32
Security policy and its implementation 1 WUCM1

Security policy and its implementation

  • Upload
    duman

  • View
    23

  • Download
    1

Embed Size (px)

DESCRIPTION

Security policy and its implementation. Introduction. What is security? . Security broadly means three things: Confidentiality - information is not made accessible to people who are not authorised to see it - PowerPoint PPT Presentation

Citation preview

Page 1: Security policy and its implementation

Security policy and its implementation

1WUCM1

Page 2: Security policy and its implementation

INTRODUCTION

WUCM1 2

Page 3: Security policy and its implementation

What is security?

• Security broadly means three things: – Confidentiality - information is not made

accessible to people who are not authorised to see it

– Integrity - information is protected from unauthorised modification and that it is complete and can be relied upon

– Availability - information is available when you need it

WUCM1 3

Page 4: Security policy and its implementation

Security aspects

• Non-technical (e.g. physical) threats:– Fire– Flood, etc.– Staff absence– Not really a part of this unit, but …

• Not all security threats are malicious or intentional

• More information is lost by accident than stolen

WUCM1 4

Page 5: Security policy and its implementation

Risk assessment

• Identify threats• For each threat, determine/estimate:– Probability of occurrence– Cost of event: value of data, lost business– Cost of prevention and/or recovery

• Where predicted loss is greater than predicted cost, you need to do something about it

WUCM1 5

Page 6: Security policy and its implementation

Types of threat

• Illustration:– Alec is providing information for Bert– Charlie is someone who shouldn't have access to that

information• Interception – unauthorised access• Denial of service• Impersonation • Hijack• Repudiation

WUCM1 6

Page 7: Security policy and its implementation

Malicious code

• Often a part of a security threat• Type of malicious code– Viruses– Worms– Trojan horses– Back doors

WUCM1 7

Page 8: Security policy and its implementation

WEB EXAMPLES

WUCM1 8

Page 9: Security policy and its implementation

Web specific examples 1

• Web content with malicious intent, e.g.– Sexygirls.com, (Tiwana, 1999)– Download a custom "web viewer" that dials a long

distance ISP and connects – and displays images– Phone bill at the end of the month difficult to

contest• Example of virus and Trojan downloads

WUCM1 9

Page 10: Security policy and its implementation

Web specific examples 2

• IP or website spoofing– machine-machine trust violated– spoofed site usually to gather data:• credit card details• personal address or contact details

• Usually a close mock-up of the real website, e.g. for e-commerce

WUCM1 10

Page 11: Security policy and its implementation

Web specific examples 3

• Denial of service, e.g.– DDoS attacks on Microsoft, Amazon, E-Bay, etc.– Attacks on Estonian systems 2007– Timed assault launched by a virus

• JavaScript security problems, e.g.– "Freilburg Attack"– Uses a 1x1 pixel wide invisible frame– JavaScript to scan PC and upload files– What files would be targeted?

WUCM1 11

Page 12: Security policy and its implementation

SECURITY POLICIES

WUCM1 12

Page 13: Security policy and its implementation

Security policy 1• Identify in appropriate detail:

– Protected items:• What needs protection? • What type of protection does each item need?

– Authorisation:• Who needs authorisation? • What types of authorisation are needed?• Who authorises such access? • Normally based on roles, e.g.:

– General public– General employee of organisation – Employee with specific function - e.g. managerial – Updater – System administrator

WUCM1 13

Page 14: Security policy and its implementation

Security policy 2

• Implementation of access control:– How to implement access control? – What monitoring of accesses is going to be done? – Who is going to refer to the logs?

• Management of changes:– How are new users to be added and old ones

deleted? – How are new items to be protected?

WUCM1 14

Page 15: Security policy and its implementation

Security policy 3• How are complaints and requests about the server

and page content to be handled? • How and when should the policy itself be updated? • How should the organisation react to security issues? • Who is allowed to speak to members of the press,

police, etc. in the event of questions or an incident?• How much information about a successful

penetration should be made public?

WUCM1 15

Page 16: Security policy and its implementation

WUCM1 16

Policy architecture

• Security policy issues often split:– Privacy policy

• e.g. http://privacy.yahoo.com/– Acceptable use policy

• e.g. http://www.ja.net/company/policies/janet-aup.html– Site security policy

• e.g. http://www.auscert.org.au/render.html?it=2256– Web access policy

• Probably redundant for outgoing access

Page 17: Security policy and its implementation

Implementation

• Costs of implementing security:– Need to be analysed– Compared with the predicted costs of not doing

anything• Business decision:

What security to implement?= What is cost-effective?

