Top Banner
>> 0 >> 1 >> 2 >> 3 >> 4 >> Midterm Exam Review Information Systems 365 With Your Host Nicholas Davis
114

Midterm exam review information systems 365 with your host nicholas davis

Jan 16, 2015

Download

Technology

Nicholas Davis

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Midterm Exam ReviewInformation Systems 365

With Your HostNicholas Davis

Page 2: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

8

Page 3: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

7

Page 4: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

6

Page 5: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

5

Page 6: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

4

Page 7: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

3

Page 8: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 9: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 10: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

PICTURE

START

Page 11: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

The Basics

• Information Systems 365/765 midterm exam is this Thursday, October 23rd

• You may elect to take the exam on Tuesday, October 28th, by sending me an email prior to midnight on Wednesday, October 22nd

Page 12: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

The Format

• The format of the exam will be 50 multiple choice questions

• Some are easy• Some are hard• You may hate me once you see the exam• Multiple choices range A thru J in some

cases, with lots of “all of the above” and “none of the above” choices appearing

Page 13: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 14: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Keep the Five Pillars Of Information Security in Mind Throughout the Course

• Protection

• Detection

• Reaction

• Documentation

• Prevention

Page 15: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Benefits of Technical Controls

• Strong and consistent, treat everyone equally

• Can be audited with real assurance of the truthfulness of the data

Page 16: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Drawbacks of Technical Controls

• Costly

• Complex and time consuming

• When they break, they either fail open or fail closed, neither of which may be desirable

Page 17: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 18: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Administrative Controls

• Using policies, procedures, safety signs, training or supervision, or a combination of these, to control risk.

Page 19: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Benefits of Administrative Controls

• Usually inexpensive

• Easy to implement

• Very flexible

Page 20: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Drawbacks of Administrative Controls

• Difficult to enforce

• Difficult to audit

• Impossible to verify

• Easy to evade by a dedicated individual

Page 21: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Data Classification Levels

• Top Secret

• Highly Confidential

• Proprietary

• Internal Use Only

• Public Documents

• Terminology varies by organization

Page 22: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Authentication Defined“Electronic authentication provides a level of

assurance as to whether someone or something is who or what it claims to be in a digital environment. Thus, electronic authenticationplays a key role in the establishment of trust relationships for electronic commerce, electronic government and many other social interactions. It is also an essential component of any strategy to protect information systems and networks, financial data, personal information and other assets from unauthorised access or identity theft. Electronic authentication is therefore essential for establishing accountability online.”

Page 23: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Encryption

• Encryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key.

Page 24: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 25: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Single Factor vs. Multifactor vs Dual Factor

• Single Factor – Using one method to authenticate.

• Dual Factor – Using two different types of authentication mechanism to authenticate

• Multifactor – Using multiple forms of the same factor. (Password + identifying an image)

• Some people claim multi factor is just a way around industry regulations. Good test is to ask, could I memorize both of these?

Page 26: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

If You Choose to Use Passwords..

• Be as long as possible (never shorter than 6 characters). • Include mixed-case letters, if possible. • Include digits and punctuation marks, if possible. • Not be based on any personal information. • Not be based on any dictionary word, in any language. • Expire on a regular basis and may not be reused• May not contain any portion of your name, birthday,

address or other publicly available information

Page 27: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

One Time Password Devices Demystified

• Have an assigned serial number which relates to user-id. For example, ndavis = serial QB43

• Device generates a new password every 30 seconds

• Server on other end knows what to expect from serial QB43 at any point in time

Page 28: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

One Time Password Devices

• Time based• Event based• Sold by RSA, Vasco,

Verisign, Aladdin, Entrust and others

• How can event based OTPs be defeated?

Page 29: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Entrust Identity Guard Can Be Beaten With a Photocopier!

Page 30: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 31: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

One Time Passwords - Benefits

• Provides true Dual Factor authentication, making it very difficult to share

• Constantly changing password means it can’t be stolen, shoulder surfed or sniffed

• Coolness factor!

Page 32: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

One Time Passwords - Drawbacks

• Cost!• Rank very low on the

washability index• Uncomfortable• Expiration• Battery Life• Can be forgotten at

home• Video 1

Page 33: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Biometrics

• Use a unique part of your body to authenticate you, such as your voice pattern, your retina, or your fingerprint

Page 34: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Biometrics Benefits

• Harder to steal than even a One Time Password since it is part of the user, not simply in their possession like and OTP device

• Absolute uniqueness of authentication factor

• Coolness factor

Page 35: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Biometrics Drawbacks• Cost• Complexity of

Administration• Highly invasive• Not always reliable –

false negatives• Not foolproof• The Gummi Bear

thief!

