IT Security

1,082 views
1,046 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,082
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
52
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

IT Security

  1. 1. Abegail T. SoñasBS IT 4
  2. 2.  IT Security Overview  Introduction  Overview  Limitations to NIDS  3 Main Objectives  Things to Consider When Choosing NIDS Firewalls  Introduction to Firewalls  Vulnerability  Organizational Guidelines Assessment  Functionality Guidelines  Introduction to Vulnerability Assessment  Vulnerability Assessment Preparation (SLA)  Penetration Assessment Intrusion Detection
  3. 3. Overview | 3 Main Objectives
  4. 4. IT Security Overview Information technology security is controlling access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so. This seemingly simple task has become a very complex process with systems that need to be continually updated and processes that need to constantly be reviewed.
  5. 5. IT Security Overview There are three main objectives for information technology security:  confidentiality,  integrity, and  availability of data.
  6. 6. IT Security Overview Confidentiality  protecting access to sensitive data from those who dont have a legitimate need to use it. Integrity  ensuring that information is accurate and reliable and cannot be modified in unexpected ways. Availability of Data  ensures that is readily available to those who need to use it (Feinman et. al., 1999).
  7. 7. Introduction to Firewalls | Organizational Guidelines |Functionality Guidelines
  8. 8. Firewall Introduction to Firewalls Organizational Guidelines Functionality Guidelines
  9. 9. Firewall Institutions and businesses need to protect themselves from threats created by the use of new technologies.  Firewall technology is useful in offering this protection. Firewalls control all inbound and outbound traffic.
  10. 10. Firewall The most common types of technology used in firewalls are  packet filtering,  application level firewalls, and  stateful inspection firewalls.
  11. 11. Firewall MOST COMMON TYPES OF TECHNOLOGY Packet filtering software  works at the network layer where all packets are inspected as they pass through a router.  Packets that match access control rules are allowed through, while those that do not match are dropped.
  12. 12. Firewall MOST COMMON TYPES OF TECHNOLOGY Application-level firewalls  work at the application layer.  Most use proxy servers that act as an interface between internal users and the Internet.  The proxy checks for permissions and enforces access control rules.  Services that do not comply with these rules are blocked.
  13. 13. Firewall MOST COMMON TYPES OF TECHNOLOGY Stateful inspection  works at the network layer.  IP header information is reviewed to determine which services to allow through and which to block.
  14. 14. Firewall MOST COMMON TYPES OF TECHNOLOGY Adaptive proxy, a new firewall technology, combines packet filtering with secure proxy technology.
  15. 15. Firewall Firewall appliances, as opposed to software applications, are becoming more popular.  These devices are stand-alone and  typically combine hardware and software set into an operating system.
  16. 16. Firewall The following selection guidelines are recommended by Gartner, and can be found at http://enterprise.cnet.com/enterprise/0-9567-7- 2481743.html1) Establish application/business needs: Internet, intranet, extranet.2) Assess security risks: high, medium, or low.3) Establish security requirements.4) Establish operational capabilities.5) Check security budget allocation.
  17. 17. Firewall6) Establishing business requirements includes asking questions about:7) What type of access to the Internet is required and by whom (internal employees, remote access, access from outside to company Web site)?8) Does the company intranet need a firewall to protect from internal attacks?9) Does the enterprise want to conduct business with other business partners and suppliers via an extranet?
  18. 18. Firewall10) Assessing the type of firewall to install requires an organization to review its network design and business objectives. By conducting a risk analysis, exposures and levels of risk may be determined. Then, based on the results of the risk analysis, an organization has the starting blocks from which its requirements will arise.
  19. 19. Firewall10) (Continuation…) A sampling of what may be uncovered during the risk analysis includes these:  The threats, impact, and vulnerabilities of connecting to the Internet.  Consider what Internet or external services are required, what features are required, and what level of assurance is required.
