36
Internet Security Past, Present, and the Future Ehsan Foroughi M.Sc., CISSP, CISM

Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Embed Size (px)

Citation preview

Page 1: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Internet SecurityPast, Present, and the Future

Ehsan ForoughiM.Sc., CISSP, CISM

Page 2: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Information Security Triad (CIA)

Availability

Con

fiden

tial

ity Integrity

Page 3: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Confidentiality Integrity Availability Authenticity Non-repudiation

Security Concepts

Ref: Wikipedia

Page 4: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Cyber Security in Canada

Page 5: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Cybercrime costs businesses in US $8.9 B in 2012 – increase of %38 from 2010

On average security breaches◦ Take 24 days to spot◦ Take 40 days to clean◦ Take $592,000 to clean up per incident◦ Increase of %42 in cleanup cost from 2011

In a study of 56 organizations:◦ $8.9M in cyber security/crime cost per

organization per year◦ Security tools lowered cost by $1.6M

Cost of Cyber Crime

Page 6: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Cost of Cyber Crime

Average Cost of Cyber Security Attacks Per Second By Industry

Ref: Enlight Research

Page 7: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Targeted Attacks

Ref: HP Ponemon Report

Page 8: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

TJX Companies: 94 Million CC exposed (2006)

Conficker Worm Botnet: Affected 15M systems at its peak. (2008)

Heartland Payment Systems: 134 Million CC data lost (2008)

Stuxnet attack on Iran Nuclear Plants: Damage Cost ?? (2010)

Sony network breach of 77 M accounts, cost $171 M (2011)

Incidents

Page 9: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

44%

30%

19%

5% 2%

Biggest hit to businesses

Lost InformationBusiness DisruptionLost RevenueEquipment DamageOther

Cost of Cyber Crime

Ref: Businessweek

Page 10: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Infrastructure Security (Network / Internet Security)

Application Security Physical Security (Environmental Security) Operational and Process Security Cryptography e-Forensics Governance & Compliance Business Continuity and Disaster Recovery

Planning (BCP / DRP)

Subject Areas in Cyber Security

Page 11: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Internet Security Threats

Vulnerability(Weakness)

Insecure Design /

Architecture

Software Bugs

(Errors)

Spoofing / Phishing

Malware

Denial of Service

Page 12: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

int main() { char buffer[4]; int some_variable = 1; ... strcpy("Test", &buffer);

Software Bugs: Buffer Overflow

T e s t \0

Page 13: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

def Withdraw(user, value):balance = AccountBalance(user)if balance < value:

Exit(Error)balance = balance – valueAccountBalance(user) = balancePayOut(value) Exit(Ok)

Software Bugs: Race Condition

Page 14: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

def Withdraw(user, value):balance = AccountBalance(user)if balance < value:

Exit(Error)balance = balance – valueAccountBalance(user) = balancePayOut(value) Exit(Ok)

Software Bugs: Race Condition

$90 $90

$100 $10

$10

Page 15: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

def Withdraw(user, value):balance = AccountBalance(user)if balance < value:

Exit(Error)balance = balance – valueAccountBalance(user) = balancePayOut(value) Exit(Ok)

Software Bugs: Race Condition

$90 $90

$100 $100

$10 $10

Page 16: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

def Withdraw(user, value):balance = AccountBalance(user)if balance < value:

Exit(Error)balance = balance – valueAccountBalance(user) = balancePayOut(value) Exit(Ok)

Software Bugs: Race Condition

$90 $90

$100 $100

$10 $10

2003 Blackout

Page 17: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Trojan Horses Viruses Worms Rootkits Botnets Spyware

Malware

Page 18: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Sending Spam Email

Stealing Passwords and Information

Using Resources

Malware: Goals

Page 19: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Email

USB Disk

Shared Network Drives

Pop-ups and download links

Insecure Network

Malware: Transfer Mediums

Page 20: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Distributed Denial of Service Attack Grudge factor Oct 2012 attack on banks by Izzad-Dinal-

Qassam Hackers◦ CapitalOne◦ HSBC◦ SunTrust

Anonymous group crippled Visa, MasterCard, PayPal over WikiLeaks

Denial of Service

Page 21: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

import smtplibfrom email import MIMETexts = smtplib.SMTP('localhost')msg = MIMEText.MIMEText('Hello from Microsoft.')msg['Subject'] = 'This is a test'msg['From'] = '[email protected]'msg['To'] = '[email protected]'ret = s.sendmail(msg['From'], [msg['To']],

msg.as_string())s.close()

Spoofing Example: Email

Page 22: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Let’s Rethink Email Security

Page 23: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Email Security

Page 24: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

NPIBOEFT

Security Tools: Cryptography

Page 25: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

NPIBOEFT

Security Tools: Cryptography

N P I B O E F T

Page 26: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

NPIBOEFT

Security Tools: Cryptography

N

M

P

O

I

H

B

A

O

N

E

D

F

E

T

S

Page 27: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Confidentiality Integrity Authenticity

Cryptography

Alice Bob

Charlie

Page 28: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Symmetric Key Cryptography Shared Secret Encryption Only Usages:

◦ Password Protected Zip Files◦ WEP-Shared (WiFi)◦ SSL / HTTPS

01011001

11001101

10010100

11001101

01011001

A -> B

Page 29: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Public Key Cryptography

Ref: Wikipedia

Page 30: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Public Key Cryptography Encryption

Authenticity (Signing)

Usages:◦ Email Validation (PGP)◦ Authentication / Login◦ Banking

Page 31: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Antivirus replacement: Microsoft Malicious Software Removal Tools

Malware Removal: Malware-bytes Browsers:

◦ Use Chrome ◦ Stay away from Internet Explorer

Email Security: Web-mails such as Gmail Password Management: PasswordSafe,

LastPass, etc

Tools for Personal Security

Page 32: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Payment Card Industry Data Security Standard (PCI-DSS)◦ Liability!

Privacy Laws: Canada Privacy Act 1983 ISO 27001: Information Security

Management Systems

Compliance

Page 33: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Innternational Information Systems Security Certification Consortium - (ISC)²

Non-profit (since 1989) Focused on IT Security 90,000 Members Certified Information Systems Security

Professional (CISSP) Certified Secure Software Lifecycle

Professional (CSSLP) CISSP: US DoD and NSA requirement

Associations - (ISC)2

Page 34: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Information Systems Audit and Control Association (previously)

Non-profit (since 1967) Focused on IT Governance and Audit 95,000 Members Certified Information Systems Auditor (CISA) Certified Information Security Manager

(CISM) Continuing Education Point system, called

CPE

Associations - ISACA

Page 35: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Open Web Application Security Project (OWASP)

Non-profit Open source Focused on Securing Web

Associations – OWASP

Page 36: Ehsan Foroughi M.Sc., CISSP, CISM. Availability Confidentiality Integrity

Questions?