22
1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey reported security breaches in the last 12 months. Information Week estimates the annual cost of security losses worldwide at $1.6 trillion. It means more than preventing a hacker from breaking into your computer, it also includes being able to recover from temporary service problems, or from natural disasters (Figure 1).

1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

  • View
    219

  • Download
    2

Embed Size (px)

Citation preview

Page 1: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

1

Introduction

• Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey reported security breaches in the last 12 months.

• Information Week estimates the annual cost of security losses worldwide at $1.6 trillion.

• It means more than preventing a hacker from breaking into your computer, it also includes being able to recover from temporary service problems, or from natural disasters (Figure 1).

Page 2: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

2Figure 1 Threats to Network Security

Page 3: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

3

Types of Security Threats

• Disruptions are the loss or reduction in network service.

• Some disruptions may also be caused by or result in the destruction of data.

• Natural (or manmade) disasters may occur that destroy host computers or large sections of the network.

• Unauthorized access is often viewed as hackers gaining access to organizational data files and resources. However, most unauthorized access incidents involve employees.

Page 4: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

4

Security Problems Are Growing

• The Computer Emergency Response Team (CERT) at Carnegie Mellon University was established with USDoD support in 1988 after a computer virus shut down 10% of the computers on the Internet (Figure 2).

• In 1989, CERT responded to 137 incidents.• In 2000, CERT responded to 21,756 incidents.• By this count, security incidents are growing at a

rate of 100% per year. • Breaking into a computer in the U.S. is now a

federal crime.

Page 5: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

5

Figure 2 Number of Incidents Reported to CERT

Source: CERT Statistics, www.cert.org/stats/cert_stats.html

Page 6: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

6

Network Controls

• Developing a secure network means developing mechanisms that reduce or eliminate the threats to network security, called controls.

• There are three types of controls:– Preventative controls - mitigate or stop a person from

acting or an event from occurring (e.g. passwords).

– Detective controls - reveal or discover unwanted events (e.g., auditing software).

– Corrective controls - rectify an unwanted event or a trespass (e.g., reinitiating a network circuit).

Page 7: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

7

Network Controls

• It is not enough to just establish a series of controls; personnel need to be designated as responsible for network control and security.

• This includes developing controls, ensuring that they are operating effectively, and updating or replacing controls.

• Controls must also be periodically reviewed to: – ensure that the control is still present

(verification)– determine if the control is working as specified

(testing)

Page 8: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

8

Risk Assessment

• Risk assessment is the process of making a network more secure, by comparing each security threat with the control designed to reduce it.

• One way to do this is by developing a control spreadsheet (Figure 3).

• Network assets are listed down the side.• Threats are listed across the top of the spreadsheet.• The cells of the spreadsheet list the controls that

are currently in use to address each threat.

Page 9: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

9

Threats 

Assets (with Priority)

Disruption, Destruction, DisasterFire Flood Power Circuit Virus

Loss Failure

Unauthorized AccessExternal Internal Eavesdrop

Intruder Intruder

(92) Mail Server    

(90) Web Server    

(90) DNS Server    

(50) Computers on 6th floor    

(50) 6th floor LAN circuits    

(80) Building A Backbone    

(70) Router in Building A    

(30) Network Software    

(100) Client Database    

(100) Financial Database    

(70) Network Technical staff    

 

Figure 3 Sample control spreadsheet with some assets and threats

Page 10: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

10

Network Assets (Figure 4)

• Network assets are the network components including hardware, software and data files.

• The value of an asset is not simply its replacement cost, it also includes personnel time to replace the asset along with lost revenue due to the absence of the asset.

• For example, lost sales because a web server is down.

• Mission critical applications are also important assets. These are programs on an information system critical to business operations.

Page 11: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

11

 

Hardware     Servers, such as mail servers, web servers, DNS servers, DHCP servers, and LAN file servers    Client computers    Devices such as hubs, switches, and routers

Circuits       Locally operated circuits such as LANs and backbones        Contracted circuits such as MAN and WAN circuits        Internet access circuits

Network Software         Server operating systems and system settings        Applications software such as mail server and web server software

Client Software         Operating systems and system settings        Application software such as word processors

Organizational Data

        Databases with organizational records

Mission critical applications

    For example, for an Internet bank, the Web site is mission critical

 Figure 4 Types of Assets

Page 12: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

12

Security Threats

• A network security threat is any potentially adverse occurrence that can harm or interrupt the systems using the network, or cause a monetary loss to an organization.