  20. 20. Firewall10) (Continuation…) A sampling of what may be uncovered during the risk analysis includes these:  This will help towards specifying a firewall according to the users needs as opposed to selecting a firewall based on the number of features it comes with. The firewall must reflect the companys existing security policy, not impose a new one. In the absence of a security policy, or where a security policy exists but does not cover the Internet, an acceptable use agreement should be implemented.
  21. 21. Firewall10) (Continuation…) A sampling of what may be uncovered during the risk analysis includes these:  Operational capabilities should be established, i.e., what processes are involved in the day-to-day running of the system, check logistics, IT responsibilities, etc. Another important factor to bear in mind is to check where the security spending will come from: Does the enterprise have a dedicated security department with a dedicated security budget, or will budget have to be requested from the corporate IT director.
  22. 22. Firewall Questions to ask include these: 1) What authentication techniques does the firewall support? 2) Which antivirus software is supported? 3) Can it filter Java/ActiveX applets? 4) Are there logging facilities for inbound/outbound traffic? 5) Are there auditing and reporting tools?
  23. 23. Firewall6) Does it carry out intrusion detection?7) Does it have alerting facilities?8) Is there a standby device in case of failure?9) Does the firewall support VPN?10) What types of encryption settings does it have?11) Can it centrally manage multiple firewalls?
  24. 24. Firewall12) Does it offer secure remote management?13) Does it have ITSEC or ICSA certification?14) Does it have load balancing/traffic prioritization/bandwidth management?15) Does it support LDAP?16) Performance?17) Does it offer PKI support?
  25. 25. Introduction | Limitations to NIDS |Things to Consider When Choosing NIDS
  26. 26. Intrusion Detection System Introduction  Platform  Things to Consider When  Components Choosing a NIDS  Signature Detection or  Operation Systems Anomaly Detection  NICS Supported  Placement on the Network  Reactive Versus Passive  Network-based and Host- Systems based  Alerting  Functionality  Logging and Reporting  Maintenance Limitations to NIDS  Console  False Positives  Scalability  TCP Stream Reassembly/IP  Redundancy Defragmentation  Switched Networks
  27. 27. Intrusion Detection System Introduction Platform Components Signature Detection or Anomaly Detection Placement on the Network Network-based and Host-based Functionality
  28. 28. Intrusion Detection System "An intrusion detection system (IDS)  inspects all inbound and outbound network activity and  identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system."
  29. 29. Intrusion Detection System Some IDSs function from a dedicated (black box) appliance,  meaning that there is no need for the customer to ▪ load the operating system, install the application software, and harden the operating system separately. Others are software based and have to be installed on top of a supported platform and operating system.
  30. 30. Intrusion Detection System IDSs generally can be broken into two components: the sensor and the console. The sensor sits upon the network and acts as a sniffer, listening to network traffic in promiscuous mode. The console is the point of central management for an IDS system.  By using the console, an administrator may take notice of any current attack alerts.  In many cases, the console may be used to customize certain preferences for the IDS.
  31. 31. Intrusion Detection System SIGNATURE DETECTION Most IDSs function by means of a built-in attack signatures database. If the IDS detects a match between current network activity and an attack in the signatures database, the IDS will document the attempted attack in a log.  In many cases the IDS sensor will also send an alert to the console regarding the attack.
  32. 32. Intrusion Detection System ANOMALY DETECTION Other IDSs function based upon anomaly detection. This approach is more statistical, because the IDS compares all network traffic to whatever is considered a "normal" load for a particular network.  The IDS analyzes packet sizes, protocols, and traffic load in this comparison process. Therefore, if a particular transaction is atypical to a certain predefined extent, it is designated an attack by the IDS system.
  33. 33. Intrusion Detection System IDS can be set up either inside or outside of a firewall, depending on the needs of an organization. An external IDS  monitors attacks that occur on a firewall that are not allowed into a network; therefore potential attacks are discovered, but internal threats go undetected. Internal IDS  configurations do not see attacks that are repelled by the firewall, but monitor attacks that penetrate the firewall as well as internal attacks.