Page 36: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Certificates• A digital passport, either

contained on a secure device, or on a hard disk

• Secured with a password, making them truly a dual factor solution

• Can be used to authenticate machines as well as humans

Page 37: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Certificate Benefits

• True Dual Factor Authentication

• Low variable cost to produce

• Can contain authorization data as well as authentication data

Page 38: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Certificate Drawbacks

• High fixed cost to build initial infrastructure

• Can be copied and shared if not properly stored

• Expiration

• Often require access to an interface such as a card reader of USB port, not always available at kiosks

Page 39: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Knowledge Based Authentication

• Authenticates the user via verification of life events, usually financial in nature, such as:

• Looks great at first!• However, most of this is public

information and that which isn’t public can be easily stolen

• The credit reports on which this knowledge based authentication is based are often contain factual errors

• Cost!

Page 40: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 41: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Steganography

• Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message

Page 42: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Encryption

• To encode information in such a way as to make it unreadable by anyone aside from its intended recipient

• Symmetric Encryption, where a single secret key is used for both encryption and decryption.

• Asymmetric Encryption, where a pair of keys is used -- one for Encryption and the other for Decryption.

Page 43: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Symmetric Encryption

• Simple substitution

C = 5

O = 1

W = 7

517 = COW• Shifting

Add two letters to each character (letter + 2)

AMU = COW (A + 2 = C, M + 2 = 0, etc)

Hmm, everything appears to = COW

Page 44: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Advantages and Disadvantages of Symmetric Encryption

• Easy to use• Decryption key can be memorized• Easy to determine patterns and guess

decryption key (frequency of letters in the English language)

• Anyone with the key can decrypt the message even if it was not intended for them

Page 45: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Asymmetric Encryption

• Uses one key to encrypt and a different key to decrypt

• Public key to encrypt

• Private key to decrypt

• Keys are related, but not the same

Page 46: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Advantages and Disadvantages of Asymmetric Encryption• Much stronger, more complex keys

than used in symmetric encryption• Only the intended recipient can

REALLY read the message since only they possess the private key

• Far more complex than symmetric encryption, requires larger infrastructure to manage

• If private key is lost, you are out of luck

Page 47: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Certificates Do a Couple of Things

•Authentication

•Digital signing

•Encryption

Page 48: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 49: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Public and Private Keys

The digital certificate has two parts, aPUBLIC key and a PRIVATE keyThe Public Key is distributed toeveryoneThe Private Key is held very closelyAnd NEVER sharedPublic Key is used for encryption andverification of a digital signaturePrivate Key is used for Digital signing anddecryption

Page 50: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Public Key Cryptography

Page 51: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Getting Someone’s Public Key

The Public Key must be shared to beUsefulIt can be included as part of yourEmail signatureIt can be looked up in an LDAPDirectoryCan you think of the advantages anddisadvantages of each method?

Page 52: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What is PKI?

• PKI is an acronym for Public Key Infrastructure

• It is the system which manages and controls the lifecycle of digital certificates

• The PKI has many features

Page 53: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What Is In a PKI?

• Credentialing of individuals

• Generating certificates

• Distributing certificates

• Keeping copies of certificates

• Reissuing certificates

• Revoking Certificates

Page 54: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Keeping Copies – Key Escrow• Benefit –

Available in case of emergency

• Drawback – Can be stolen

• Compromise is the best!

• Use Audit Trails, separation of duties and good accounting controls for key escrow

Page 55: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Certificate Renewal

• Just like your passport, digital certificates expire• This is for the safety of the organization and

those who do business with it• Short lifetime – more assurance of validity but a

pain to renew• Long lifetime – less assurance of validity, but

easier to manage• Use a Certificate Revocation List if you are

unsure of certificate validity

Page 56: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Trusted Root Authorities

• A certificate issuer recognized by all computers around the globe

• Root certificates are stored in the computer’s central certificate store

• Requires a stringent audit and a lot of money!

Page 57: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

It Is All About Trust

Page 58: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Signing of Email

• Proves that the email came from you• Invalidates plausible denial• Proves through a checksum that the

contents of the email were not altered while in transit

• Provides a mechanism to distribute your public key

• Does NOT prove when you sent the email

Page 59: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Social Engineering Defined

• The use of psychological tricks in order to get useful information about a system

• Using psychological tricks to build inappropriate trust relationships with insiders

Page 60: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 61: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Kevin Mitnick

• World’s most famous Social Engineer

• “The weakest link in the security chain is the human element”

• Half of his exploits involved using social engineering

• See the master in action!

Page 62: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Social Engineering• Social Engineering goes back to

the first lie ever told and will continue into the future.

