Chapter 2 - Information Security Mechanisms
Chapter 2 - Information Security Mechanisms
(ISM811S
Chapter 2 – Information Security Mechanisms
Dr Mercy Chitauro
Outline
– Music
– Videos
– Email
• Hardware
– Computers
– Devices
– Network gear
• Software
– OS
– Utilities(antivirus)
– Apps – commercial and individual;
Terminology
• A Vulnerability is a weakness in an IT system
that might be exploited to cause loss or harm
• Types
– Technological: Weaknesses inherent in computers
and network technologies such as operating
systems, network protocols like TCP/IP, ICMP, OSPF,
etc.
– Configuration: This results from improper
computer and network configurations
– Security Policy: This is a result of users not
following security policies or poor policy
enforcement procedures.
Terminology
• A threat to an IT system is set of
circumstances that have the potential to
cause harm/loss/danger/damage
– Non human threats
• Natural disasters, loss of electrical power, failure of
components
– Human threats
• Non malicious
• malicious
Malicious Threats
• Random
– Harm any computer or user
– Virus
– Denial of Service (DoS)
• Directed
– Harm specific computers
– DoS
– Advanced Persistent threat
– impersonation
Terminology
• Attack: An assault on system security that
derives from an intelligent threat. That is, an
intelligent act that is a deliberate attempt to
evade security services and violate the
security policy of a system.
• Exploit: Software or commands that take
advantage of a vulnerability in order to carry
out an attack
Individual
Attackers Hacker
Organised
crime
10
Attack Types
Reconnaissance
Access Attacks
Denial of Service
Malware Attacks
Reconnaissance
Port redirection
Man-in-the-middle attack
Buffer Overflow
DoS and DDoS Attacks
• A DDoS attack and the simpler version of a DoS
attack on a server, send extremely large numbers of
requests over a network or the Internet.
– These many requests cause the target server to run well
below optimum speeds.
– Consequently, the attacked server becomes unavailable
for legitimate access and use.
– By overloading system resources, DoS and DDoS attacks
crash applications and processes by executing exploits or
a combination of exploits.
– DoS and DDoS attacks are the most publicized form of
attack and are among the most difficult to completely
eliminate.
Distributed Denial of
Service Attack (DoS)
• DDoS attacks are designed to saturate network
links with spurious data which can overwhelm a
link causing legitimate traffic to be dropped.
– DDoS uses attack methods similar to standard DoS
attacks but operates on a much larger scale.
– Typically hundreds or thousands of attack points
attempt to overwhelm a target.
Malware
• “Malicious software” is software designed to
infiltrate a computer without the owner's informed
consent.
• Malware includes:
– Computer viruses
– Worms
– Trojan horses
– Rootkits
– Backdoors (Method of bypassing normal authentication
procedures and usually installed using Trojan horses or
worms.)
– For profit (Spyware, botnets, keystroke loggers, and
dialers)
Threat or
Vulnerability?
1. Computer with no passwords
2. Misconfigured firewall
3. A hacker
4. Computer virus
Controls
• Is a means
to counter
harm
Types of Control
• Physical
• Procedural/administrative
• Technical
Technical Control
Identification Authentication
Authorisation Accountability
https://www.slideshare.net/adoitya/biometric-technologythe-most-reliable-security-system
Problems with
Biometrics
• Intrusive
• Expensive
• Single point of failure
• Sampling error
• False readings
• Speed
• Forgery
Log archival
Log compression
Log reduction
Log normalization
Log conversion
3. Archive logs. Log systems can copy logs periodically to remote storage
locations
40
Questions?
?
41
10 minute
break
42
Where are you joining
us from?
Firewalls
– Separate network
Firewall Types
The data is compared to the acceptable command set rules, as well as to host and user permission rules set in the
firewall.
Additionally, the firewall may perform other functions such URL filtering, data modification, authentication logging,
and HTTP object caching.
Circuit-level
firewalls
• A circuit level firewall acts much like an application-
level gateway but it does not do packet inspection
rather it acts as TCP relay between the inside host
and the outside host. It does not permit end-to-end
connection so its sets up two connections between
itself and the inside host and between itself and
the outside host. Depending on the rules it makes
decisions on whether the TCP connections are
allowed
Next Generation Firewalls
• NGFW capabilities are like that of a Unified Threat
Management (UTM).
• These types of firewalls combine firewall capabilities
with those of other security devices such as intrusion
detection systems, deep packet inspectors and
decryptors of encrypted packets, content filters, spam
filters and malware scanners and filters.
• NGFW and UTM take advantage of the increased
memory that is now available these days to reduce the
number of security devices to be deployed.
• Although NGFW reduce number of network security
devices deployed they introduce a single point of
failure.
Firewall Deployment
2. What type of firewall technology offers the right balance between protection
and cost for the needs of the organization?
3. What features are included in the base price? What features are available at
extra cost? Are all cost factors known?
4. How easy is it to set up and configure the firewall? How accessible are the
staff technicians who can competently configure the firewall?
5. Can the candidate firewall adapt to the growing network in the target
organization?
58
Managing Firewalls
• All traffic from trusted network is allowed out.
• Firewall device is never accessible directly from public
network.
• Simple Mail Transport Protocol (SMTP) data is allowed
to pass through the firewall but should be routed to a
SMTP gateway.
• All Internet Control Message Protocol (ICMP) data
should be denied.
• Telnet (terminal emulation) access to all internal
servers from the public networks should be blocked.
• When Web services are offered outside the firewall,
HTTP traffic should be handled by some form of proxy
access or DMZ architecture.
Questions?
?
60
IDS and IPS systems
• Work like burglar alarms
• Alarm raised when a system violation is detected
• If IPS
– Stop the attack
– Reconfigure devices to block access
– Changing attack content and make it benign
• Two approaches are used to implement IDSs, signature-
based intrusion detection and anomaly detection.
