Top Banner
PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a computer for Christmas. Frank [Legion of Doom] later was arrested for hacking into a phone system, threatening service through out the Southeast. http://neil.franklin.ch/Jokes_and_Fun/Computer_Quotes
31

PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

Dec 18, 2015

Download

Documents

Naomi Lawson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Quotable

“Maybe we should have given him a bicycle.”

--Ed Darden, of Atlanta, who gave his son Frank, 16 a computer for Christmas. Frank [Legion of Doom] later was arrested for hacking into a phone system, threatening service through out the Southeast.

http://neil.franklin.ch/Jokes_and_Fun/Computer_Quotes

Page 2: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Information Systems Security

MIS 320

Kraig Pencil

Summer 2014

Page 3: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

IS Security in the HeadlinesBusiness Week

Page 4: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Overview

• Introduction• Crimes• Players• Ways to cause trouble• Ways to enhance security

Page 5: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

A. IS Security - Introduction1. Networked age Good news/bad news

• Good news Easy, fast information sharing (supports linkages!!!)

• Bad news Easier for bad guys to get to your data

2. IS break-ins are common … and expensive• 2006 survey for Computer Security Institute/FBI

(www.gocsi.com)• 616 respondents• Virtually all reported some form of attack(s)• 52% of organizations reported “unauthorized use” of IS

in past year• Perpetrators of incidents:

• Crackers, disgruntled employees, competitors, foreign governments

Page 6: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

CERT: Reported IS VulnerabilitiesSecurity Vulnerabilities vs. Time

0

2,000

4,000

6,000

8,000

10,000

2000 2001 2002 2003 2004 2005 2006

Year

Vu

lner

abil

itie

s

Page 7: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Internet Crime Complaint Center (IC3)

2009 Report http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf

• Department of Justice up 22%• Median dollar loss on complaints: $575• Total dollar loss: $559,700,000.• Many crime categories, including: auction fraud, non-

delivery of merchangdise, credit card fraud, computer intrusions, spam, child pornography

Page 8: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

A. IS Security - Introduction

3. Published reports • Tip of the iceberg• Most break-ins are unreported to

law enforcement … or undetected– Companies are afraid that customers –

and potential intruders – know about problems

– CSI/FBI survey – 30% did not report their intrusions. Of these: – 48% are concerned with negative

publicity– 36% are concerned that competitors

will take advantage

Page 9: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

B. IS Security – Cyber Crimes1. What types of activities do the bad guys do?

• Viruses/worms (65% of survey group reported this problem)• e.g. “Macro” viruses (e.g., Love Bug), Worms (e.g., Slammer)

• Laptop/mobile theft (47%)• Steal information, Gain access to other systems

• Unauthorized access: Hacking and physical access (32%)• Change documents and files

– Steal $, modify credit ratings– e.g., Citibank robbery -- $11 million

• Steal information (e.g., classified info, info for identity theft)• Denial of service attacks (25%)• Phishing

• e.g., An “official” company e-mail used to gather personal information, passwords, SSN, etc.

Page 10: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Macro Virus Example: The Love Bug

Page 12: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Theft of unauthorized information: Identity Theft?Average identity theft victim

Spends 600 hrs and $16,000 to recover

(www.idtheftcenter.org)

Page 13: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Target:

EPen.co

m

Denial of Service AttackA hacker’s virus installs a program on many computers.

On command, they become zombies

They all ping* the “target” again and again –

The overload crowds out legitimate page requests, creating a Denial of Service to customers.

Yo!

Grrrrr!

Bon jour

Buenos días

Konnichiwa Gut’n Tag

Page 14: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Target:

EPen.co

m

Denial of Service AttackA hacker’s virus installs a program on many computers.

On command, they become zombies

They all ping* the “target” again and again –

The overload crowds out legitimate page requests, creating a Denial of Service to customers.

Yo!

Grrrrr!

Bon jour

Buenos días

Konnichiwa Gut’n Tag

Page 15: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Denial of Service AttackCloud Computing to the rescue???

Cloud services are usually “scalable” providers can instantly add more servers to handle the increased greetings from the zombie computers.

http://www.smartertechnology.com/c/a/Smarter-Strategies/3-Reasons-Clouds-Prevent-CyberAttacks/?kc=EWKNLSTE12232010BESTOF4

Yo!

Grrrrr!

Bon jour

Konnichiwa Gut’n Tag

Buenos días

Target:

EPen.co

m

Page 16: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Phishing Example

Page 17: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Phishing Example 2

Page 18: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Insiders

• You have to trust someone, but …– Insiders account for much of “lost” data

• “stolen credentials have become the most common way attackers gain access to enterprises. But the credentials were rarely stolen using sophisticated methods. Instead, malicious insiders were involved in 48% of cases -- a 26% increase vs. last year -- and in some cases, freely revealed their administrative passwords, enabling attackers easy access to sensitive data” (SearchSecurity.com: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html)

Page 19: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

C. IS Security – The PlayersHackers: people who break into computers and computer networks

1. White-hat hackers

… hobbyists who follow “hacker code”; curious, not malicious

… or professional consultants who find security holesin the client’s own systems: perform penetration tests and vulnerability assessments

2. Black-hat hackers // Crackers• Cyber vandals; cause trouble for fun• Commit premeditated cyber crime,

steal information, $$, etc.