• Need a formal backup and recovery procedure to support security

WUCM1 17

Page 18: Security policy and its implementation

After intrusion 1

• Ascertain cause– Pre-requisite for recovery action– Do we know how the attackers got in?– Were we let down by someone else's failing or our

own mistakes?• Assess damage– How do you know what they accessed/changed?

WUCM1 18

Page 19: Security policy and its implementation

After intrusion 2

• Plan recovery– Do you have a pre-prepared plan to implement?– What do you need to do to get your systems

running normally again?– What do you need to do to

reassure/appease/reimburse your customers/users?

• Plan avoidance of repeat– What do we need to do to prevent it happening

again?

WUCM1 19

Page 20: Security policy and its implementation

PROTECTION

WUCM1 20

Page 21: Security policy and its implementation

Types of protection

• Security is always a trade off against convenience

• There are four broad areas of concern:– Physical security– Operating system and platform security– Network security– User security and user awareness

WUCM1 21

Page 22: Security policy and its implementation

Physical security

• Threat: with physical access to the computer, an attacker could:– Switch if off (pull the

plug)– Physically destroy data

(e.g. by applying hammer to disk)

– Gain privileged access via a console

– Introduce new software

• Response:– access controls– locks and keys– keep under observation

WUCM1 22

Page 23: Security policy and its implementation

Platform security

• Threats:– Bugs in software– Known back doors– Unused/unnecessary

features– Accidental misuse

• Responses:– Monitor security alerts– Install patches– Make someone

responsible for this– Harden your operating

system:• Only mount essential

components.• Document need and

protection in security policy

WUCM1 23

Page 24: Security policy and its implementation

Network security

• Threats:– Unauthorised access– Misuse by authorised

people– Excessive access– Denial of service

• Responses:– Firewalls, to filter the

packets that are permitted to reach the web server

– Network address translation schemes, to hide the internal network addresses

– Use of proxy servers to filter and moderate requests

– Security self tests (white hat intrusion)

WUCM1 24

Page 25: Security policy and its implementation

User security• Threats:

– Many users are just too trusting– Social engineering ("phishing") can

push users to willingly break known safety rules, e.g.• "There is a problem with your

account. Please change your password to NowSafe and await further instructions..."

• "There is a problem with your account and we are unable to bill your credit card. Please enter your credit card number and expiry date in the spaces below and click the SUBMIT button."

• AOL reminder on every page about passwords

– Smooth-tongued callers

• Responses:– Well-defined company

policies– Educate users on risks– Train users in good

practice• Role-play training

helpful in establishing good employee habits

– Monitor users

WUCM1 25

Page 26: Security policy and its implementation

CONFIGURING SECURITY

WUCM1 26

Page 27: Security policy and its implementation

Server configuration

• A web server can be set up to restrict access to its site(s)

• Restrictions can be applied to part of the site (called a "realm")

• There are two types of restriction:– Restrict access by identified users or groups of users– Restrict access by identified host or group of hosts

• Restrictions can be mixed– but be aware of errors hidden in complex solutions

WUCM1 27

Page 28: Security policy and its implementation

Access by user

1. If the server receives request for a restricted URL, it sends back to the browser a challenge (stating the realm)

2. The browser invites its user to enter a username and password for the realm

3. Browser resubmits request with the credentials, i.e. username/password

4. Server checks – if OK, serve page; if not, back to step 2 or fail "unauthorised"

WUCM1 28

Page 29: Security policy and its implementation

User authentication

• Two forms of authentication:– Basic – username and password in clear text – not

good unless hidden in a SSL transaction– Digest – uses an MD5 cryptographic checksum and

a random “nonce” value• Browsers normally retain username and

password for reuse when other challenges come from the same realm

WUCM1 29

Page 30: Security policy and its implementation

Access by host

• Access restrictions by host can be specified by: – IP address (e.g. 204.255.230.13) – Domain name (e.g. port.ac.uk)

• Partial addresses/domains be used:– e.g. 204.255. can be used to specify a restriction

to all hosts whose IP address starts with 204.255. – e.g. ac.uk would specify a restriction for all hosts

from an academic UK domain

WUCM1 30

Page 31: Security policy and its implementation

Cautions

• Browsers cache credentials– In memory for the session– On disc if so configured

WUCM1 31

Page 32: Security policy and its implementation

WUCM1 32

More information

• Apache documentation– http://httpd.apache.org/docs/

• Apache security tutorials – http://httpd.apache.org/docs/2.2/howto/auth.html

• The Computer Emergency Response Team (CERT) – http://www.cert.org – http://www.ukcert.org.uk/

• Centre for the Protection of National Infrastructure (CPNI)– http://www.cpni.gov.uk/