Introduction To Cybersecurity - Jayhawk SFS

1y ago
13 Views
2 Downloads
1.72 MB
44 Pages
Last View : 15d ago
Last Download : 3m ago
Upload by : Ryan Jay
Transcription

Introduction to Cybersecurity- 2017 GenCyber CampBo LuoAssociate ProfessorDirector, Information Assurance Lab, ITTCThe University of Kansas, Lawrence, KS, USAbluo@ku.edu; http://www.ittc.ku.edu/ bluo

What Does Secure Mean? Wild West vs. Today then not so hard to rob bank, big payoff now pretty hard. payoff? today we use checks, credit cards Why the difference? bank, large institution security well-studied they have more secure: procedures infrastructure lots of practice Today’s computers, nets like wild west How about IoT devices?

Evolution of CarsMechanicalElectro-Mechanical3

IoT Security: What’s Different?IsolatedConnected4

IoT Security: What’s Different? More convenience and safety Safety? Security?Adaptive Cruise ControlCollisionAvoidanceParkingAssistTPMS5

Automobile Example Modern cars have many computer systems Do they need security? False assumptions: the code is too complex for troublemakers the more complex, the more difficult to make secure why would anyone want to hack them? disable alarms, unlock doors, tracking just because they can6

Automobile Example The Tesla Hack @ Black Hat 2016 & 2017 Keen Security Lab: turn on the brakes remotely and gettingthe doors and trunk to open and close while blinking thelights in time to music streamed from the car's radio onTesla Model X. “the work was complex and not easily replicated” The Jeep Hack @ Black Hat 2015 & 2016 Remotely stop a car and disable its brake. Plug into the car's electronic system to hijack its steeringand brake systems The TPMS “Hack” Tire Pressure Monitoring System (TPMS) signal sentwirelessly Easily eavesdropped, with unique identifier7

Objectives of the camp Understand the basic principles and problems ofcomputer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data security and privacy OS security Software security Network security Cybersecurity practice Hands-on labs OS and network hardening Cyber Defense Competition8

First Principles of Cybersecurity The first principles of security are the foundationupon which security mechanisms are reliably built;and security policies can be reliably implemented. Study the principles Use them to examine the design of real-worldsecurity mechanisms

First Principles of Cybersecurity

What’s Valuable? Important to protect what’s valuable Bank example: Protect money well Forget to protect the customer information Now: Regulations for Financial Institutions and CustomerInformation What is valuable in a computer/information system?11

Easiest Penetration Intruder will use any means of penetration. Site or method of penetration May not be most obvious Not necessarily where the strongest defenses are e.g., don’t install strong lock but not hinge Yes, intruders are (always) able to find the easiestpenetration!12

Valuable Components Computer’s “valuable components” hardware software data Any can be targeted Could be mixed Attacking from hardware, targeting at data13

Threat vs. Vulnerability Vulnerability: security weakness that might beexploited to cause undesired consequences Threat: a set of circumstances that potentially causeloss or harm. Attack: the exploitation of vulnerabilities by threats. Example: Water is the threat, Crack is vulnerability14

Controls A control is a protective measure A threat is blocked by a control of a vulnerability15

MOM For a successful attack, attacker must have: Method skills, knowledge, tools to pull off the attack Opportunity time and access Motive Control? Eliminate one of them 16

Meaning of Computer Security Security should provide: confidentiality integrity availability (implies timely availability) The CIA notion Other factors? Authentication Authorization Non-Repudiation Privacy17

Vulnerabilities Consider three types: hardware software data18

Hardware Vulnerabilities Often easiest to defend against Examples: adding/removing/changing devices pull the plug spill soda reboot with boot disk to use machine for attack, mount HDs, etc.19

“Backhoe” vulnerability? When company digs, registers with locality utilities in dig zone spray paint what’s buried item not marked, or digger doesn’t contact locality? Backhoe cutting fiberoptic cable most common cause of telecom outages Publicly available information Single cuts can cause widespread outages Telecoms reluctant to lay redundant cable Legitimate threat?20

Forget hoes. what about anchors? 2/2008. Two undersea cuts to SeaMeWe4 South East Asia–Middle East–Western Europe 4 Optical fiber submarine communications cable21

Forget hoes. what about anchors? 2/2008. Two undersea cuts to SeaMeWe4 South East Asia–Middle East–Western Europe 4 Optical fiber submarine communications cable Major disruptions in Middle East, S. Asia Egypt 70% lost capacity Both cuts just off coast of Alexandria Redundant cable. Geographic diversity?22

Personal hardware? Implanted medical devices, e.g. vulnerable defibrillator with wireless access BYOD Connect your own phone/laptop to the corporate WiFi? Receive emails on your personal tablet?23

Software Vulnerabilities Breaking software Modify to do something different Delete software Software theft Can use configuration management to avoidsoftware modification attacks. Need a root of trust 24

Vulnerability Window Vulnerability “life cycle” Born (in software, hardware) Discovered, not yet patched (0-day) May be known to the public Patched Most vulnerable before they are patched 0-days are valuable Black market Software vendors give rewards25

Data Vulnerabilities Data can be understood by lay people e.g. SSN, address, name don’t need: physical access (as in HW vulnerabilities) computer skills (as in SW vulnerabilities) Can be very valuable e.g. private company info. Can be damaging if modified e.g. air traffic control, patient drug allergies26

How Long Are Data Valuable? Might only be valuable for short time e.g. Oscar winners, movie Trading Places Principle of Adequate Protection Items must be protected only until they lose value Must be protected to degree consistent with value27