• Social Engineering is successful because people are generally helpful, especially to those who are:

• Nice

• Knowledgeable

• Insistent

Page 63: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Three Primary Methods of Social Engineering

• Flattery

• Authority Impersonation

• Threatening Behavior

Page 64: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

How to Keep Social Engineering From Working

• Administrators need to:

• Establish Policies

• Train Employees

• Run Drills

• Office Workers:

• Need to be aware of Social Engineering tactics

• Follow policies

Page 65: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Road Apples• Road Apples are also known as

Baiting• Uses physical media and relies on the

curiosity or greed of the victim• USB drives or CDs found in the

parking lot, with label: 3M Executive Salaries

• Autorun on inserted media

Page 66: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Forensics• Defined: Pertains to legal

evidence found in computers and digital storage mediums.

• Goal: To explain the current state of a “digital artifact.”

• A digital artifact is a computer system, storage media (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network.

Page 67: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Digital Forensics

• Can be as simple as retrieving a single piece of data

• Can be as complex as piecing together a trail of many digital artifacts

Page 68: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Why Use Digital Forensics?

• In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).

Page 69: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Why Use Digital Forensics?

• To recover data in the event of a hardware or software failure.

• To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.

Page 70: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Why Use Digital Forensics?

• To gather evidence against an employee that an organization wishes to terminate.

• To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.

Page 71: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Chain of Custody• “Chain of Custody” is a

fancy way of saying “The ability to demonstrate who has had access to the digital information being used as evidence”

• Special measures should be taken when conducting a forensic investigation if it is desired for the results to be used in a court of law.

Page 72: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Chain of Custody• One of the most important measures is to

assure that the evidence has been accurately collected and that there is a clear chain of custody from the scene of the crime to the investigator---and ultimately to the court.

Page 73: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

5 Steps in Performing Digital Forensics• Preparation (of

the investigator, not the data)

• Collection (the data)

• Examination

• Analysis

• Reporting

Page 74: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

A Great Tool Which YOU Can Impress People With

• Knoppix

• An OS which runs directly from a CD

• Will not alter data on hard disk

• Great for grabbing copies of files from a hard disk!

• Can be loaded from a USB flash drive

Page 75: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Knoppix• Can also scan RAM and Registry

information to show recently accessed web-based email sites and the login/password combination used. Additionally these tools can also yield login/password for recently access local email applications including MS Outlook.

Page 76: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Knoppix

Page 77: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 78: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What does an IDS Detect?

• Attacks against a specific service, such as File Transfer Protocol (FTP)

• Data driven attacks at the application layer. For example, SQL injection error could be used to crash an application.

Page 79: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What Does and IDS Detect?

• Host Based Attacks (privilege escalation)

• Malware, Viruses, Trojan Horses, Worms

Page 80: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

IDS Components• Sensors - Generate security

events such as log files• Console – Monitors events, alerts

and controls sensors• Engine – Analyzes the data using

artificial intelligence to generate alerts from the events received

• 3 in 1 (sometimes all three are in one appliance)

Page 81: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Sensor, Looks Boring

Page 82: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Types of Intrusion Detection Systems

• Network Based Intrusion Detection System (NDS)

• Protocol Based Intrusion Detection System (PIDS)

• Application Protocol Based Intrusion Detection System (APIDS)

• Host Based Intrusion Detection System (HIDS)

• Hybrid System

Page 83: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

How Is A Firewall Different from and IDS?• Firewalls look outwardly and

protect from external attacks• An IDS evaluates a suspected

intrusion once it has taken place and signals an alarm.

• An IDS also watches for attacks that originate from within a system.

Page 84: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What is a Denial of Service Attack Anyway?

Page 85: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Unified Threat Management (UTM)

• Next generation devices

• Firewall

• Virus Scanning

• Content Filtering

• VPN

• Anti-Spam

• Intrusion Detection and Prevention

Page 86: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Regulations• Knowing regulations is impressive to

employers, I’m not sure why…

• GLB, SOX and HIPAA all require similar things

• Authentication

• Auditing

• Protection

• Data Integrity Proof

• 80% 20% rule!!!

Page 87: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Full Disclosure

• Disclose all the details of a security problem which are known. It is a philosophy of security management completely opposed to the idea of security through obscurity

Page 88: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Full Disclosure

• The theory behind full disclosure is that releasing vulnerability information immediately results in quicker fixes and better security.

• Fixes are produced faster because vendors and authors are forced to respond in order to save face.

• Security is improved because the window of exposure, the amount of time the vulnerability is open to attack, is reduced.

Page 89: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Responsible Disclosure • Some believe that in the absence

of any public exploits for the problem, full and public disclosure should be preceded by disclosure of the vulnerability to the vendors or authors of the system. This private advance disclosure allows the vendor time to produce a fix or workaround.

