Top Banner
Host Based Security John Scrimsher, CISSP [email protected]
31

Host Based Security

Jan 27, 2016

Download

Documents

orsen

Host Based Security. John Scrimsher, CISSP [email protected]. Pre-Quiz. Name Do you own a computer? What Brand? Email address City of Birth Have you ever had a computer virus?. Why Host Based Security?. Perimeter Security vs. Host Based. 66% $. 34% $$$. Why Host Based Security?. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Host Based Security

Host Based SecurityJohn Scrimsher, CISSP

[email protected]

Page 2: Host Based Security

Pre-Quiz

Name Do you own a computer? What

Brand? Email address City of Birth Have you ever had a computer

virus?

Page 3: Host Based Security

Why Host Based Security? Perimeter Security vs. Host

Based66%

$34%

$$$

Page 4: Host Based Security

Why Host Based Security? Protect the Data Malware Internal Threats

Employee Theft Unpatched systems

Page 5: Host Based Security

What is Malware?

Anything that you would not want deliberately installed on your computer.

Viruses Worms Trojans Spyware More……

Page 6: Host Based Security

Where are the threats? Un-patched Computers Email Network File Shares Internet Downloads Social Engineering Blended Threats Hoaxes / Chain Letters

The Common Factor

Page 7: Host Based Security

Phishing

Email messages sent to large distribution lists.

Disguised as legitimate businesses

Steal personal information

Page 8: Host Based Security

Phishing

Link goes to dllbat.com

Page 9: Host Based Security

Identity Theft

Since viruses can be used to steal personal data, that data can be used to steal your identity

Phishing Keystroke loggers Trojans Spyware

Page 10: Host Based Security

Legal Issues

Many countries are still developing laws

Privacy Laws can prevent some investigation

Page 11: Host Based Security

Kaspersky Quote"It's hard to imagine a more ridiculous situation: a handful of virus writers are playing unpunished with the Internet, and not one member of the Internet community can take decisive action to stop this lawlessness.The problem is that the current architecture of the Internet is completely inconsistent with information security. The Internet community needs to accept mandatory user identification - something similar to driving licenses or passports.We must have effective methods for identifying and prosecuting cyber criminals or we may end up losing the Internet as a viable resource."

Eugene KasperskyHead of Antivirus Research

Page 12: Host Based Security

Notable Legal History Robert Morris Jr. - “WANK” worm. First

internet worm ever created, set loose by accident across the internet.

Randal Schwartz - hacked into Intel claiming he was trying to point out weaknesses in their security.

David Smith - Melissa. First known use of mass-mailing technique used in a malicious manner. Some jail time.

“OnTheFly”, The Netherlands - “Anna” virus using worm generator tool. The writer was a youth who was “remorseful” but little was done to punish him.

Philippines - “Loveletter”. No jail time because there were no laws.

Jeffrey Lee Parsons – 2005 – 18 months in prison for variant of Blaster worm.

Page 13: Host Based Security

Regulatory Issues

Sarbanes Oxley Act (2002) Graham-Leach-Bliley Act (1999) Health Information Portability

and Accountability Act (1996) Electronic Communications

Privacy Act (1986)

Page 14: Host Based Security

What is Management’s role? Management ties everything

together Responsibility Ownership

TechnologyInfrastructure

Organization

Management

Security is a Mindset, not a service. It must be a part of all decisions and implementations.

Page 15: Host Based Security

Now, what do we do about it? C.I.A. Security Model

Confidentiality Integrity Availability

Current Solutions Antivirus / AntiSpyware Personal Firewall / IDS / IPS User Education

Page 16: Host Based Security

How do you find new threats?

Honeypots Sensors (anomaly

detection) User suspicion

Page 17: Host Based Security

Things to look for…User Suspicion Unusually high number of

network connections (netstat –a) CPU Utilization Unexpected modifications to

registry RUN section. Higher than normal disk activity Spoofed E-Mail

Page 18: Host Based Security

How do these products Help?Honeypots Capture sample of suspicious

code / activity Forensic Analysis Behavior tracking Related Technologies

Honey Net Dark Net

Page 19: Host Based Security

How do these products help?Sensors Host Firewall / IPS blocks many

unknown and known threats Alarm system

Page 20: Host Based Security

How do these products help?Sensors Antivirus

Captures Threats that use common access methods Web Downloads Email Application Attacks

(Buffer Overflow)

VBSim demo

Page 21: Host Based Security

Detection and Prevention Technologies Antivirus

Signature based Heuristics based

Host Firewall hIDS / hIPS

Signature based Anomaly based

Whitelist Blacklist

Page 22: Host Based Security

Social Engineering

… 70 percent of those asked said they would reveal their computer passwords for a …

Schrage, Michael. 2005. Retrieved from http://www.technologyreview.com/articles/05/03/issue/review_password.asp?p=1

Bar of chocolate

Page 23: Host Based Security

Educated Users HelpThe biggest threat to the security of a company is not a computer virus, an unpatched hole in a key program or a badly installed firewall. In fact, the biggest threat could be you. What I found personally to be true was that it's easier to manipulate people rather than technology. Most of the time organizations overlook that human element.

Mitnick, Kevin, “How to Hack People.” BBC NewsOnline, October 14, 2002.

Page 24: Host Based Security

How do these products help?

User Education

Don’t open suspicious email

Don’t download software from untrusted sites.

Patch

Page 25: Host Based Security

On the Horizon - Microsoft House on the

hill Targeted

because they are Big?

Insecure because they are Big?

Page 26: Host Based Security

On the Horizon

Early Detection and Preventative Tools Virus Throttle Active CounterMeasures Principle of Least Authority (PoLA) WAVE Anomaly Detection Viral Patching

Page 27: Host Based Security

On the Horizon

Viral Targets Mobile Phones, PDAs Embedded Operating Systems

Automobiles Sewing Machines Bank Machines Kitchen Appliances

Page 28: Host Based Security

On the Horizon

Octopus worms Multiple components working

together Warhol Worms

MSBlaster was proof of capability

Page 29: Host Based Security

Learn Learn Learn

Authors: Sarah Gordon Peter Szor Roger Grimes Kris Kaspersky Search your library or online

Page 30: Host Based Security

Questions?

Page 31: Host Based Security

Resources http://www.pcworld.com/news/article/0,aid,116163,0

0.asp http://www.detnews.com/2003/technology/0309/03/

technology-258376.htm http://www.sans.org/rr/whitepapers/engineering/1232

.php http://www.research.ibm.com/antivirus/SciPapers/

Gordon/Avenger.html