SECTION 3 ©
RSA and Cyber Crimes growing Internet Security Standards Security Policies and Countermeasures Threat Modeling & Risk Assessment Tiger Teams Disaster Recovery Plans weak points Security Processes
Honey Pots Social Engineering IT Security Audit After the attack Incident Handling and Hacker Exploits" |
changes last made to this
page 2003 Feb 19th
In Section Three we will
use material from the following texts
Chpt 8 | Chpt 4
Chpt 17 Chpt 19 Chpt 20 Chpt 24 |
|||
Chpt 21 | Chpt 3 |
.
. | Learning
Objectives for Section 3
After completing this section participants will be able to
|
Before we begin
this section, it is perhaps wise to pause and reflect on whether the precautions
we are about to discuss are necessary - that is to say "why deal with the
trouble of security procedures if the threat, in actuality, is not very
big?"
The answer to this question is a resounding YES - the threat is real and it is growing. We searched for an authoritative voice on threat trends and found the article below - this article discusses a survey conducted by the Computer Security Institute (a legitimate and credible organization) and the FBI's Computer Intrusion squad based in San Francisco. The survey concludes that cyber crimes are rising substantially - therefore the threat is real and it needs to be dealt with. |
"The results
of the sixth annual [2001]"Computer Crime and Security Survey," conducted
by the Computer Security Institute with the participation of the San Francisco
Federal Bureau of Investigations (FBI) Computer Intrusion squad,
were released mid-March [2001] with some startling findings. "Based
on responses from 538 computer security practitioners in U.S. corporations,
government agencies, financial institutions, medical institutions
and universities, the findings of the 2001 Computer Crime and Security
Survey confirm that the threat from computer crime and other information
security breaches continues unabated and that the financial toll
is mounting," the report states."
www.rsasecurity.com/newsletter/v2n2/cybercrime.html |
. | After reading the story
in the RSA page about the Survey concluding Cyber Crime is growing, you
should pause and reflect if
1. Cyber Crime is growing, or is it also partly 2. Companies are simply getting better about detecting cyber crime. |
Proper
Procedures |
.
"Proper network security requires at least one (if not several) firewalls, anti-virus software and intrusion detection. That's just the technology, which is not even the most important part. Security also depends on policies and procedures, and without those, all the gadgets in the world will not be enough.... policies and procedures are not the complete answer either. Hardware and software can help enforce the rules and make it easier for employees to comply with them" |
Counter
measures Counter
|
Responding to a security
risk, or a threat of a security risk
|
Counter
measures Honey
Pots
|
|
Security
Considerations Proper
|
|
Security
Considerations Proper
|
Security Procedures:
Weak Points
|
Chpt 8 Risk Management
|
"Electronic Commerce":
Greenstein & Feinman,
Chpt 6, 1st ed. Chpt 8. 2nd ed. Risk Management
Greenstein page 171 "Risk Management is a methodology for
|
Chpt 8 Culture
|
"Electronic Commerce":
Greenstein & Feinman, Chpt 6 Risk Management page 174
Culture Management
"Controls over the human factor are called social controls and managing these controls is called culture management. The human element of managing risk is the most troublesome aspect to many information technology professionals. The major risks of the human factor are
|
Chpt 8 Risk
|
"Electronic Commerce":
Greenstein & Feinman, Chpt 6 Risk Management page 176
Risk Management Paradigm
You should carefully review the pages from 176-178 (1st ed.); (2nd ed.) page 256. The
key point is that
|
Risk
Assessment Risk
|
Risk Assessment
"Most assessments today focus
on the Web user interface, Web server setup, links to company databases,
and server scripts. The checks should include planning of countermeasures
regarding DDoS, defacement, and "hijacking" - the intrusion of a non-authorized
third party into a two-party transaction, as recently occurred at nike.com,
bali.com, and web.net, which were deprived of their virtual identities.
Evaluate the ability of the security analyst to assess Web server setup
vulnerabilities, in terms of administration privileges and software modules
such as CGI, ASP, etc. This analysis is usually performed by a "tiger team,"
which may be made up of ex-crackers or reformed wayward university
students. Or it may consist of properly trained security engineers."
