Information Sys Security
Information Sys Security
Packet sniffing:
broadcast media
promiscuous NIC reads all packets passing by
can read all unencrypted data (e.g. passwords)
e.g.: C sniffs B’s packets
A C
Modification of messages
Some potion of a legitimate message is altered
Messages are delayed or reordered to produce an
unauthorized effect
Denial of service attack
Prevents or inhibits the normal use or management of
communication facilities
Examples:
Attacker may suppress all messages directed to a
particular destination
Disabling a network or overloading a network with
messages
Example 1: Active Attack
IP Spoofing:
can generate “raw” IP packets directly from application, putting
any value into IP source address field
receiver can’t tell if source is spoofed
e.g.: C pretends to be B
A C
B
Internet security threats
A C
SYN
SYN
SYN SYN SYN
B
SYN
SYN
Passive versus Active Attacks
Physical vulnerabilities
Example: parts of a computer may be physically
damaged by a number of different threats
Natural vulnerabilities
Example: Computers can be affected by natural events
(flood, fire, heat, humidity, dust, etc.)
Hardware/software vulnerabilities
Example: Computer components fail to work properly
(wear out, incorrect design, implementation problems,
conflicts with other systems)
Examples of vulnerabilities (continued)
Media vulnerabilities
Examples: disks and tapes wear out, erasure
vulnerabilities, other physical characteristics of media
that can fail, magnetism
Emanation vulnerabilities
Example: Computers and computer systems "leak”
information in ways we don't want them to (radio
frequency leakage from network wiring, video monitors)
Communications vulnerabilities
Communications can be intercepted or faked.
Examples of vulnerabilities (continued)
Human vulnerabilities
Vulnerabilities related to the fact that computers are
typically used by people; people give out information
they shouldn't, people often forget things, delete files or
enter in incorrect commands, improper usage of a
system, bribery/sabotage
Example Sources of Threats
Intentional Threats
Outsiders vs. Insiders
Outsiders threats
From outside an organization
Foreign Intelligence Agents (spies), terrorists, criminals,
corporate Raiders, crackers
Insiders threats
From inside an organization
Fired or upset employees (or students), coerced employees
(blackmail, bribery, threats to employment), lazy or untrained
users
One of the most effective attacks on a system is to
combine an outsider threat with an insider threat
Examples of Countermeasures
Encryption schemes
An "encryption scheme" is some method that is used to
encode information such that the original contents of
the information are not easily seen or determined by
unauthorized persons
Two broad classes of encryption schemes
Two-way encryption schemes
allows information to be encrypted (encoded) into a format
that can be transmitted and then later decrypted
(decoded) into its original format
One-way encryption schemes
Terms used for encryption schemes
Cleartext
Information in its original, unencrypted form
Ciphertext
Information after it has been encrypted
Key
Something used in the encryption and decryption
process to convert cleartext to ciphertext and vice-versa
Note: A good encryption algorithm is one in which it is
nearly impossible to deduce the cleartext form of
information from the ciphertext without having the
appropriate key
Normal Process for Two-Way Encryption
plaintext K K plaintext
A B
ciphertext
Digital signature
Mechanism for verifying the authenticity of the sender of a
message
Can use public key cryptography to implement
Sender encrypts the message using his/her private key
Recipients decrypt the message using the sender's public
key
The message is authentic if readable after decryption
Can be used to validate that a document has not
been altered in transit if the encrypted form is
altered in any way, then it will not decrypt with the
sender's public key
Digital Signatures
Popular protocol
Used for sending/receiving encrypted and
digitally signed electronic mail over the internet
Is known as PGP (Pretty Good Privacy)
Used for interactive Internet communications
Usually known as "Secure Sockets Layer” (SSL)
With SSL, every packet sent over the network is
encrypted
A new protocol is being developed for use on the
Internet that is known as IPsec (Internet Protocol
w/security)
Side Note
Programmed Threat
An item of software or hardware that is intended to (or
has the result of) compromising system security
Categories of programmed threats
Security tools and toolkits -- programs designed to
assist with securing a system by exposing vulnerabilities
Back doors -- secret codes or routines that allow
unauthorized access to a system
Logic bombs -- a program that is set to do something
specific (often destructive) whenever a pre-programmed
event occurs. Example events: dates, a certain
combination of keystrokes, etc.
Programmed Threats (Cont’d)
Firewall
A general name for hardware, software, or
combination of the two
Used to protect internal network from
intruders
Works as a transit device that examines traffic
and decides what traffic (packet) should pass
or should not pass
Typical Firewall Components
Hardware
Routers
Dedicated computers
Special hardware device such as Cisco PIX
(Private Internet eXchange)
Software
Firewall software
Role of Routers
Proxy
Server
Router
Internal Internet
Network
Proxy
Internal Server
Network Router Router Internet
DMZ