enterprise’s use of unpatched software is visible from the Internet via a
network “scan”.
• Software patches that are only intended to address security flaws will sometimes have
unexpected effects on the behaviour of applications. It is advantageous to establish a
regime to test new patches before applying them to operational systems.
• Procedures and responsibilities for managing patches must be consistent with available
resources. In some environments, individual users must manage and apply patches to
their own systems. In these environments, user training is often necessary.
In this scenario you can largely ignore Zones and physical security issues. Also, don’t worry
about hiring or firing support staff or the trustworthiness of your virtual users.
2.1 Play
Open the CyberCIEGE game then click on “Starting Scenarios” and “Patches”. Now hit
“Play”. Click the OK button in the initial briefing.
Read the objectives screen then return to the Office tab and hit play.
The first time through you may wish to just watch until Edgar asks you: “What can you direct
me to do to make it harder for those vandals to routinely trash our system?”
Press F1 to learn about network scans. Then go to the NETWORK screen and right click on
the Internet icon and select “Discover / Scan”. Look at the patch information reported for
the Logititan application.
Double click on the server and select the appropriate configuration setting (note the
different between configuration settings and procedural settings by hovering the mouse
over each label.)
Once you’re done and receive the good job brief, move on to the second objective of Phase
1
Let the game run until Edgar asks Arlo when was the last time he applied patches to his
software.
Double click on Arlo and buy him some training so he better understands what he needs to
do.
In this phase, Edgar discovers that when he applies patches to the server, sometimes it
breaks the application. Consider purchasing a second server upon which Edgar can test the
patches before applying them.
2.2 Clean up
Remember, before you exit the game, show your tutor your progress. Also, make sure to
save the game before exit.
The CyberCIEGE MAC scenario is a simple example of mandatory access control (MAC) policy
enforcement using security labels and a server that enforces the MAC policy.
As with all CyberCIEGE scenarios, you’re encouraged to explore the effects of “wrong”
choices as well as trying to select the correct choices. Plan on playing the scenario several
times before finally going through it making what you believe are the correct choices.
3.1 Play
Open the CyberCIEGE game then click on “Mandatory Access Control” then choose
“Mandatory Access Control”. Now hit “Play”.
Read the briefing and the objectives screens and explore the encyclopaedia (via the “F1”
key).
Ask your tutor to play the MAC movie now to better understand multilevel secure
components.
Read the briefing in the GAME tab and check your objectives in the OBJECTIVES tab.
Look at the labels of the assets via the ASSET tab. Look at the user clearances via the USER
tab. Also look at the user goals and notice how they need to share the asset that is on the
server.
In the OFFICE screen, start the simulation and notice how both users are failing their goals
because of their inability to share the “Open Source Reports” asset.
Go to the NETWORK tab. Notice Joe’s workstation is already connected to the LAN1 network
and Jill’s workstation is connected to the LAN2 network.
Connect each network to Server by first selecting the server (click on it) and then click the
LAN1 and the LAN2 buttons in the upper right.
Right click on the server, select Networks and “Label Single Level Network” and then assign
labels to each of the two networks (based on the users’ goals and clearances).
If for some reason, the secrets are leaked from the server, the you should play again.
3.2 Clean up
Remember, before you exit the game, show your tutor your progress. Also, make sure to
save the game before exit.
The CyberCIEGE MAC Integrity scenario is a simple example of MAC policy enforcement of
an integrity policy using security labels and a server that enforces the MAC policy. The MAC
Integrity scenario builds on the concepts covered in the previous scenario, which covered a
secrecy policy. This scenario is very similar to that, but this scenario includes an integrity
policy.
As with all CyberCIEGE scenarios, you’re encouraged to explore the effects of “wrong”
choices as well as trying to select the correct choices. Plan on playing the scenario several
times before finally going through it making what you believe are the correct choices.
4.1 Play
Open the CyberCIEGE game then click on “Mandatory Access Control” then “MAC Integrity”.
Now hit “Play”. Read the briefing and the objectives screens and explore the encyclopaedia
(via the “F1” key).
Read the briefing in the GAME tab and check your objectives in the OBJECTIVES tab.
Look at the labels of the assets via the ASSET tab. Look at the user clearances via the USER
tab. Also look at the user goals and notice how they need to share the asset that is on the
server.
In the OFFICE screen, start the simulation and notice how both users are failing a goal
because of their inability to share the “Critical Logistics Database” asset.
Go to the NETWORK tab. Notice Grace’s workstation is already connected to the LAN1
network and Sean’s workstation is connected to the LAN2 network.
Connect each network to Server by first selecting the server (click on it) and then click the
LAN1 and the LAN2 buttons in the upper right.
Right click on the server, select Networks and “Label Single Level Network” and then assign
labels to each of the two networks.
What label did you assign to the network connected to Grace’s workstation?
What would you expect to happen if you assigned the other integrity label to Grace’s
workstation? After all, she is cleared to “CRITICAL OPERATIONS” integrity. Give it a try.
4.2 Clean up
Remember, before you exit the game, show your tutor your progress. Also, make sure to
save the game before exit.
Do some online research on the following threats: which type of malware were, and how
was each one spread to users?
ILOVEYOU
Stuxnet
Conficker
Archiveus
Notcompatible
WannaCry
Have you started your assignment yet? If yes, keep going and use the rest of this lab to
work on it. If not, have a look here for some ideas for your investigation if you like J
https://www.computerworld.com/article/3427958/cybersecurity-trends-2019.html