"In every case, a security assessment service must provide an analysis of the effectiveness of a company's security controls. Global Integrity, for example, recommends a periodic assessment based on a review of current documentation, policies, and practices; interviews with key personnel; and comparisons against industry "best practices" and other benchmarks. A thorough review should not stop with the infrastructure. You also need to test your defenses against social engineering - the set of techniques used to subvert systems by exploiting human nature. One bank I studied paid no attention to managing the e-mail relationship with the system administrators. By spoofing an internal e-mail address, an intruder could contact bank employees with a request to "check the correct password," and 90 percent of the time they responded with the correct information without taking any steps to verify the sender's identity." |
Chpt 19 Threat Modeling
Chpt 19 Threat Modeling
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier
Chpt 19 Threat Modeling
and Risk Assessment
"Threat modeling is the first step in any security solution. It's a way to make sense of the vulnerability landscape... It involves thinking about a system and imagining ... how you can attack this system". Risk Assessment
Chpt 19, page 301
Risk Assessment and Estimating Security Costs "Some risks have a very low probability of incidence. If the risk is a network intrusion by an industrial competitor out to steal the new design plans, the expected loss per incident might be $10 million but the number of incidents per year might be 0.0001 - there's a 0.1% chance of this happening per year. This means that the annual loss expectancy (ALE) is $10,000, and a countermeasure costing $25,000 isn't such a bargain". |
Chpt 6 Disaster
|
"Electronic Commerce":
Greenstein & Feinman, Chpt 6 Risk Management page 178
Disaster Recovery Plans You should carefully review the pages from 178 - 181. Good Planning involves considering the following objectives
|
Chpt 4 "Who"
"Who"
"Who"
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier Chpt 4 Adversaries
Schneier begins the chapter by categorizing adversaries in several ways. Adversaries can be differentiated according to their
3. Resources. Adversaries can be categorized according to whether they have money, or know how, or ideally bothSchneier cautions "insiders are not necessarily employees. They can be consultants and contractors...". During the Y2K scare, many people with suspect expertise were given wide access to IT networks in hopes that they could fix the bugs in time.
A summary of the "participants" in the IT threat community
|
Chpt 4 "Hackers"
a subtle
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier Chpt 4 Adversaries "The word Hacker has several definitions, ranging from a corporate system administrator adept enough to figure out how computers really work to an ethically inept teenage criminal... The word has been co-opted by the media and stripped of its meaning. It used to be a compliment, then it became an insult. Lately people use "cracker" for the bad guys and "hacker" for the good guys." Schneier page 43 "I define a hacker as an individual who experiments with the limitations of systems for intellectual curiosity or sheer pleasure; the word describes a person with a particular set of skills and not a particular set of morals" |
Chpt 17 The
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier Chpt 17 The Human Factors
Schneier
"Information never stays in computers; it moves onto paper all the time. Information is information and, for an attacker, information in paper files is just as good as information in computer files. Many times paper in trash is more valuable than the same data in a computer: It's easier to steal and less likely to be missed. A company that encrypts all of its data on computers, but doesn't lock its file cabinets or shred its trash, is leaving itself open to attack." Human Weaknesses page 258
Social Engineering page 266-268 "Social Engineering is the hacker term for a con game: persuade the other person to do what you want". Schneier discusses various examples of social engineering over a few pages. It is a term that can be found throughout the web related to IT security situations. You could earn some class participation / contribution marks by finding some specific examples of social engineering used in some hacking situations, which have been reported on by the media, and make a summary of what happened, and email this to the professor running the course. |
Chpt 20 Security
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier Chpt 20 Security Policies and Countermeasures Schneier
".. every organization needs a security policy for its computer network. The policy should outline
|
Deterrence
Deterrence
|
Chpt 3, page 98
in Principles of Information Security by Michael Whitman and Herbert Mattford
Whitman and Mattford say that "Deterrence is the best method for preventing illegal or unethical activity. Laws, policies and technical controls are all examples of deterrents. However it is generally agreed that laws and policies and their associated penalties only deter if three conditions are present.