Page 90: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 91: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Limited Disclosure • With full details going to a

restricted community of developers and vendors, and only the existence of the problem being released to the public, is another possible approach

• Nick doesn’t like Limited Disclosure

Page 92: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Buffer Overflow • A condition where a

process attempts to store data beyond the boundaries of a fixed-length buffer.

• The result is that the extra data overwrites adjacent memory locations.

Page 93: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Buffer Overflow• The overwritten data may include other

buffers, variables and program flow data, and may result in erratic program behavior, a memory access exception, program termination (a crash), incorrect results or ― especially if deliberately caused by a malicious user ― a possible breach of system security.

Page 94: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Basic example • In the following example, a program has

defined two data items which are adjacent in memory: an 8-byte-long string buffer, A, and a two-byte integer, B. Initially, A contains nothing but zero bytes, and B contains the number 3. Characters are one byte wide.

A B

0 0 0 0 0 0 0 0 0 3

Page 95: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Buffer Overflow Example

• Now, the program attempts to store the character string "excessive" in the A buffer, followed by a zero byte to mark the end of the string. By not checking the length of the string, it overwrites the value of B:

A B

'e' 'x' 'c' 'e' 's' 's' 'i' 'v' 'e' 0

Page 96: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SQL Injection • User input is either incorrectly filtered

for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is in fact an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.

Page 97: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SQL Injection Humor

Page 98: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Email Injection• A security vulnerability that can

occur in Internet applications that are used to send e-mail messages. Like SQL injection attacks, this vulnerability is one of a general class of vulnerabilities that occur when one programming language is embedded within another.

Page 99: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 100: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…

Page 101: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Directory Traversal• The goal of this attack is to order an

application to access a computer file that is not intended to be accessible. This attack exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code.

• Directory traversal is also known as the ../ (dot dot slash) attack, directory climbing, and backtracking.

Page 102: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Cross-Site Scripting • (XSS) is a type of computer security

vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy.

Page 103: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Time-of-check-to-time-of-use

• TOCTTOU − pronounced "TOCK too") is a software bug caused by changes in a system between the checking of a condition (such as a security credential) and the use of the results of that check. It is a kind of race condition.

Page 104: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Confused Deputy

• A confused deputy is a computer program that is innocently fooled by some other party into misusing its authority. It is a specific type of privilege escalation. In information security, the confused deputy problem is often cited as an example of why capability-based security is important.

• Billing example

Page 105: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Blaming The Victim

• Prompting a user to make a security decision without giving the user enough information to answer it.

Page 106: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Physical Security • Physical security

describes measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guardposts.

Page 107: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

3 Elements to Physical Security

• Obstacles, to frustrate trivial attackers and delay serious ones;

• Alarms, security lighting, security guard patrols or closed-circuit television cameras, to make it likely that attacks will be noticed; and

• Security response, to repel, catch or frustrate attackers when an attack is detected.

Page 108: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

4 Layers to Physical Security

• Environmental design

• Mechanical and electronic access control

• Intrusion detection

• Video monitoring

Page 109: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

What Are Physical Security Goals?

• The goal is to convince potential attackers that the likely costs of attack exceed the value of making the attack.

• If you are unable to convince them, then the second goal comes into play—to keep them from entering

Page 110: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Layer One - Physical• The initial layer of security for a campus,

building, office, or physical space uses Crime Prevention Through Environmental Design to deter threats. Some of the most common examples are also the most basic - barbed wire, warning signs and fencing, concrete bollards, metal barriers, vehicle height-restrictors, site lighting and trenches.

Page 111: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Layer Two - Mechanical• Includes gates, doors, and locks. • Key control of the locks becomes a problem

with large user populations and any user turnover.

• Keys quickly become unmanageable forcing the adoption of electronic access control.

• Electronic access control easily manages large user populations, controlling for user lifecycles times, dates, and individual access points.

• For example a user's access rights could allow access from 0700 to 1900 Monday through Friday and expires in 90 days.

Page 112: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Layer Three – Intrusion Detection

• Monitors for attacks. It is less a preventative measure and more of a response measure, although some would argue that it is a deterrent. Intrusion detection has a high incidence of false alarms. In many jurisdictions, law enforcement will not respond to alarms from intrusion detection systems.

Page 113: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Layer Four - Monitoring• Typically video monitoring systems. Like

intrusion detection, these are not much of a deterrent.

• Video monitoring systems are more useful for incident verification and historical analysis.

• For instance, if alarms are being generated and there is a camera in place, the camera could be viewed to verify the alarms.

• In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed.

• Monitoring is ALWAYS active

Page 114: Midterm exam review information systems 365 with your host nicholas davis

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• Have you done the readings?

• It might be a good idea…