Signature-Based IDS
• work like antivirus software.
• Predetermined attack patterns known as signatures
are preconfigured in the IDS.
• When a similar attack pattern is detected, an alarm
is raised.
• Cannot detect new attacks that have not been
loaded in the signature database.
• Will not detect attacks in their signature database
that have been modified to not match a signature
stored
Anomaly Based IDS
• Anomaly IDS depend on behaviour within the system.
• They will capture an average behaviour over a specific time.
• This average behaviour is known as a baseline.
• Once the baseline has been established the IDS periodically
captures activity and compares it to baseline.
• If the activity captured is not within baseline ranges an alert
is raised.
• Anomaly IDS tend to produce more false positives because
normal behaviour does not always compare with baselines.
• Unlike signature-based IDS anomaly IDS can capture new
attacks.
• that IDS can either be host based or network
based. Host based IDS monitor host traffic and
network-based IDS monitor network traffic
Managing
Intrusion
Detection
Systems
Managing Intrusion
Detection Systems
• Consolidated enterprise manager
– Valuable tool in managing an IDS
– Software that allows security professional to
collect data from multiple host- and network-
based IDSs and look for patterns across systems
and subnetworks
– Collects responses from all IDSs used to identify
cross-system probes and intrusions
Questions?
?
66
Response to fast feedback
10 minute
break
68
Cryptography
• Encryption algorithms hide original data from an
authorised use us an authorised user.
• They do this by scrambling the data to an
unreadable format to someone who does not have
the encryption key.
• Encryption is known as secret writing. It a process
of encoding a message so that its meaning is not
obvious.
• Encryption transforms data that was readable and
understandable to unreadable and in
incomprehensible data.
Cryptography
• Encryption uses mathematical algorithms to transform data
into a form that is not readily intelligible.
• The transformation and subsequent recovery of the data
depend on an algorithm and zero or more encryption keys.
• You find that in most instances cryptographic controls are
used to implement other security controls such as
authentication, authorisation, and accountability.
• There are two types of encryption algorithms symmetric
encryption algorithms and symmetric encryption algorithms.
Terminology
• Plaintext - original message
• Ciphertext - coded message
• Cipher - algorithm for transforming plaintext to ciphertext
• Key - info used in cipher known only to sender/receiver
• Encipher (encrypt) - converting plaintext to ciphertext
• Decipher (decrypt) - recovering ciphertext from plaintext
• Cryptography - study of encryption principles/methods
• Cryptanalysis (code breaking) - study of principles/methods
of deciphering ciphertext without knowing key
• Cryptology - field of both cryptography and cryptanalysis
Two Classes of
Encryption Algorithms
asymmetric encryption algorithms use two different keys. One key is used for
decryption and a different key is used for encryption. These keys are known as
private key and public key. The private key is kept secret and the public key is
publicly distributed. The private key and public key must be related through a
mathematical algorithm, and it should not be possible to derive the private key
from the public key. Asymmetric encryption algorithms are commonly known as
public key encryption algorithms. Public key encryption algorithms are slower than
symmetric encryption algorithms because they are more difficult to compute.
Examples include RSA, Diffie Hellman, Elgamal and Elliptic curve.
Encryption
confidentiality
• Encryption algorithms are used to provide
confidentiality. How?
• An encryption scheme transforms data into form
that is not understandable.
• Take for example information in a database if an
encryption scheme is used on that data, it is
transformed to unintelligible data.
• If that data is kept in that unintelligible form if an
attacker gets access to that data, they will not be
able to understand even if they have access to it.
• This means that data is kept confidential because
the unauthorised user does not understand it.
• Authorised users will use the encryption key to
decrypt the data when they need to access it.
Encryption
authentication
1. An authentication tag which is derived from a
mathematical algorithm that uses the information
as the parameter is calculated.
2. The authentication tag is encrypted and
ciphertext Y is obtained
3. The value Y for the cipher is kept with the data
4. The information is later retrieved and steps 1 and
2 are repeated and ciphertext Z is obtained
5. If the value kept at Y is not equal to Z then
information has been compromised
6. If the values at Y=Z then data has not been
compromised and has been authenticated because
the ciphertext is the same.
Digital Signatures
• Users are authenticated using digital signatures.
• Digital Signatures are obtained using asymmetric
encryption algorithms.
• Using asymmetric encryption algorithm a user
Nakasole uses their private key to generate a
cipher Y from plaintext X.
• if Nakasole’s public key that Narene has is able to
decrypt cipher Y to plaintext X Narene verifies
that it was indeed Nakasole who generated the
cipher Y because Narene assumes only Nakasole
knows his private key and is the only one who can
generate a cipher with his public key that can be
decrypted with his public key.
• In this way Narene will have authenticated
Nakasole a user in a system.
Public key infrastructure (PKI)
Set of hadware, Systems with computer
Systems that issue
software, cryptosystems key values to be
digital certificates to
necessary to implement included in digital
users and servers
public key encryption certificates
77
Encryption Applications
87
This week‘s poll
• Whitman, M.E., and Mattord, H. J. (2019). Management of
Information Security, 6th Edition. Cengage. ISBN: 978·1·337-
40571·3
IDPS
Firewalls Encryption
Wireless
Remote
BYOD network
access
Security
References
• Whitman, M.E., and Mattord, H. J. (2019). Management of
Information Security, 6th Edition. Cengage. ISBN: 978·1·337-
40571·3
92
13 Storch Street T: +264 61 207 2258
Private Bag 13388 F: +264 61 207 9258
Windhoek E: [email protected]
NAMIBIA W: www.nust.na
Thank You.