Top Banner
Data Security Presenter Muhammad Ghazanfar Ullah Head, Computer Systems Engineering. Usman Institute of Technology
51
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data+security+sp10

Data SecurityPresenterMuhammad Ghazanfar UllahHead, Computer Systems Engineering.Usman Institute of Technology

Page 2: Data+security+sp10

Agenda of Presentation

About Data Security Security Measures Policies and Principles Technology and Threats

Page 3: Data+security+sp10

Security

Page 4: Data+security+sp10

Security

For some, it is just a concept; its about peace of mind and reassurance. It's about knowing that there is something you can rely on, something that you can turn to when there is a problem. Having a feeling of security brings you a sense of confidence and security for the future.

For others, security means protection against something or someone. It provides a defence for people and property; safeguarding a precious investment or something that is cherished.

Page 5: Data+security+sp10

Data

Page 6: Data+security+sp10

Data

While carrying out an investigation about 'ourselves', a child writes 'brown' under the heading 'hair color', this is data about that child. This data becomes information when it is used to inform in some way, for example, when the data is combined with the heading and presented as a statement - 'Jane has brown hair'.

Data can take many forms. It might be numerical data of room temperatures, words relating to a particular subject such as flowers, or sounds or images collected to illustrate a presentation. It could even be imaginary data created by children, about characters in their drama, for example.

Page 7: Data+security+sp10

Computers and Data

Page 8: Data+security+sp10

Information

Most Valuable Resource

Five main Resources Personnel Material Machines

(including facilities and energy)

Money Information (and data)

PhysicalPhysical

ConceptualConceptual}

}

Page 9: Data+security+sp10

Computers and Data

Many large organizations use computers to store important data (information). Large companies, government departments, colleges and hospitals all keep important information, for example, employee records and wages, patient or student records and accounts.

Why?

1. Efficiency2. Accuracy3. Capacity4. Sharing and Transmission etc.

Page 10: Data+security+sp10

Computers and Data

2002 2003 2004

North America 212.6 222.8 234.4

Latin America 25.6 32.6 43.7

Europe 163.5 195.5 224.8

Africa/ME 9.2 10.7 11.5

Asia/Pacific 151.2 203.6 238.1

Total 562.3 665.4 752.6

Computer Users

Page 11: Data+security+sp10

Computers and Data

Page 12: Data+security+sp10

Computers and Data

The proliferation of computers.2-3 w/LAN per household is not unusual.

The geographical expansion of networks.44 million plus hosts 650,000 plus Web sites800 Million plus Internet users by the end of 2008.

The dramatic rise in computer literacy.The dependence of organizations upon the infrastructure.

ECommerce is expected to be between 8 and 13 Trillion dollars by 2008.

The dependence of organizations upon Information.

How Did We Get Here?

Page 13: Data+security+sp10

Computers and Data

Sensitive Information

Sensitive information is any information stored on your computer that you would hate to have fall into the wrong hands. This could be personal information, employee information, trade secrets, etc. It is the ramifications that are the concern.

Page 14: Data+security+sp10

Is your Information Sensitive?1. What would happen if your competitor had a copy of a

spreadsheet file containing your short and long term sales strategy?

2. What would happen if personnel records became public knowledge within your organization?

3. What would happen if your customer database was copied and sold? Does it contain information that you are ultimately liable for?

4. What would happen if someone made copies of your archived personal email messages? Could they somehow use this against you?

5. What could a resourceful private detective and a cunning lawyer do with information on your computer?

Computers and Data

Page 15: Data+security+sp10

Data Security

Page 16: Data+security+sp10

Data SecurityThere are two problems with keeping this information on computers. The first problem is information can be lost through technical or human error.

The second problem is that some information is confidential - only certain people should see it. These people can be described as ‘authorized users’ and the people who shouldn’t see this information as ‘unauthorized users’.

Page 17: Data+security+sp10

Security Services

1. Secrecy

2. Integrity

3. Availability

4. Authenticity

5. Non-repudiation

6. Access control

Page 18: Data+security+sp10

Secrecy (Confidentiality)

Secrecy requires that the information in a computer system only be accessible for reading by authorized parties.