  34. 34. Intrusion Detection System There are two types of IDS. Network-Based Systems  real-time  examine all traffic on a system Host-Based Systems  examines log file data  examine traffic only on that specific system
  35. 35. Intrusion Detection System When searching for a NIDS, one of the first aspects to consider it the type of attacks detected by the IDS.  It is not sufficient to merely rely on the number of attack signatures in the database. It is better to ensure that the particular IDS has signatures for a wide variety of attack types, such as  buffer overflows, stealth port scans, CGI attacks, SMB probes, NMAP probes, fragment attacks, and OS fingerprinting attempts.
  36. 36. Intrusion Detection System An effective IDS should also perform protocol analysis, detecting protocols such as  TCP/IP, ICMP, UDP, FTP, SMTP, HTTP, DNS, RPC, NetBIOS, NNTP, SNMP, and Telnet. More advanced NIDS can actually display these protocol transactions in real time. One such product is Netprowler.
  37. 37. Intrusion Detection System Some vendors have attempted to integrate network and host-based intrusion detection into a single product. ISSs RealSecure is the strongest example of such a product.  The combined ability to watch network-based attacks (including port scans and remote buffer overflow-based attacks) with system-level events (such as failed login attempts and modified registry keys) in one interface is incredibly powerful. Additionally some IDSs can be integrated with firewalls and scanners in an attempt to increase security.
  38. 38. Intrusion Detection System Limitations to IDS False Positives TCP Stream Reassembly/IP Defragmentation Switched Networks
  39. 39. Intrusion Detection System False Positives One important limitation to NIDSs is the frequency of false positives. No current IDS can completely eliminate the possibility of a false positive.  However, most NIDS may be reconfigured so that a particular false positive does not continue to register. This reconfiguration is usually done via the attack signatures database.
  40. 40. Intrusion Detection System False Positives Many NIDS products have customizable attack signatures and also allow for the creation of new signatures.  The programming of these signatures varies from product to product. For instance, Network Flight Recorder uses a proprietary N-code programming language to create new signatures.  Other NIDS, such as ISSs RealSecure, have customizable functions that allow one to determine how the IDS should respond when it detects suspicious activity.
  41. 41. Intrusion Detection System False Positives These functions may somewhat alleviate the occurrence of false positives.  However, it may be difficult to get full information on the hundreds of signatures that are built-in to a particular IDS, making customization more difficult. In addition, depending upon the product, the use of custom signatures may slow the performance of the IDS.
  42. 42. Intrusion Detection System TCP Stream Reassembly/IP Defragmentation Attacks involving TCP and IP packets are the cause for special concern.  In order to monitor a TCP/IP connection, the target network must keep track of all of the individual TCP or IP packets. Though a set of TCP packets may arrive out of order, the receiving network may reorder the packets by using the packet sequence numbers.
  43. 43. Intrusion Detection System TCP Stream Reassembly/IP Defragmentation Many attacks exist that attempt to "confuse" the process of stream reassembly.  For example, a teardrop attack causes a buffer overflow through the use of malformed data packets.  The danger lies in the fact that the first packet looks no different than an ordinary data packet, so the IDS does not immediately detect the attack. In some cases, depending upon the operating system, it only takes one bad packet to crash the IDS.  Once the IDS fails, most NIDS tend to fail open, so that once an attacker has crashed the IDS, s/he has access to the network.
  44. 44. Intrusion Detection System TCP Stream Reassembly/IP Defragmentation Although a report was issued in 1998 arguing that novice attacks using fragmented packets could elude all commercial NIDS, as of 2000 most NIDS were still unable to cope fully with this possibility. A few companies have added reassembly capabilities into their IDS products, such as Cisco and NFR.  Other products can recognize fragmented packets, but are unable to perform TCP reassembly.
