Title: P1251328626hBgtw
1Internet Security How Much is Enough? Orange
Beach, Alabama May 23, 2000 Steve Miksell
ITSC
2Internet Security
How much is enough?
2
3Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An On-Going Process)
- Conclusion
4Internet Benefits and The Role of Security
Internet Access (Benefits to Users and Staff)
SESA Cost Savings (Client Savings/ Agency Savings)
- Household access
- Personal Computer
- Other devices
- Third party access
- Community-based organization
- Libraries
- Agencies
- Schools
- Ease-of-use
- Ability to save agency costs
- Accuracy of information and transactions
- Cost of Internet hardware and software design and
implementation - Cost of multiple modes of operation
Security and Privacy
- Security Required to Assure Confidence Allowing
Benefits to be Realized - Costs to Achieve this will affect bottom line
5UI Internet Security Issues
Availability
Privacy and Confidentiality
Financial and Data Integrity
6Security -- Package or Process
Universal Security Package (1 size fits all)
Solution is an ongoing process tailored to
the environment and application
7Security Program Activities
8Key Elements of a Security Program
Policies Procedures
Tools
9Computer Misuse and Abuse
(USA TODAY from FBI and CSI Institute Surveys)
10Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An Ongoing Process)
- Conclusion
11Threats, Vulnerabilities, Risks
Vulnerability
Threat
Risk
12Internet Threats
13Web Server Vandalism
WWW.Site.State.XX.US
- Vandalized Web Sites (a small sample)
- NASA
- DOJ
- KKK
- Greenpeace
- CIA
Welcome from the Commissioner.
14Denial of Service
15Release of Confidential Information
Legitimate user, who provides confidential
information to the SESA.
Hacker pretends to be someone else, obtaining
confidential information, such as wage records
or UI claim status from the SESA.
16Fraud Over the Internet
Dishonest individuals submit fraudulent claims,
using anonymity of the Internet to hide their
identity.
17Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An On-Going Process)
- Conclusion
18Security Services (Tools and Techniques)
- TOOLS
- Firewalls
- Intrusion Detection
- Virus Detection
- Authentication Mechanisms (e.g., PKI)
- Virtual Private Networks
-
- ...
- Techniques
- Server Lockdown
- Log Analysis
- Incident Handling Procedures
- Security Policies
- Risk Assessments
-
- ...
19UI Issues and IT Security Services
Confidentiality
Integrity
Availability
Good Product/ NO Fit
System Configuration
Firewalls
Accountability
Architecture
Non-Repudiation
Monetary and Privacy Issues
Threats posed by those who might commit fraud.
Authentication
Identification
Incident Mgmt.
Access Control
Administration
20Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An Ongoing Process)
- Conclusion
21Threats Points of Vulnerability
Internet Access Exposes Personal and Monetary
Information
Threat Vandals
Threat Malicious Users
Threat Snoops, Data Modifiers
Threat Snoops, Data Modifiers
Threat Imposters
Client Side
Communications Path
Server Side
22Server Side SecurityLegacy Operational Data
Mainframes
- Security Services
- System Configuration
- Access Control
- Identification Authentication
- Accountability
- Facility Security
- Software Import Control
Servers
23Server Side Security
- Security Services
- Administrative Procedures
- Physical Personnel Security
- Architecture
- Firewalls
- Incident Handling
- Training
Your LAN
External LAN/ Internet
Service A
?
Unauthorized
Authorized
Service X
?
Email
Service A
?
Audit Logs
Service X
?
24Server Side SecurityThe Web Server
- Security Services
- System Configuration
- Access Control
- Identification Authentication
- Accountability
- Non-Repudiation
- Facility Security
- Software Import Control
- Incident Management
The World
UI Data
25Secure Communication
Client Side
Client Side
Remote Site
Communications Path (Internet)
Server Side (Intranet)
Security Service Encrypted pipe (VPN) between
firewalls
26Client Side Security
- Security Services (Applied to Browsers, Platforms
and Individuals) - System Configuration
- Identification Authentication
- Encryption
- Software Import Control
- Access Control via Passwords
- Non-Repudiation
- USER TRAINING
27Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An Ongoing Process)
- Conclusion
28Security in the Life Cycle of(SESA UI)
Internet Applications
Plan What will be done for Security?
Design How will It Be Done?
Implement Building the Application to
incorporate Security
Operate Running the Application Securely
29Planning Elements
- Key Issues
- Claimant Signatures Required?
- Use of PKI, SSN or Other Authentication
techniques? - Hours of Operation
- Contingency Plans
- Information Handling Policies
- Security Policy
- Privacy Policy
- Discipline Policies
- Legal Procedures
- Incident Handling
- Security Planning
- Risk Understanding
- Staff Involvement
- UI Director
- Business Managers
- IT Managers
- Operations Managers
- Quality Control
- Legal Counsel
30Policy Conflict Resolution
Cost
Ease of Use
Security
Compatibility
Laws Guidelines
31Internet AuthenticationA Major Policy Challenge
User convenience must be balanced with privacy
and fraud prevention
If its too hard to prove Im ME, I wont bother
to use the Internet
INTERNET
Solutions exist, but their selection and
implementation involve cost/certainty/convenience
tradeoffs and will require clear policy
guidelines.