This type of access includes: Printing Displaying Other forms of disclosure, including simply revealing

the existing of an object

Page 19: Data+security+sp10

Integrity Integrity requires that the computer system asset can

be modified only by authorized parties. Modification includes:

Writing Changing Changing status Deleting and Creating

Page 20: Data+security+sp10

Availability

Availability requires that computer system assets are available to authorized parties.

Availability is a requirement intended to assure that systems work promptly and service is not denied to authorized users.

Page 21: Data+security+sp10

Security of Data

Data

Confidentiality

Data

Integrity

Data

Availability

Secure Data

Data

Page 22: Data+security+sp10

Authenticity Authenticity means that parties in a information services

can ascertain the identity of parties trying to access information services.

Also means that the origin of the message is certain. Therefore two types:

Principal Authentication Message Authentication

Page 23: Data+security+sp10

Non-Repudiation

Originator of communications can’t deny it later. Without non-repudiation you could place an order for 1

million dollars of equipment online and then simply deny it later.

Or you could send an email inviting a friend to the dinner and then disclaim it later.

Non-repudiation associates the identity of the originator with the transaction in a non-deniable way.

Page 24: Data+security+sp10

Access Control

Unauthorized users are kept out of the system. Unauthorized users are kept out of places on the

system/disk. Typically makes use of Directories or Access Control

Lists (ACLs) or Access Control Matrix Objects: Resources that need to be protected Subjects: Entities that need access to resources Rights: Permissions Each entry is a triple <subject, object, rights>

Page 25: Data+security+sp10

The Threats to Security

Page 26: Data+security+sp10

Types Natural Events and Accidents

Blunders, Errors and Omissions

Insiders

Recreational Hackers

Criminal Activity

Industrial Espionage

Terrorism

National Intelligence

Information Warfare

Page 27: Data+security+sp10

Typical Threats

NATURAL DISASTERSFiresEarthquakesHurricanesTornadoesFloods

PEOPLEHackersCriminalsInsiders

ACCIDENTSPower SwitchWater PipesAir ConditioningAir HumiditySparks

Page 28: Data+security+sp10

Insiders

Managers. Contractors. Business Partners. Former Employees. Present Employees. Disgruntled Employees. System Administrators. Network Administrators.

Page 29: Data+security+sp10

Outsiders

Hackers.Virus Writers.Criminals.

Corporate Espionage.Identity Theft.Internet Fraud.

Terrorist.Foreign Intelligence Services.Foreign Military (Information Warfare).

Page 30: Data+security+sp10

The Attacks

Page 31: Data+security+sp10

Attack

Attack is a danger which could affect the security (confidentiality, integrity, availability) of assets, leading to a potential loss or damage.

Interruption Interception Modification Fabrication

Page 32: Data+security+sp10

Types of Attacks

Page 33: Data+security+sp10

Quiz????

Modification is the Attack on which Service? Fabrication is the attack on which service

Page 34: Data+security+sp10

Classification of attacks

Computer Security attacks can be classified into two broad categories: Passive Attacks can only observe communications or

data. Active Attacks can actively modify communications or

data. Often difficult to perform, but very powerful. Examples include

Mail forgery/modificationTCP/IP spoofing/session hijacking

Page 35: Data+security+sp10
Page 36: Data+security+sp10

The Technology

Page 37: Data+security+sp10

A Security Model

Firewalls and Security Gateways are based on this model

Page 38: Data+security+sp10

Encryption

Page 39: Data+security+sp10

Encryption

Encryption can be used to provide Confidentiality, Integrity, Authentication and Non-Repudiation.

There are four major cryptographic functions you should be familiar with:

Page 40: Data+security+sp10

Symmetric Cryptography

The first is Symmetric Cryptography uses the same key for both encryption and decryption. Examples are:

1. Data Encryption Standard (DES) (56 bits)2. Triple DES (3DES) 112 bits)3. International Data Encryption Algorithm (IDEA) 128 bits).4. Rivest Cipher (RC4) variable length key).5. Advanced Encryption Standard (AES-Rjindahl)(variable Key

length)

Page 41: Data+security+sp10

Encryption Contd. The second is Asymmetric Cryptography which uses two Keys, a Public and a Private key. One key is used for encrypting/signing while the other is used for decrypting/verifying. Examples are:

Diffie - Hellman. Rivest, Shamir and Adleman (RSA). Digital Signature Algorithm (DSA/El Gamal). Elliptic Curve Cryptosystem (ECC).

