47
Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition

Ch02 System Threats and Risks

Embed Size (px)

DESCRIPTION

Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark CiampaKnowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs). CNIT 120: Network Securityhttp://samsclass.info/120/120_S09.shtml#lecturePolicy: http://samsclass.info/policy_use.htmMany thanks to Sam Bowne for allowing to publish these presentations.

Citation preview

Page 1: Ch02 System Threats and Risks

Chapter 2Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition

Page 2: Ch02 System Threats and Risks

Objectives

Describe the different types of software-based attacks

List types of hardware attacksDefine virtualization and explain how attackers are

targeting virtual systems

Page 3: Ch02 System Threats and Risks

Software-Based Attacks

Page 4: Ch02 System Threats and Risks

Malware (Malicious software)Software that enters a computer

system without the owner’s knowledge or consent

The three primary objectives of malwareTo infect a computer systemConceal the malware’s malicious

actionsBring profit from the actions that it

performs

Page 5: Ch02 System Threats and Risks

Viruses

Programs that secretly attach to file and execute when that file is opened

Once a virus infects a computer, it performs two separate tasksReplicates itself by spreading to other computersActivates its malicious payload

Payload examplesEncrypt data and charge money to decrypt itReformat the hard driveUse your computer to send spamMany others

Page 6: Ch02 System Threats and Risks

Types of computer viruses

File infector virus – attached to EXE or COM fileResident virus – lives in RAMBoot virus – Infects the boot sector of a floppy diskCompanion virus – second file with similar name

users execute by mistake, like cmd.batMacro virus – lives inside a Microsoft Office

documentMetamorphic viruses

Avoid detection by altering how they appearPolymorphic viruses

Also encrypt their content differently each time

Page 7: Ch02 System Threats and Risks

WormsProgram designed to take advantage of a

vulnerability in an application or an operating system in order to enter a system

Worms are different from viruses in two regards:A worm can travel by itself (over a network)A worm does not require any user action to begin its

executionActions that worms have performed: deleting files on

the computer; allowing the computer to be remote-controlled by an attacker

Page 8: Ch02 System Threats and Risks

Trojans

Trojan Horse (or just Trojan)Program advertised as performing one activity that but

actually does something elseUser is tricked into installing the software

Page 9: Ch02 System Threats and Risks

Rootkits

System files are replaced by counterfeitsHides files and processes from the operating systemIntruder gains remote control of the computerVERY hard to detect and remove

Usually reformatting the drive and restoring from read-only backup is recommended

Page 10: Ch02 System Threats and Risks

SONY Rootkit Secretly installed on PCs that played SONY music CDs in 2005 Exposed those machines to remote control by SONY and others This led to a massive product recall, and numerous lawsuits

Links Ch 2a, 2b, 2c

Page 11: Ch02 System Threats and Risks

Logic bomb

Program waits for a trigger event such as a date, or the programmer being fired

Once triggered, the payload executes, deleting files or causing other damage

Logic bombs are extremely difficult to detect before they are triggered

Page 12: Ch02 System Threats and Risks

Famous Logic Bombs

Page 13: Ch02 System Threats and Risks

Privilege EscalationGaining rights that the user should not haveTypes of privilege escalation

Gain higher system rights, usually AdministratorGain another user’s rights

Page 14: Ch02 System Threats and Risks

SpamUnsolicited e-mailText-based spam messages can easily by trapped

by special filtersImage spam uses graphical images of text in order

to circumvent text-based filters

Page 15: Ch02 System Threats and Risks
Page 16: Ch02 System Threats and Risks

Evading Spam FiltersTechniques

GIF layeringWord splittingGeometric variance

See link Ch 2d

Page 17: Ch02 System Threats and Risks
Page 18: Ch02 System Threats and Risks

Malware for Profit (continued)

Page 19: Ch02 System Threats and Risks
Page 20: Ch02 System Threats and Risks

Blocking Spam

Image spam cannot be easily filtered based on the content of the message

To detect image spam, one approach is to examine the context of the message and create a profile, asking questions such as:Who sent the message?What is known about the sender?Where does the user go if she responds to this e-mail?What is the nature of the message content?How is the message technically constructed?

Page 21: Ch02 System Threats and Risks

Spyware

Software that violates a user’s privacyAntispyware Coalition defines spyware as:

Technologies that are deployed without the user’s consent and impair the user’s control over:Use of their system resources, including what programs are

installed on their computersCollection, use, and distribution of their personal or other

sensitive informationMaterial changes that affect their user experience, privacy, or

system security

Page 22: Ch02 System Threats and Risks

SpywareSpyware creators are motivated by profitSpyware is often more intrusive than viruses,

harder to detect, and more difficult to removeSpyware is very widespread

Almost every computer has some spyware on itMost common types of spyware

Adware Keyloggers

Page 23: Ch02 System Threats and Risks

Effects of Spyware

Page 24: Ch02 System Threats and Risks

AdwareDelivers advertising

content, often as pop-up windows

Can slow or crash a computer

Can monitor or track your activitiesImage from Link Ch 2e

(adwarereport.com)