• Once the threats are identified they are then ranked according to their occurrence.

• Figure 5 summarizes the most common threats to security.

• For example, the average cost to clean up a virus that slips through a security system and infects an average number of computers is £70,000/virus.

Page 13: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

13Figure 5 Common Security Threats

Page 14: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

14

Identifying and Documenting Controls

• Once the specific network threats and controls have been identified, you can begin working on the network controls.

• Each network component should be considered along with the specific threats to it.

• Controls to address those threats are then listed in terms of how each control will prevent, detect and/or correct that threat.

Page 15: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

15

Threats Assets (w/ priority)

Disruption, Destruction, DisasterFire Flood Power Circuit Virus Loss Failure

Unauthorized AccessExternal Internal EavesdropIntruder Intruder

(92) Mail Server 1,2 1,3 4 5, 6 7, 8 9, 10, 11 9, 10

(90) Web Server 1,2 1,3 4 5, 6 7, 8 9, 10, 11 9, 10

(90) DNS Server 1,2 1,3 4 5, 6 7, 8 9, 10, 11 9, 10

(50) Computers on 6th floor 1,2 1,3 7, 8 10, 11 10

(50) 6th floor LAN circuits 1,2 1,3  

(80) Building A Backbone 1,2 1,3 6  

(70) Router in Building A 1,2 1,3 9 9

(30) Network Software 7, 8 9, 10, 11 9, 10

(100) Client Database 7, 8 9, 10, 11 9, 10

(100) Financial Database 7, 8 9, 10, 11 9, 10

(70) Network Technical staff 1 1  

Figure 6 Sample control spreadsheet listing assets, threats, and controls

Page 16: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

16

Figure 6 (cont.) Sample control spreadsheet list of controls  

Controls1. Disaster Recovery Plan2. Halon fire system in server room. Sprinklers in rest of building3. Not on or below ground level4. Uninterruptible Power Supply (UPS) on all major network servers5. Contract guarantees from inter-exchange carriers6. Extra backbone fiber cable laid in different conduits 7. Virus checking software present on the network8. Extensive user training on viruses and reminders in monthly newsletter9. Strong password software10. Extensive user training on password security and reminders in

monthly newsletter11. Application Layer firewall

Page 17: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

17

Evaluate the Network’s Security

• The last step in designing a control spreadsheet is evaluating the adequacy of the controls and the degree of risk associated with each threat.

• Based on this, priorities can be decided on for dealing with threats to network security.

• The assessment can be done by the network manager, but it is better done by a team of experts chosen for their in-depth knowledge about the network and environment being reviewed.

Page 18: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

18

Controlling Disruption, Destruction and Disaster

Page 19: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

19

Preventing Disruption, Destruction and Disaster

• Preventing disruptions, destructions and disasters mean addressing a variety of threats including:– Creating network redundancy– “Preventing” natural disasters– Preventing theft– Preventing computer virus attacks– Preventing denial-of-service attacks

Page 20: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

20

Network Redundancy

• The key to in preventing or reducing disruption, destruction and disaster - is redundancy.

• Examples of components that provide redundancy include:– Uninterruptible power supplies (UPS)– Fault-tolerant servers– Disk mirroring– Disk duplexing

• Redundancy can be built into other network components as well.

Page 21: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

21

Preventing Natural Disasters

• Disasters are different from disruptions since the entire site can be destroyed.

• The best solution is to have a completely redundant network that duplicates every network component, but in a different location.

• Generally speaking, preventing disasters is difficult. The most fundamental principle is to decentralize the network resources.

• Other steps depend on the type of disaster to be prevented.

Page 22: 1 Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey

22

Preventing Theft

• Equipment theft can also be a problem if precautions against it are not taken.

• Industry sources indicate that about $1 billion is lost each year to theft of computers and related equipment.

• For this reason, security plans should include an evaluation of ways to prevent equipment theft.