These are trapdoor one-way functions that are easy to compute in one direction but very difficult to compute in the other.

They are much slower than symmetric algorithms and are not practical for encrypting/decrypting large amounts of data.

They are normally used for exchanging session keys (Private Keys) for symmetric algorithms

Page 42: Data+security+sp10

Encryption Contd The third is Hash Functions which are used to condense a variable length messages in a fixed-length code. This code is called a Hash or Message Digest (MD). Examples are:

Message Digest (MD5) (128 bits)

Secure Hash Algorithm (SH-1) (160 bits)

Haval (variable length)

Hashs are cryptographic checksums used to provide integrity checks on messages or files.

They are one-way functions and its is not mathematically feasible to create the original message(at least not yet).

A Digital Signature is created by computing the Hash then encrypting the hash with the sender's Private Key.

Page 43: Data+security+sp10

Encryption Contd.

The fourth is Public Key Certificates which provide a means of distributing Public Keys.

These public keys are used to support Authentication, Integrity and Confidentiality for such functions as Web transactions, Email and IPSec.

Public Key Infrastructure (PKI) provides a means for

Generating keys,

Signing Certificates (Certificate Authority (CA)) and establishing

Certificate Revocation (Certificate Revocation Lists (CRL))

Page 44: Data+security+sp10

Encryption Issues

Cryptanalysis Attacks

Brute Force Attack (Keyspace Search).

Known Plaintext.

Linear/Differential Analysis.

Weak Protocols (man in the Middle Attack).

Surrounding System

Encryption does not provide perimeter security.

Encryption Contd.

Recommendation: Employ a perimeter defense with encryption.

Page 45: Data+security+sp10

Security Policies

Page 46: Data+security+sp10

Policy Goals

Goal 1 - To define the organization's expectation with regard to the proper use of computers and networks

Goal 2 - To define how the organization will respond to a security incident.

The policy must conform to existing policies, rules, regulations and laws.

The policy should be developed by both technical and management personnel

A policy must be both implementable and enforceable.The policy must ensure that everyone knows their responsibility for maintaining security.

Prevention is the key to security.

Page 47: Data+security+sp10

Security Policy Philosophy There are four basic security philosophies around which an

organization can construct a security policy. Paranoid: Nothing is allowed(no external connections) - The organization has

been hacked and its paranoid. Cautious: That which is not explicitly permitted is not allowed. The default

policy is to deny. Optimistic: That which is not explicitly prohibited is allowed. The default

policy is to allow. Open: Everything is allowed. This organization has not been hacked.

NOTE: Instructor's recommendation: BE CAUTIOUS. The correct philosophy will depend upon the organization. The

following criteria should be employed in establishing your policy. Risks - How much Risk is management willing to accept? Cost - How much money is management willing to expend based upon the

risks? Operations - What is the proper balance between risk, cost and operations? Culture - What is your organization's value system with regard to personal

communications? Legal - What are your legal requirements to customers, employees, state,

etc.?

Page 48: Data+security+sp10

Security Policy Philosophy Contd. Organizational Security policies, standards, guidelines and

procedures must be driven by senior management. Senior management must believe in the value of security. Senior management must support security through their actions. Senior management must conform to the same rules and regulations. Users must believe that security has the support of senior management.

Organizational security policies should be designed to support Information.

Proprietary informationCustomer information.DatabasesElectronic Mail.All electronic or paper information.

Risk can be reduced but never eliminated.No matter how much time and effort you spend to secure your computer or

network, it can always be broken into. Given enough time, resources, money and motivation any system can

be had.

Page 49: Data+security+sp10

Policy Thoughts

The following are decisions that determines an organization's security posture.

Who is allowed to use the resources? What is the proper use of those resources?What is being protected?Why is it being protected?Who has responsibility for protecting these resources?What are the rights and responsibilities of the users? The System Administrator? The Network Manager?

Who/How is the organization to interpret and resolve security conflicts?

Page 50: Data+security+sp10

Policy Thoughts

Policy

Standards

Guidelines

Rules

Philosophy of protection

Goals of protection

Task to Accomplish Goal

To implement Tasks in Firewalls/IDS

Level 1

Level 2

Level 3

Level 4

Page 51: Data+security+sp10

Thankyou!