+ All Categories
Home > Documents > Computer Security and Authentication

Computer Security and Authentication

Date post: 03-Jan-2016
Category:
Upload: aretha-olsen
View: 32 times
Download: 0 times
Share this document with a friend
Description:
Computer Security and Authentication. CS 5352 Spring 06. Software Engineering Institute. Federally funded, sponsored by DoD Operated by Carnegie Mellon University About 400 employees Wants a smooth transfer of new Software Engineering Technology into practice Technical theme: Move left - PowerPoint PPT Presentation
Popular Tags:
34
Computer Security and Authentication CS 5352 Spring 06
Transcript
Page 1: Computer Security and Authentication

Computer Security and Authentication

CS 5352

Spring 06

Page 2: Computer Security and Authentication

Software Engineering Institute

• Federally funded, sponsored by DoD• Operated by Carnegie Mellon University• About 400 employees• Wants a smooth transfer of new Software

Engineering Technology into practice• Technical theme:

– Move left– Reuse everything– Never make the same mistake twice

Page 3: Computer Security and Authentication

CERT Coordination Center• Overview

– Part of the SEI– Formed by DARPA, 1988, after the worm incident– About 100 employees– 3,784 vulnerability reports (2003)– 137,529 computer security incidents (2003)

• Purpose– Analyse trends in attacks, vulnerabilities, impact– Coordinate responses to security attacks– Methods to evaluate, improve, maintain security – Publish, disseminate good security practices

Page 4: Computer Security and Authentication

Survivability

• The ability of a system to fulfill its mission, in a timely manner, in the presence of attacks, accidents, and failures

Page 5: Computer Security and Authentication

Critical Need for Information Assurance Incidents Reported to the CERT/CC

21756

52658

82094

137529

98593734213425732412

0

20000

40000

60000

80000

100000

120000

140000

160000

1995 1996 1997 1998 1999 2000 2001 2002 2003

Page 6: Computer Security and Authentication

Critical Need for Information Assurance Vulnerabilities Reported to the CERT/CC

3780

5990

1090

2437

4129

3784

417262311345171

0

1000

2000

3000

4000

5000

6000

7000

1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005

Page 7: Computer Security and Authentication

AdvancedIntrudersDiscover

Vulnerability

Crude ExploitTools Distributed

Novice IntrudersUse Crude

Exploit Tools

AutomatedScanning/ExploitTools Developed

Widespread Use of Automated Scanning/Exploit Tools

Intruders Begin Using New Types of Exploits

Critical Need for Indications and Warnings

Page 8: Computer Security and Authentication

Critical Need for Indications and Warnings

Page 9: Computer Security and Authentication

Critical Need for Better Engineering Methods

• Resistance, recognition, and response must be integrated into the system and application architecture

Page 10: Computer Security and Authentication

Network protocols

• Designed for Arpanet, over 20 years ago

• But still used nowadays, under a totally different environment

Page 11: Computer Security and Authentication

A Different Internet• Armies may cease to march

• Stock may lose a hundred points

• Businesses may be bankrupted

• Individuals may lose their social identity

• Threats not from novice teenagers, but purposeful military, political, and criminal organizations

Page 12: Computer Security and Authentication

Why Should You Be Concerned

Personal data

Credit information

Medical information

Purchasing history

Corporate information

Political information

Societal infrastructure

Page 13: Computer Security and Authentication

Computer Vulnerability (2001)Out-of-the-box Linux PC hooked to Internet, not announced:[30 seconds] First service probes/scans detected[1 hour] First compromise attempts detected[12 hours] PC fully compromised:

– Administrative access obtained– Event logging selectively disabled– System software modified to suit intruder– Attack software installed– PC actively probing for new hosts to intrude

• Clear the disk and try again!

Page 14: Computer Security and Authentication

Motivations to Violate Security

• Ego

• Curiosity

• Greed

• Revenge

• Competition

• Political/Ideological

Page 15: Computer Security and Authentication

People and Computer Crime

• Most damage not due to attacks“Oops!”“What was that?”