Adversaries – Computer Criminals Script kiddies download tools don’t understand them Amateurs Average user who stumbles upon vulnerability Crackers Hack for the challenge Career criminals hack for personal profit Users with skills design, implement tools28

Market for Stolen Data Black/gray market Bank accounts Credit card numbers SSN User information Accounts, passwords, etc.29

The economy of computer crime30

Methods of Defense Prevent - close vulnerability Deter - make attack more difficult Deflect - make another target attractive Detect - know when attack occurs Recover - mitigate attack’s effects31

Controls in Computer Security Encryption Software controls Hardware controls System design Policies and procedures Physical controls32

Controls: Encryption Important part of security But many more things in the picture Bellovin survey of CERT vulnerabilities Much more about encryption later33

Controls: Software Internal program controls part of program enforces security restrictions e.g., access ctrl in DBMS OS, network controls same for OS, nets protect OS, net from users protect users from each other34

Controls: Software Independent control programs – e.g., password checkers, IDS, antivirus Development controls quality standards used during: design coding testing maintenance35

Controls: Hardware Examples smart cards locks, cables user identification devices firewalls IDS circuit boards that control access to storage media36

Controls: Policies & Procedures i.e., “human” policies and procedures Very important, often overlooked Examples: Proper use of passwords (password policies) What not to write in email What not to say over the phone What not to say to strangers (or let overheard) Probes for stock insider info, HIPAA, etc. Documents to shred or not37

Controls: Physical Examples: guards locks backups (including off site) etc.38

Controls: Design Security by design Separation Secure zone Fault-tolerant: distrust inputs and other components Proper use of technology Defense in depth (layered protection)39

Domain Separation Good fences make good neighbors Different domains need to be separated In computer networks In computer systems Hardware OS Software applications Internet of Things (CPS)

Domain Separation Domain is a generic termTake a computer system as an example: Threads at different security levels need to access the sameglobal state insecure Partition threads into separate domains: Supervisor vs. User each domain has its own storage (sandbox) operating system code runs in supervisor domain and usercode runs in user domains

Defense in Depth What if the control mechanism fail? Defense in Depth (Castle Approach) Originated from a military concept Layered control mechanisms Distributed defense Redundancy in defense42

Defense in Depth What if the control mechanism fail? Defense in Depth (Castle Approach) Originated from a military concept Multiple layers of computer security, each one having to beconquered before moving to the next For all aspects: physical, hardware, software, policies,personnel, etc. Example: anti-spam Example: firewalls and IDS43

Principle of Weakest Link Security is no stronger than the weakest link Weakest link can be: Firewall’s power supply OS that a security app runs over Human who: plans implements or administers controls44

computer security Security Management: Risks, Policies, and Ethics First principles of cyber security Introduction to cryptography Data security and privacy OS security Software security Network security Cybersecurity practice Hands-on labs OS and network hardening Cyber Defense Competition 8

Related Documents:

BUSINESS PLAN 0 . Jayhawk Windustries 1 1 Executive Summary . and School of Business at the University of Kansas. Jayhawk Windustries 2 2 Business Overview 2.1 Mission . Gasoline Generator Jayhawk Windustries Power (w) 1200 400 Average Fuel Consumption (gallons/hr) 0.29 0

Design Guide Steel Building Solutions 4 Kingframe SFS 5 Design Guide Kingframe SFS Design Guide Steel Building Solutions Steel Building Introduction Introduction SFS is a lightweight cold-rolled galvanised steel

Brownie Cybersecurity Explore cybersecurity by earning these three badges! Badge 1: Cybersecurity Basics Badge 2: Cybersecurity Safeguards Badge 3: Cybersecurity Investigator This Cybersecurity badge booklet for girls provides the badge requirements, background information, and fun facts about cybersecurity for all three Brownie

Mar 01, 2018 · ISO 27799-2008 7.11 ISO/IEC 27002:2005 14.1.2 ISO/IEC 27002:2013 17.1.1 MARS-E v2 PM-8 NIST Cybersecurity Framework ID.BE-2 NIST Cybersecurity Framework ID.BE-4 NIST Cybersecurity Framework ID.RA-3 NIST Cybersecurity Framework ID.RA-4 NIST Cybersecurity Framework ID.RA-5 NIST Cybersecurity Framework ID.RM-3 NIST SP 800-53

CSCC Domains and Structure Main Domains and Subdomains Figure (1) below shows the main domains and subdomains of CSCC. Appendix (A) shows relationship between the CSCC and ECC. Cybersecurity Risk Management 1-1 Cybersecurity Strategy 1-2 1- Cybersecurity Governance Periodical Cybersecurity Review and Audit 1-4 Cybersecurity in Information Technology

The KU Human Resource Management Club Members are Seeking Internship Opportunities in Human Resources If you have internships available contact Annette Delaney, College Relations Chair, Jayhawk Chapter of SHRM adelaney@ku.edu 785-864-2152

May 01, 2019 · Corp.) in Salina, Kan., the long and leggy Jayhawk is a clutch-driven creature that stumps almost every onlooker. Measuring 12 feet wide, 30 feet long and 12 feet high with an 80-inch rear axle, the Jayhawk has a "head" (or "sweep") originally used to lift hay into bins or

recession, weak pound; increase in adventure tourism 3 Understand roles and responsibilities of organisations responsible for the management of UK rural areas Roles and responsibilities: eg promotion of rural pursuits, giving information, offering advice, providing revenue channels, enforcement, protecting the environment, protecting wildlife, educating Types of organisation: eg Natural .