BIS 321 Chapter One Part Three
BIS 321 Chapter One Part Three
Information Security
(BIS 321)
Vulnerabilities(Attack Surface):- are weak points or loopholes
in security that an attacker can exploit in order to gain access to
the network or to resources on the network.
The vulnerability is not the attack, but rather the weak point that is
exploited.
Vulnerability is the intersection of three elements:
1. A system susceptibility or flaw,
2. attacker access to the flaw, and
3. attacker capability to exploit the flaw
To be vulnerable, an attacker must have at least one applicable
tool or technique that can connect to a system weakness.
A security risk may be classified as a vulnerability. But there are
vulnerabilities without risk, for example when the
2
affected asset has no value.
Contd.
A vulnerability with one or more known instances of working and
fully-implemented attacks is classified as an exploitable
vulnerability, a vulnerability for which an exploit exists.
3 Fig Threat agents, attack vectors, weakness, controls, IT asset and business
impact
Vulnerability Classification
Vulnerabilities are classified according to the asset class they related to:
1. Hardware 3. Network
Unprotected communication
susceptibility to humidity
lines
susceptibility to dust
Insecure network architecture
susceptibility to soiling
4. Personnel
susceptibility to
inadequate recruiting process
unprotected storage
inadequate security awareness
2. Software
5. Site
insufficient testing
area subject to flood
lack of audit trail
unreliable power source
6. Organizational
4
lack of regular audits
Protocol Design
Communication protocols sometimes have weak points. Attackers
use these to gain information and eventually gain access to systems.
Some known issues are:
TCP/IP:- The TCP/IP protocol stack has some weak points that
allows:
IP address spoofing
a) Normal flow
b) Interruption
c) Interception
9 d) Modification e) Fabrication
Contd.
Interruption
Interception
16
Contd.
of a false stream.
17
Active Attack Types
A. Masquerading:- The entity pretends to be a different entity.
19
Security Services
A security service is the collection of mechanisms, procedures and
handled).
individual packets.
A valid digital signature gives a recipient reason to believe that the message
was created by a known sender, and that it was not altered in transit.
rights to resources.
25
Contd.
4. Data Integrity:- a variety of mechanisms used to assure the integrity
of data unit or stream of data units.
5. Authentication Exchange:- a mechanism intended to ensure the
identity of an entity by means of information exchange.
29
Access Control
Protection of information resources or services from access or use by unauthorized
entities (organizations, people, machines, processes).
Privileges – rights to access or use resources or services
Principles – entities own access control privileges
Subjects – entities exercise access control privileges
Objects / Targets – resources or services accessed/used by subjects
Delegation – transfer of access control privileges among principals
Authorization – transfer of access control privileges from principals to subjects
Non-Repudiation of Reception
Time Stamp
Digital Signature
31
Audit
Recording & analyses of participation, roles and actions in
32
Service vs. Layer Mapping
Service / Layer 1 2 3 4 6 7
Confidentiality, Connectionless Y Y Y Y
Confidentiality, Connection Y Y Y Y Y
Confidentiality, Selected Field Y Y
Confidentiality, Traffic Flow Y Y
Authentication, Data Origin ? Y Y Y
Authentication, Peer Entity Y Y Y
Integrity, Message Y Y Y Y
Integrity, Message Stream ? Y Y Y
Access Control ? Y Y Y
Non-Repudiation, Origin Y
Non-Repudiation, Receipt Y
? = difference between IEEE802 and ISO
33
A Model for Network Security
34
Design Issues in the Model
purpose.
2. Host hardening
Firewalls, Packet filtering
Routing protocols
Attacker
Dropped
Packet
Hardened
Server Internal
Log File Corporate
Network
37
Intrusion Detection System
1.
4. Alarm Intrusion Suspicious
Detection Packet
System
Network
2. Suspicious
Administrator Internet
Packet Passed
Attacker
3. Log
Packet
Hardened
Server
Log File Corporate Network
38
Encryption for Confidentiality
Encrypted
Message
“100100110001”
Client PC Server
Bob Alice
“100100110001”
39
Impersonation and Authentication
I’m Bob
Prove it!
Client PC Attacker (Authenticate Yourself)
Server
Bob (Eve) Alice
40
Secure Dialog System
Secure Dialog
Client PC
Automatically Handles Server
Bob
Negation of Security Options Alice
Authentication
Encryption
Integrity
Attacker cannot
read messages, alter
messages, or impersonate
41
Hardening Host Computers
1. The Problem
Computers installed out of the box have known vulnerabilities
Not just Windows computers
Hackers can take them over easily
They must be hardened—a complex process that involves many actions
2. Elements of Hardening
Physical security
Secure installation and configuration
Fix known vulnerabilities
Turn off unnecessary services (applications)
Harden all remaining applications
Manage users and groups
Manage access permissions
For individual files and directories, assign access permissions specific users and groups
Back up the server regularly
42 Advanced protections