• No clear profile of computer criminal

• Law and ethics may be unclear

Page 16: Computer Security and Authentication

Types of Attackers

• Script Kiddies

• Old-line hackers

• Disgruntled Employees

• Organized Crime

• Corporate Espionage

• Foreign Espionage

• Terrorists

Page 17: Computer Security and Authentication

Buffer overflow

• The most important avenue for vulnerabilities

• Good programming practice: always verify that the input you receive from uncontrolled source conforms to expected format

Page 18: Computer Security and Authentication

Buffer overflow example

rlogin programmain(argc,argv) int argc; char *argv[];{… char term[1024];...(void)strcpy(term, (p = getenv(“TERM”)) ? p: “network”);…}

Page 19: Computer Security and Authentication

Authentication

• Four classic ways to authenticate:1. something you know (passwords)

2. something you have (smartcard)

3. something you are (fingerprint)

4. something you do (usage signature)

• None of these is perfect

Page 20: Computer Security and Authentication

Identity theft

• Fastest rising crime in the US

• FBI won’t help unless losses above $100,000.

• Someone can steal an identity with just a social security number!!!

Page 21: Computer Security and Authentication

Passwords• Account - person using the system• Username - Identity of account (public)

– limited characters, alphanumeric & special characters– typically related to real name of user (not always), certain

names reserved – unique on system– fixed at account creation

• Passwords – Verification of identity (private)– Less limited length and characters– Fixed until changed– Non-unique passwords – (both users have bad password)

• Many Multi-user Operating Systems have same scheme

Page 22: Computer Security and Authentication

Password Security

• Password security depends on ONLY you knowing the password– Secure selection– Secure handling – Secure storage

Page 23: Computer Security and Authentication

Password Storage

• “trapdoor encrypted”– scrambled in a way that cannot be unscrambled– scrambling folds password over itself - lost bits– different users with same password won’t have

same scrambled password– login scrambles entered password and compares

against stored scrambled password– original concept: since only scrambled passwords

are available, storage is secure (FALSE!)

• longpre:br1eXN8N3pyAB

Page 24: Computer Security and Authentication

Password Attacks

• Easy to Hard– Given password– Grab password– Generate password– Guess password

Page 25: Computer Security and Authentication

Given Password• Look It Up

– Default passwords– Posted passwords

• Ask for It (Social Engineering)– As colleague– As friend– As administrator / authority– As clueless & needy

• Countermeasures– Education– Other authentication

Page 26: Computer Security and Authentication

Grab Password (locally)• Physical proximity

– Shoulder surfing– Countermeasures

• Education• Exercises• One-time passwords

• Program access– Trojan Horse– Perverted program– Countermeasures

• Integrity checks• Other authentication

Page 27: Computer Security and Authentication

Other Network Attacks• Tapping

– Method depends on network medium

– Countermeasures: • Encryption

• Physical protection & inspection

• Van Eck Radiation– Current through wire: Radio waves

– Receiver tunes in on hosts/network

– Countermeasures:• Encryption

• Distance

• Emission Control

Page 28: Computer Security and Authentication

Generate Password• Use a dictionary• Requires: Scrambled password,

Encryption method & Large dictionary• Password Cracking

– Natural language words and slang– Backwards / Forwards / Punctuation and Numbers

inserted– Program: 27,000 passwords in approx 3 seconds

(Pentium II/133)

• Countermeasures– Preventive strike (BEWARE)– Password rules– Other authentication

Page 29: Computer Security and Authentication

Guess Password• Use knowledge of user

– System information– Personal information– Occupation information

• Often combined with dictionary attack

• Countermeasures– Password rules– Other authentication

Page 30: Computer Security and Authentication

Password Changing• When?

– Forced or voluntary– Regularly or event driven

• Considerations– Increase security?

• Fix a stolen password problem• However, stolen passwords are often used quickly• False sense of security

– Too frequent password changes encourage• weak passwords • written down passwords

Page 31: Computer Security and Authentication

Passwords on Many Machines

• One or Many?– Ease of memorization vs. likelihood of writing – Options:

• Secure stored passwords

• Network authentication method

• Algorithm for varying passwords

• Seldom used passwords in encrypted file

Page 32: Computer Security and Authentication

Something You Have• Convert logical security to physical security

– One-time pad– Strip card / smart card– Dongle– Challenge-Response calculator

• Problems: Cost & token issuing/handling

• Advantages: Physical presence; hard to hack

Page 33: Computer Security and Authentication

Smart cards for identification• Hard to duplicate

• If weak protocol and a lot at stake, fakes WILL appear

• Use of zero-knowledge algorithms– Guarantee valid user but preserves privacy

• Attacks on smart cards– Power supply– Chemical stripping– Emissions

Page 34: Computer Security and Authentication

Something You Are• Biometrics: Measure physical characteristic

– Face geometry

– Hand geometry

– Fingerprint

– Voiceprint

– Retinal Scan

– Signature

• Advantages: Physical presence, not easily lost• Disadvantages: Cost, Security, Variation,

Handicaps, Success ratio


Recommended