|
Chpt 24 Security
Chpt 24 Security
Chpt 24 Security
Chpt 24 Security
|
Secrets
& Lies: Digital Security in a Networked World
by Bruce Schneier
Chpt 24 Security Processes Following his axiom that security is a process, not a product, Schneier opens Chapter 24 saying that page 367
The Principles of the
Security Process which is presented by Schneier p. 367-374
|
Chpt 21 Security
|
Creating
a Security Policy
"The Basic Approach to Developing a Security Policy" Provding computer security goes far beyond worrying about hackers and viruses. Most threats to data and resources come from internal users" To develop a security policy you need to perform the following steps
|
Chpt 21 Security
|
Creating
a Security Policy
"The Basic Approach to Developing a Security Policy"
- Determine from whom you must protect your assets
this table comes from page 638 |
Chpt 21 Security
|
this
comes from page 639
Determining who is using each resource and who should be "As you examine each resource,
you must clearly define who can use your system and resources. The policy
should explicitly state who is authorized to use what resources in what
ways and what times. Many hacker break-ins occur during off hourse. By
simply restricting off-hours access you can protect many assets"
|
Why You Should Do an IT Security Audit Why You Should Do an IT Security Audit |
.
|
How to Do an IT Security Audit |
.
"If you're the IT manager at a small to midsize business, it's only a matter of time until you're asked to do an IT security audit. Even in a larger company, if security is decentralized, you may be the go-to guy in IT. You're neither a security expert nor an auditor, and resources are tight. How will you begin and where will you go from there? First, don't panic. "People sell themselves short," says Jay M. Williams, senior vice president and chief technology officer at The Concours Group, an IT consulting firm in Kingwood, Texas. "For the most part, security is common sense." |
How to Do an IT Security Audit |
.
How to Do an IT Security Audit
|
Organizational Liability Organizational
|
"Organizational Liability
and the Need for Counsel."
Chpt 3, page 110 in Principles of Information Security by Michael Whitman and Herbert Mattford
These are the following terms we will deal with
"The bottom line is that if an employee, acting without authorization of the organization, performs an illegal or unethical act, causing some degree of harm, the organization can be held financially liable for action. An organization increases its liability if it refuses to take strong measures [to prevent harm caused] known as due care. Due care is honoured when an organization makes sure that every employee knows what is acceptable or not acceptable behaviour, and knows the consequences of illegal or unethical actions. Due diligence requires that the organization make a valid effort to protect others and continualy maintain this level of effort." "With the global impact of the Internet, those who could be potentially injured or wronged by an organization's members could be anywhere. Under the U.S. legal system [and in Canada too] any court can impose its authority over an individual or organization if it can establish jurisdiction - jurisdiction being the court's right to hear a case in its court if the wrong was committed in its territory or involving its citizenry. |
After the Attack |
"Cracking cybercrime
Don't touch electronic evidence until you call in the cops or a cyberforensics expert." is the title of an October
1998 article in Network World written by Deborah Radcliff
"Thou shalt not bungle computer
evidence intended for a court of law"
"Crimes committed via computer leave distinct evidence trails. If you so much as access, download or open suspect files, you could taint the evidence and render it inadmissible. That type of activity alters backup files and system logs and overwrites date and time stamps... Draft a contingency plan for when cybercrime strikes and take the proactive measures ... regularly print and save log files from critical servers. Establish a tamper-proof backup system to capture activity and audit trials." FYI, the SANS Institute offers training and courses on " Incident Handling and Hacker Exploits" Some of the courses are given at conferences, others are online. |
1. If asked to describe "from where threats come", could you answer with a list categorizing adversaries in five ways? 2. If you were challenged to give an specific example of how a hacker penetrated a system, could you provide one? Sometimes people know threats are a problem but they have an easier time believing it if you can provide a real example. 3. Could you explain to a non-IT person what a tiger team is and why you might need to use one? 4. Would you be able to speak about at least 5 of the Principles of the Security Process which is presented by Schneier |