  45. 45. Intrusion Detection System SWITCHED NETWORKS Special limitation and problems emerge if the network is switched.  This depends on the type of switches deployed as well as the type of NIDS in use.  Most Internet-delivery environments are switched.  The switches create a bit of a problem, as the NIDS device needs to see the traffic before inspecting it.
  46. 46. Intrusion Detection System SWITCHED NETWORKS The solution here is either  to inspect the traffic at certain bottleneck points (such as perimeter firewalls) or  to figure out a method of siphoning traffic off the wire onto a private inspection network.
  47. 47. Intrusion Detection System Things to Consider When Choosing a NIDSi. Operation Systemsii. NICS Supportediii. Reactive Versus Passive Systemsiv. Alertingv. Logging and Reportingvi. Maintenancevii. Consoleviii. Scalabilityix. Redundancy
  48. 48. Intrusion Detection System Operation Systems The types operating systems supported vary greatly among IDS products.  OS support is a big concern when considering a software-based NIDS. Some products only support Windows NT, whereas others, such as Snort, can be run on a wide variety of operating systems. Other NIDS will be designed so that the console runs on a Windows machine, while the sensor runs on OpenBSD.
  49. 49. Intrusion Detection System Operation Systems Regardless of which operating system is supported, an organization should choose their NIDS carefully when considering the operating system. The administrator of the IDS should be aware of all of the vulnerabilities related to the operating system that the IDS sits upon, so that the IDS may not be compromised.
  50. 50. Intrusion Detection System NICS Supported A very important consideration for NIDS is the type of Network Interface Cards (NICS) supported. Most prevailing technologies provide support for a wide variety of types, such as  Token ring, FDDI, Ethernet, Fast Ethernet, or Gigabit Ethernet. Netprowler, by Symantec/Axent, currently only supports Ethernet or Fast Ethernet. Such details should be taken into account before purchasing and deploying an IDS.
  51. 51. Intrusion Detection System Reactive Versus Passive Systems One important aspect to consider is the need for a reactive NIDS versus a passive NIDS. A passive NIDS  will simply log any suspicious network activity.  If a serious attack takes place, the IDS will also send an alert to the console and perhaps by email or pager.
  52. 52. Intrusion Detection System Reactive Versus Passive Systems A reactive NIDS  will perform those tasks and more.  For example, suppose a reactive IDS detects some type of attack from a particular IP address.  The reactive IDS may be programmed to automatically rewrite the rules of the networks firewall in order to deny future traffic from the attacking IP address-all of this taking place without human intervention.
  53. 53. Intrusion Detection System Reactive Versus Passive Systems Certain reactive NIDS may have the following features:  Setting SNMP traps  Disconnecting and capturing sessions  Killing processes  Disabling user accounts  Launching program commands  Shunning attacker IP addresses
  54. 54. Intrusion Detection System Reactive Versus Passive Systems There are advantages and disadvantages for both types of NIDS. When considering a reactive NIDS, a network administrator may be assured of a timely response in the event of an attack. However, this response can backfire, depending upon the actual circumstances.
  55. 55. Intrusion Detection System Reactive Versus Passive Systems For instance, in our example on previous slide, suppose the attacking IP address had been spoofed by a hacker.  As a result, the legitimate network, which was spoofed, would be restricted access to the network by the reactive NIDS. Therefore a hacker could use the reactive features of an IDS to cause a denial of service attack.
  56. 56. Intrusion Detection System Alerting The alerting features of a NIDS may be in the form of an  email, pager, telephone call, or an alarm. Most NIDS include many types of alerting features. Most importantly, alerting should be done via the NIDS console, if no other alerting mechanism is available or enabled.
  57. 57. Intrusion Detection System Logging and Reporting A competent NIDS should minimally include a logging feature. The log enables an administrator to review any suspicious network traffic. Logs cannot be solely depended upon when deploying a NIDS.  A determined hacker may easily flood the network to the extent that the log reaches its capacity and fails.  Depending upon the operating system that the IDS sits on, a hacker may also compromise the IDS and easily delete information in the log.
