Chapter 1 Introduction
Chapter 1 Introduction
Technology, Taxila
Introduction to Security
1
Some Rules
• Follow Covid SOP (Wear Mask all the time)
• Mobile Phones:
• Switched off/ Mute and in your bag/ pocket
• Timekeeping:
• Don’t be late
• I expect you to stay till the end of lecture. If for some
reason you want to leave early, you have to ask for it
in advance.
Dishonesty, Plagiarism
Assignments (3 or 4) 5
Mid 25
Project 10
Final 50
Quiz 10
Total
100
Introduction to Security
6
Certification
• Certified Information Systems Security Professional (CISSP) is
an independent information security certification granted by the
International Information System Security Certification Consortium,
also known as (ISC)².
7
Challenges of Securing Information
• Sony Corporation
– Japanese multinational corporation founded in 1946
that focuses on electronics, games, entertainment,
and financial services
– Employs about 146,300 people and has annual
revenues of about $72.3 billion
– Sony is widely known for its televisions, digital
imaging, audio/video hardware, PCs,
semiconductors, electronic components, and gaming
platform.
1-
13
1.1: The Sony Data Breaches
• The First Attack
– April 17-19, 2011
– Attacks happened a few weeks after the large
earthquake, tsunami, and reactor meltdowns
– Used SQL injection to steal 77 million accounts
– Turned off access to PlayStation Network (PSN)
– Publicly acknowledges intrusion a week after the
intrusion, on April 26th
– CEO, Kazuo Hirai, issues public apology
– Hacking group “Anonymous” is suspected
1-
14
The Sony Data Breaches
• The Second Attack
– May 1st, 2011 – Sony Online Entertainment
– Similar SQL injection attack used to steal additional
24.6 million accounts
– Turned off access to all Sony Online Entertainment
servers
– CEO, Kazuo Hirai, issues written response to US
Congress (May 4th) about steps to prevent future
attacks
– Some PSN services start to come online on May 15th
1-
15
The Sony Data Breaches
• The Third Attack
– June 2nd, 2011 – SonyPictures.com
– Similar SQL injection attack used to steal additional 1
million accounts
– SonyPictures.com is immediately shut down
– Hacking group LulzSec claims responsibility and
issues press statement
1-
16
• LulzSec press statement
“Greetings folks. We're LulzSec, and welcome to Sownage. Enclosed you
will find various collections of data stolen from internal Sony networks and
websites, all of which we accessed easily and without the need for outside
support or money.
1-17
The Sony Data Breaches
https://portswigger.net/web-security/sql-injection
1-18
SQL injection
Difficulties in Defending Against Attacks
19
Next generation attacks
The DDoS attack on Dyn DNS was carried out using Mirai
malware botnet — Mirai is a DDoS nightmare turning
Internet of things (IoT) into a botnet of things.
27
Defining Information Security (cont’d.)
• Three types of information protection: often called CIA
– Confidentiality
• In general, for confidentiality to be maintained on a network,
data must be protected from unauthorized access, use, or
disclosure while in storage, in process, and in transit.
28
Defining Information Security (cont’d.)
Confidentiality
– Violations of confidentiality are not limited to directed
intentional attacks.
– Events that lead to confidentiality breaches include
• by not encrypting it before sending it to another person,
• by falling prey to a social engineering attack,
• by sharing a company’s trade secrets, or by not using extra care
to protect confidential information when processing it.
– documents left on printers, or even walking away from an
access terminal while data is displayed on the monitor.
– Numerous countermeasures
• Encryption for data at rest (whole disk, database
encryption)
• Encryption for data in transit (IPSec, TLS, PPTP, SSH)
• Access control (physical and technical) 29
A classic data breach
30
Do you see any problem here
31
A classic data breach
32
33
Defining Information Security (cont’d.)
• Three types of information protection: often called CIA
– Integrity
• Confidentiality and integrity depend on each other
• Integrity is upheld when the assurance of the
accuracy and reliability of information and systems
is provided and any unauthorized modification is
prevented.
• Environments that enforce and provide this attribute of
security ensure that attackers, or mistakes by users,
do not compromise the integrity of systems or data.
• Numerous attacks focus on the violation of integrity.
These include viruses, logic bombs, unauthorized
access, errors in coding and applications, malicious
modification, intentional replacement, and system back
35
doors.
Defining Information Security (cont’d.)
• Three types of information protection: often called CIA
– Integrity
• Events that lead to integrity breaches include (non-
intentional)
– accidentally deleting files
– entering invalid data
– altering configurations
• Countermeasures
– Hashing (data integrity)
– Configuration management (system integrity)
– Access control (physical and technical)
– Software digital signing
– Transmission cyclic redundancy check (CRC) functions
36
Defining Information Security (cont’d.)
• Three types of information protection: often called CIA
– Availability
• The third principle of the CIA Triad is availability, which
means authorized subjects are granted timely and
uninterrupted access to objects.
• If a security mechanism offers availability, it offers a high
level of assurance that the data, objects, and resources are
accessible to authorized subjects.