Page 25: Ch02 System Threats and Risks

Hardware Keylogger

A small device inserted between the keyboard connector and computer keyboard port

Records each keystroke a user types on the computer’s keyboard

Used by a high school student to steal a final exam from a teacher (link Ch 2f)

Page 26: Ch02 System Threats and Risks

Software KeyloggersPrograms that silently capture all keystrokes,

including passwords and sensitive informationHide themselves so that they cannot be easily

detected even if a user is searching for them

Page 27: Ch02 System Threats and Risks

BotnetsHundreds or thousandsof zombie computers are

under the control of an attackerZombie

An infected computer with a program that will allow the attacker to remotely control it

Attackers use Internet Relay Chat (IRC) to remotely control the zombies

Attacker is knows as a bot herder

Page 28: Ch02 System Threats and Risks

Uses of Botnets

Page 29: Ch02 System Threats and Risks

Hardware-Based Attacks

Page 30: Ch02 System Threats and Risks

BIOSBasic Input/Output System

(BIOS) A program embedded on a chipRecognizes and controls different

devices on the computer systemExecuted when the computer system

is first turned onOn older computer systems the

BIOS was a Read Only Memory (ROM) chip

Today’s computer systems have a PROM (Programmable Read Only Memory) chipImages from link Ch 2g, Ch 2h

Page 31: Ch02 System Threats and Risks

BIOS Attacks

One virus overwrites the contents of the BIOS and the first part of the hard disk drive, rendering the computer completely dead

A BIOS virus or rootkit won’t be removed even by reformatting or replacing the hard drive

One defense is to block BIOS flashing on the motherboard

Page 32: Ch02 System Threats and Risks

USB Devices

USB devices use flash memoryFlash memory is a type of EEPROM, nonvolatile

computer memory that can be electrically erased and rewritten repeatedly

USB devices are widely used to spread malwareAlso, USB devices allow spies or disgruntled

employees to copy and steal sensitive corporate data

In addition, data stored on USB devices can be lost or fall into the wrong hands

Page 33: Ch02 System Threats and Risks

Link Ch 2i

Page 34: Ch02 System Threats and Risks

USB PocketKnifeAs soon as it is

plugged into a computer, it steals passwords, files, installs a trojan, etc.

We do this as a project in CNIT 124

Links Ch 2j, 2k

Page 35: Ch02 System Threats and Risks

USB Devices

To reduce the risk introduced by USB devices:Disable the USB in hardwareDisable the USB through the operating systemUse third-party software

Page 36: Ch02 System Threats and Risks

Better Solution: IEEE 1667Standard Protocol for Authentication in Host

Attachments of Transient Storage DevicesUSB devices can be signed and authenticated,

so only authorized devices are allowedWill be implemented in Windows 7

Link Ch 2l

36

Page 37: Ch02 System Threats and Risks

Network Attached Storage (NAS)

Single, dedicated hard disk-based file storage device that provides centralized and consolidated disk storage available to LAN users through a standard network connection

Page 38: Ch02 System Threats and Risks

Link Ch 2m

Page 39: Ch02 System Threats and Risks

Storage Area Network (SAN)

Specialized high-speed network for attaching servers to storage devices

Larger and more expensive than NASLink Ch 2n

Page 40: Ch02 System Threats and Risks

NAS and SAN Security

They can be attacked just like other serversNAS security is implemented through the standard

operating system security featuresThe operating system on NAS devices can be either

a standard operating system, a proprietary operating system, or a “stripped-down” operating system with many of the standard features omitted

Page 41: Ch02 System Threats and Risks

Cell Phone Attacks

Lure users to malicious Web sitesCell Phone Viruses (link Ch 2o)Access account informationAbuse the cell phone service

Page 42: Ch02 System Threats and Risks

Attacks on Virtualized Systems

Page 43: Ch02 System Threats and Risks

What Is Virtualization?

VirtualizationSimulating hardware (or other things) on a computer

Operating system virtualizationA virtual machine is a whole simulated computer

running as a program on another computer

Page 44: Ch02 System Threats and Risks

A Virtual Machine

Host OS: Windows 7

Guest OS: Ubuntu Linux

Page 45: Ch02 System Threats and Risks

Virtual Servers

Virtual servers areEasier to set up and repairMore reliableCheaper – because many virtual servers can run on a

single physical computerUse less energy

100% of the Fortune 100 companies use VMwareLink Ch 2p

Page 46: Ch02 System Threats and Risks

Attackers Use Virtual Machines

A single computer can use both Windows and Linux tools

Page 47: Ch02 System Threats and Risks

Security of Virtual MachinesSecurity for virtualized environments can be a

concern for two reasonsExisting security tools were designed for single physical

servers and do not always adapt well to multiple virtual machines

Virtual machines not only need to be protected from the outside world, but they also need to be protected from other virtual machines on the same physical computer

Virtual Machines can be used as security devicesrunning security software, such as a firewall and

intrusion detection system