  58. 58. Intrusion Detection System Logging and Reporting On the other hand, all false positives will also be present in the log.  If there are an unusually large number of false positives, this can be quite an annoyance to the person who has to review the log. However, it is important to use the IDS log to search for any possible threats. Most network security experts encourage administrators to look at the IDS log at least once a day.
  59. 59. Intrusion Detection System Maintenance When deploying an IDS, it is important to keep the signature database up to date. Depending upon the particular product, there are various ways to ensure that the NIDS has the latest signature files available.  The frequency of updates may vary from company to company.  Most commercial vendors offer a download of new signatures from the vendor Web site.
  60. 60. Intrusion Detection System Maintenance Others have automated updating features, though in some cases, the process of updating the signature database may mean the upgrade of the entire NIDS.  Open source NIDS, such as Snort, are very flexible concerning signature updates.  Often someone in the particular community of open source users can write a signature that is available to others in a short period of time.
  61. 61. Intrusion Detection System Console Most NIDS include a console that  provides various views and controls of the intrusion detection system. The interface of the console will vary greatly depending upon the IDS.  Most commercial NIDS include a GUI interface with several possible views of the network.  Other NIDS, such as Snort, have a command line interface.
  62. 62. Intrusion Detection System Console Additionally, some consoles may be accessed remotely, depending upon the product. Many consoles will have a hierarchical tree GUI interface. Some interfaces have the ability to sort attack  by type, attacker, or target host. These aspects should be considered, as some IDS consoles do not provide as many viewing options as others.
  63. 63. Intrusion Detection System Console An important question to consider is the communication  between the sensors and the central console. It is important that the communication, such as attack alarms, are delivered to the console and to other recipients  in a reliable, quick, and secure manner.
  64. 64. Intrusion Detection System Scalability Some NIDS will scale more efficiently than others. As a network grows, the traffic may be too much for the IDS to handle. For certain NIDS, this problem may be solved simply by deploying more sensors (or appliances) on the network, in order to keep up with the network load.  But this option is not suitable for a company or organization with less monetary resources.
  65. 65. Intrusion Detection System Scalability Other IDS vendors do not sell the console and sensors separately. Therefore as the network grows, an organization may have to change their IDS if the current one cannot scale.
  66. 66. Intrusion Detection System Redundancy Good redundancy for the IDS usually depends upon the amount of traffic on the network.  As the amount of traffic increases, some NIDS will be less effective in detecting certain threats due to the heavy load. This largely depends upon how the particular product is designed.  Netprowler, by Symantec/Axent, provides a unique approach to this concern.  Netprowler does not attempt to monitor all network traffic. ▪ Instead, it is configured to detect only certain attacks.
  67. 67. Intrusion Detection System Redundancy The configuration is determined by the types of machines sitting on a particular network, so that Netprowler listens for the most relevant threats for the network.  For other NIDS, redundancy may be very closely related to scaling concerns-as the network grows, traffic may be too overwhelming for the particular IDS. Therefore it is vital that an organization be fully aware of the size and constitution of its network, so that an effective IDS may be deployed to fit the unique needs of the particular network.
  68. 68. Introduction to Vulnerability Assessment |Vulnerability Assessment Preparation (SLA) |Penetration Assessment
  69. 69. Vulnerability Assessment Contents Introduction to Vulnerability Assessment Vulnerability Assessment Preparation (SLA) Penetration Assessment
  70. 70. Vulnerability Assessment A vulnerability assessment on an enterprise network can be a major undertaking, but its an important part of securing a network. Vulnerability assessment can be done by inside professionals (i.e. network administrators), but is usually outsourced to Managed Security Service Providers (MSSP).  Each MSSP provides different solutions, has a different background, and different areas of expertise.
  71. 71. Vulnerability Assessment Its crucial to select an MSSP that offers exactly what is needed. A couple of factors that determine what may be needed.  First, how much of the network to assess and which parts?  Second, what constitutes a vulnerability?
  72. 72. Vulnerability Assessment Determining what needs to be left vulnerable is as important as what needs to be locked-down. The only hacker-proof network is one thats been turned off, but obviously thats not the best business plan either. The level of network security decreases with every application that allows the network to be accessible. A balance must be struck between security and accessibility for customers, partners, and employees.
  73. 73. Vulnerability Assessment Though each MSSP offers different solutions, most offer some sort of Service Level Agreement (SLA). The SLA should cover at least these topics:  Security Management,  Monitoring,  Incident Response,  Response Time Escalation, and  Documentation.
  74. 74. Vulnerability Assessment Most agreements will allow for security tests  including detailed audits and penetration assessment and they should also detail their security processes  including authentication, access control, and auditing. Two major parts of the SLA deal with access to systems, and information and behavior during an attack.  The first part pertains to how much of a network the MSSP should assess and what parts are considered too confidential for outsiders.  Also, it is important to make sure partner and customer systems are not inadvertently scanned.
  75. 75. Vulnerability Assessment There are a few different ways to handle an attack and its important to fully understand the implications of each before committing to an MSSP. MSSPs will usually do one of three things:  post attack audit,  on-the-spot consultation, or  take full responsibility for real-time response. If the MSSP is monitoring, this is the time to decide whether they should take it upon themselves to deter a hacker or wait for instructions from an administrator or executive.
  76. 76. Vulnerability Assessment An important decision to make before a managed attack is deployed is determining from whom the network is being protected. Attacks can come from two places,  inside or  outside the company.
  77. 77. Vulnerability Assessment INSIDE THREATS  have the potential to be most damaging.  Because each employee requires access respective to his/her position, assessments must be done at each level of user. OUTSIDE ATTACK  or Zero Knowledge Attack  can be as damaging as well depending on the time and money the attacker has to spend, especially if the attacker thinks he/she can find something good.
  78. 78. Vulnerability Assessment A competitor may find it advantageous to spend many days or even months trying to gain access to compromising information.  An attack from an outside hacker, not a competitor, is usually not as prolonged due to lack of funds and interest.  If a hacker cannot easily gain access with the few tricks he knows, he is more likely to move on to an easier target than continue trying, especially if he doesnt expect much from the site. Properly identifying potential risks is necessary to those performing the penetration assessment.
  79. 79. Vulnerability Assessment The penetration assessment usually consists of four steps, climaxing at the fourth step, exploitation. 1) Discovery 2) Enumeration 3) Vulnerability 4) Exploitation
  80. 80. Vulnerability Assessment FOUR STEPS 1) DISCOVERY The first step, Discovery, will determine which networks and more specifically which IP addresses will be assessed. This information can be obtained from the Network Administrator or from the internet by accessing websites, whois databases, and usenet groups.
  81. 81. Vulnerability Assessment FOUR STEPS 2) ENUMERATION Enumeration, finding detailed information about a server, IP address, or system, is the second step in the assessment. The assessor will try to find User names, operating systems/versions as well as sharing permissions of the workstations.
  82. 82. Vulnerability Assessment FOUR STEPS 3) VULNERABILITY The third step is Vulnerability Mapping where the information that has been gathered thus far is compared to known vulnerabilities. This information is available on product sites, bug tracking sites, and CERTs site.
  83. 83. Vulnerability Assessment FOUR STEPS 4) EXPLOITATION The last phase is Exploitation. The map made in the previous step will be a foundation for attacking the systems vulnerabilities. A dictionary will be run to try to crack passwords.  If a password is cracked an account becomes available and the attack now comes from the inside. The assessor will also try to gain privileged access through vulnerabilities in operating systems or applications running on the server.
  84. 84.  http://www.gslis.utexas.edu/~netsec/overvi ew.html

×