Page 20: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

C. IS Security – The PlayersHackers: people who break into computers and computer networks

3. Hacktivist – Politically or socially motivated hacker– Site defacing– Denial-of-Service (DoS) attack

4. Cyberterrorist – deliberate, large-scale disruption of computer networks

Hacker Conventions• DEF CON

– World’s Largest

• Black Hat

Hacker Films• Wargames• Takedown

Page 21: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Well-known Cyber Crooks*

Kevin Mitnick

* http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Kevin Mitnick – superstar of hacking• Active 1980 – 1995 • Never profited or caused damage• 5 years in prison (8 months in solitary confinement)• “Social engineering” specialist: “no patch for stupidy”• Now a well-paid security consultant, speaker, writer

Page 22: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Well-known Cyber Crooks*

* http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Vladimir Levin – Russian • Transferred $10.7 million from Citibank accounts• Captured in London, transferred to US, convicted/sentenced to 3 years• Citibank managed to recover 95% of the funds

Adrian Lamo 2002-2004• Victims: Yahoo!, Citigroup, Cingular, NY Times• “Homeless hacker” was also helpful. Unauthorized penetration testing.

Voluntarily informed some victims of their security weaknesses.• Arrested/Convicted/Ordered to pay $65,000 to NY Times

 Robert Alan Soloway – the “Spam King” • 2008 47 months in federal prison, and $700,000 restitution• $7.8 million civil judgment awarded to Microsoft.

Others: Stephen Wozniak (blue boxes), Tim Berners-Lee (Oxford)

Adrian Lamo

Page 23: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

D. Examples of hacker tools/techniques

1. Password cracker programs• Example approaches: Use “reverse encryption”, Look for

“dictionary” words & common names

2. Sniffers• “Eavesdropping” program/device• Use to capture usernames and passwords for people doing

remote computer logins• Place program on node of Internet and “sniff” for usernames and

passwords

3. Social engineering• Hacker poses as a “good guy” and asks unsuspecting people for

information• Often done via phone

• E.g., “What kind of computer system are you using?”

Page 24: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

A Hacker Tool: “Password cracker” available on the Internet

Page 25: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

E. IS Security – Ways to address/combat security risks

1. Password management• Do not use dictionary words• Create new combinations of

letters and digits• Combine letters, numbers, special characters, and both

upper and lower casee.g., gaRDen+493

• Use mnemonic tricks to remember odd combinations letters of words in an expression – e.g., tbontbtitq (or even better: 2b*o02b*t1tq)

“To be or not to be, that is the question”• Change passwords frequently

Page 26: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

E. IS Security – Ways to address/combat security risks

2. Use firewalls• HW/SW that acts a buffer between a network and the rest of the

World• Can keep out … unauthorized traffic• Can keep in … corporate secrets

3. Encryption• Scramble a message/data so that others can not understand it

4. Advisory organizations• Post warnings and “patches” for reported security problems• e.g., Computer Emergency Response Team (CERT)

Image source: http://computer.howstuffworks.com/firewall.htm

Page 27: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

Vulnerability Alert from CERT

Page 28: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

E. IS Security – Ways to address/combat security risks

5. Security software• Antivirus software• Intrusion detection software

Page 29: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

E. IS Security – Ways to address/combat security risks

6. Hire a good hacker • Break into your system and/or provide advice• Help you identify security holes

U.S. HIRED HACKER TO DETECT DIGITAL SPYING BY EMPLOYEES

WASHINGTON, D.C. – In the cyber age, there are few things so damaging as a determined insider with the right passwords.

The Defense Department hired a former hacker to lead a research program to detect digital spying by employees. Peiter Zatko is in charge of Cyber

Insider Threat program at the Defense Advanced Research Projects Agency, or DARPA. “I’ve played both offense and defense.”

His program is years away from any deployable solutions. In the meantime, the WikiLeaks releases show that the Pentagon failed to take basic steps to

protect sensitive information, such as detecting and preventing unauthorized downloads.

MCCLATCHYNovember 30, 2010

Redacted by Kraig Pencil

Page 30: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

E. IS Security – Ways to address/combat security risks

6. Hire a good hacker

Kevin Mitnick – a busted hacker …

Emerges from prison and begins career as an IS Security consultant, writes a book

Page 31: PPT Slides by Dr. Craig Tyran & Kraig Pencil Quotable “Maybe we should have given him a bicycle.” --Ed Darden, of Atlanta, who gave his son Frank, 16 a.

PPT Slides by Dr. Craig Tyran & Kraig Pencil

A Parting Thought …

The most likely way for the world to be destroyed, most experts agree, is by accident. That’s where we come in; we’re computer professionals. We cause accidents.

 - Nathaniel Borenstein, co-creator of MIME