• There are numerous threats to availability.
– These include device failure, software errors, and
environmental issues (heat, static, flooding, power loss,
and so on).
– There are also some forms of attacks that focus on the
violation of availability, including DoS attacks, and
communication interruptions.
37
Defining Information Security (cont’d.)
• Three types of information protection: often called CIA
– Availability
• Countermeasures
– Redundant array of independent disks (RAID)
– Load balancing
– Redundant data and power lines
– Software and data backups
– Co-location and offsite facilities
– Rollback functions
– Failover configurations
38
Defining Information Security (cont’d.)
• Protections implemented to secure information
39
– Identification
• Identification is the ability to identify uniquely a user of a
system or an application that is running in the system
• A subject must provide an identity to a system to start the
process of authentication, authorization, and accountability
(AAA).
– Providing an identity can involve typing in a username;
swiping a smart card;
– Authentication
• The process of verifying or testing that the claimed identity
is valid is authentication
• Authentication requires from the subject additional
information that must exactly correspond to the identity
indicated.
• This includes the password variations of PINs and
passphrases
For example, consider a user who logs on to a system by entering a user ID and password. The system
uses the user ID to identify the user. The system authenticates the user at the time of logon by checking
that the supplied password is correct. 40
– Authorization
• Grant ability to access information (After a person has
provided authentication she may have the authority to access the
credit card number or enter a room that contains the web server,
provided the person has been given prior authorization)
– Auditing
• Recording a log of the events and activities related to
the system and subjects.
• Auditing, or monitoring, is the programmatic means by
which a subject’s actions are tracked and recorded for
the purpose of holding the subject accountable for
their actions while authenticated on a system.
41
– Accounting (aka accountability) reviewing log files
to check for compliance and violations in order to
hold subjects accountable for their actions.
• Threat
– Actions or events that have potential to cause harm
• Threat agent
– Person or element with power to carry out a threat
• A threat agent could be a person attempting to break into a secure
computer network.
• It could also be a force of nature such as a hurricane that could damage
computer equipment and thus destroy information, or it could be malicious
software that attacks the computer network.
• Vulnerability
– Flaw or weakness that allows a threat agent to
bypass security
• Threat likelihood
– Likelihood that threat agent will exploit vulnerability
• Risk
– A situation that involves exposure to some type of
danger
https://www.wired.com/2008/09/palin-e-mail-ha/ 50
Case study: Heartbleed!
• SSL is the main protocol for secure (encrypted) online
communication!.
• The SSL standard includes a heartbeat option, which allows a
computer at one end of an SSL connection to send a short
message to verify that the other computer is still online and get a
response back.
Researchers found that it's possible to send a cleverly formed, malicious
heartbeat message that tricks the computer at the other end into divulging secret
information.
51
Case study: Heartbleed!
https://www.forumsys.com/api-security/how-to-fix-openssl-heartbleed- 52
security-flaw/
Case study: Heartbleed!
53
Case study: Heartbleed!
Option 2:
• Zero day initiative (ZDI), iDefense: $2K – $25K
Example: Mozilla
Marketplace for Vulnerabilities
• Identity theft
– Stealing another person’s personal information
• Usually using it for financial gain
– Example:
• Steal person’s SSN
• Create new credit card account to charge purchases
and leave them unpaid
• File fraudulent tax returns
• Categories of attackers
– Cybercriminals
– Script kiddies
– Brokers
– Insiders
– Cyberterrorists
– Hactivists
– State-sponsored attackers
73
tools
• Nessus Vulnerability Scanner
– Vulnerabilities that allow a remote hacker to control
or access sensitive data on a system.
– Misconfiguration (e.g. open mail relay, missing
patches, etc.).
– Default passwords, a few common passwords, and
blank/absent passwords on some system accounts.
Nessus can also call Hydra (an external tool) to
launch a dictionary attack.
– Denials of service against the TCP/IP stack by using
malformed packets
76
hacking and security tools in multiple categories
77
Brokers
84
Advanced Persistent Threats (APT)
85
Advanced Persistent Threat (APT)
• As the name "advanced" suggests, an advanced
persistent attack (APT) uses continuous, and
sophisticated hacking techniques to gain access to
a system and remain inside for a prolonged period
of time, with potentially destructive consequences.
87
Advanced Persistent Threat
(Example: Stuxnet)
• Stuxnet had to target specific Siemens industrial control
systems and CPUs. Additionally, the program had to
determine that these systems were operating in Iran.
• https://www.sans.org/cyber-security-summit/archives/file/summit-
archive-1493920814.pdf
88
Advanced Persistent Threat (APT)
• Examples of APTs include:
– A well-crafted e-mail with the subject line "2011
Recruitment Plan" tricked an RSA employee to
retrieve from a junk-mail folder and open a message
containing a virus that led to a sophisticated attack
on the company's information systems, a top
technologist at the security vendor
89
90
Cyber Kill Chain outlines the steps of an attack: