32
User Account Security
So,two informaticians
walk into a bar...
The bouncer says,
"What's the password."
One says, "Password?"
The bouncer lets them
in.
Credits: @RossMartin & AMIA (2012)
35
Alice
Simplified Attack Scenarios
ServerBob
- Physical access to client computer
- Electronic access (password)
- Tricking user into doing something
(malware, phishing & social
engineering)
Eve/Mallory
36.
36
Alice
Simplified Attack Scenarios
ServerBob
- Intercepting (eavesdropping or
“sniffing”) data in transit
- Modifying data (“Man-in-the-middle”
attacks)
- “Replay” attacks
Eve/Mallory
37.
37
Alice
Simplified Attack Scenarios
ServerBob
- Unauthorized access to servers through
- Physical means
- User accounts & privileges
- Attacks through software vulnerabilities
- Attacks using protocol weaknesses
- DoS / DDoS attacks Eve/Mallory
39
Alice
Safeguarding Against Attacks
ServerBob
Administrative Security
- Security & privacy policy
- Governance of security risk management & response
- Uniform enforcement of policy & monitoring
- Disaster recovery planning (DRP) & Business continuity
planning/management (BCP/BCM)
- Legal obligations, requirements & disclaimers
40.
40
Alice
Safeguarding Against Attacks
ServerBob
Physical Security
- Protecting physical access of clients & servers
- Locks & chains, locked rooms, security cameras
- Mobile device security
- Secure storage & secure disposition of storage devices
41.
41
Alice
Safeguarding Against Attacks
ServerBob
User Security
- User account management
- Strong p/w policy (length, complexity, expiry, no meaning)
- Principle of Least Privilege
- “Clear desk, clear screen policy”
- Audit trails
- Education, awareness building & policy enforcement
- Alerts & education about phishing & social engineering
42.
42
Alice
Safeguarding Against Attacks
ServerBob
System Security
- Antivirus, antispyware, personal firewall, intrusion
detection/prevention system (IDS/IPS), log files, monitoring
- Updates, patches, fixes of operating system vulnerabilities &
application vulnerabilities
- Redundancy (avoid “Single Point of Failure”)
- Honeypots
43.
43
Alice
Safeguarding Against Attacks
ServerBob
Software Security
- Software (clients & servers) that is secure by design
- Software testing against failures, bugs, invalid inputs,
performance issues & attacks
- Updates to patch vulnerabilities
44.
44
Alice
Safeguarding Against Attacks
ServerBob
Network Security
- Access control (physical & electronic) to network devices
- Use of secure network protocols if possible
- Data encryption during transit if possible
- Bandwidth monitoring & control
45.
45
Alice
Safeguarding Against Attacks
ServerBob
Database Security
- Access control to databases & storage devices
- Encryption of data stored in databases if necessary
- Secure destruction of data after use
- Access control to queries/reports
- Security features of database management systems (DBMS)
47
สรุป
• Defense inDepth
– Antivirus, Firewall, IPS, Network Segmentation
– Remove Unnecessary Services
– Patch (Consider using WSUS in organizations)
– Use Licensed OS, Get Out of Windows XP/2003
– Data Backup & System Redundancy
– Secure User Account Management
– User Awareness