32Spectrum of Authentication Options
Assume that knowledge of Name and SSN
authenticate user and allow immediate access
to Wage Data
ESTABLISH Blind Authentication Procedures that
1) Protect Privacy 2) Fully exploit Internet
capabilities to eliminate the need for
direct staff support
Require Certificates or other Stringent
Authentication Procedures PKI or Biometrics
NEVER release Sensitive over the Internet
Safe but Restrictive
Higher Risk but User Friendly
33Design Elements
- Key Issues
- Secure Architecture
- Security Requirements
- Privacy Requirements
- Allocation of functions to Hardware/Software/Proce
dures - Firewall policy
- Encryption
- Virus Protection
- Forms Design
- System Impact
- Audit Requirements
- Security Design Reviews
- Risk Reduction
- Staff Involvement
- Business Managers
- IT Managers/Staff
- Operations Managers
- Quality Control
34Implementation Elements
- Key Issues
- Secure Server Configuration
- Firewall Configuration
- Security Testing
- Virus Software
- Security Training
- Risk Assessment
- Staff Involvement
- IT Managers/Staff
- Operations Managers/Staff
- Quality Control
35Operational Elements
- Key Issues
- Update virus software
- Monitor security alerts
- Apply patches for security bugs
- Update access control lists
- Monitor audit data
- Report incidents to management
- Continually verify server integrity
- Continually verify web page integrity
- Periodic Risk Assessment -- particularly as the
environment changes
- Staff Involvement
- Operations Staff
- IT Staff
- Management
36Agenda
- Introduction
- Threats, Risks and Vulnerabilities
- Risk Reduction I (Tools)
- Risk Reduction II (End-to-End Solutions)
- Risk Reduction III (An Ongoing Process)
- Conclusion
37To Answer the Original Question ...
- How Much Security is Enough?
- Other Questions Must be Answered...
- What is the application?
- What level of risks can be tolerated?
- What are costs vs. risks?
38Web Server Application
- Website -- Set up as Standalone Server with No
Links to Other SESA Assets - Services -- Providing PUBLIC SESA and UI
Information to the General Population, Including
Links to External Resources - Threats Include
- Vandalism (Graffiti and False Information or
Links) - Denial of Service
Monitoring Administration Server Lockdown
39Web Server Security
- Threshold Security
- Server Lockdown
- Monitoring
- Backups
- Contingency Plan
- Enhanced Security
- Server Certificate
- Intrusion Detection
- Firewall
- Automated Alerts
- Automatic Shutdown
40UI Initial Claims Application
Administration
Administration
- Data Collection Combined with Distribution of
Private Information
Access Accountability
Firewall
- Threats
- Imposters Submitting False Information
- Increased chance of Privacy
Violations - On the Internet
- On the Server
- On Other SESA computers
- Increased Impact of Vandalism/Graffiti
Encryption
Identification Authentication
Identification Authentication
41UI Claims
- Threshold Security
- Life Cycle Process
- Comprehensive Policies
- Access Controls and Reasonable Authentication
- Point Solutions with End-to-end Security
Integration - Periodic Assessment
- Enhanced Security
- All of the threshold security services at
significantly enhanced levels
42The Original Question -- How Much Security is
Enough?
- Enough security to reduce risk to a level you are
comfortable with. - Steps to achieving that comfort level
- Understanding the Application
- Understanding the Risks
- Mitigating Risks through a continuous process of
security awareness
43Extra Credit Topics
- Interesting URLs
- Personnel Security
- DDOS
- PKI
- Securing Applications
- ITSC Contacts
44Further Reading(Some Interesting Security
URLs)
- Government Sites
- NIST (csrc.nist.gov)
- Private Organizations
- SANS (www.sans.org)
- SlashDot (www.slashdot.com)
- ISS (www.iss.net)
- (www.counterpane.com)
- (www.needguide.com)
45An Approach to Personnel Security
- Strong Authentication
- Intrusion Detection
- Encryption of Key Databases
- Audit and Close Security Holes
- NOT -- Single Administrator with Universal Access
- Background Checks
- Strong Written Policies
- Training -- Policies, Expectations, Consequences
- Control and Monitoring of Sensitive Data
- from Network World, May 8, 2000
46Observations on Personnel Security
- Security tools and procedures are not a
substitute for trusted employees - Employee background checks need to be
appropriate to the nature of the job - Onerous Unneeded Security is Self Defeating
- Expensive
- Morale Busters
- Workarounds will be found
- Effective Security is a Team Effort -- Dont
alienate the Team
47Distributed Denial of Service(From WebCast
Presented by ISS on February 16, 2000)
48Securing a UI E-Commerce Transaction through PKI
Is signature valid?
Signature OK
Certification Authority
Internet
6. Verify signers credentials 7. Digitally sign
response 8. Send Response
Encrypted claim
Signature OK
Is signature valid?
Encrypted claim
1. Complete claim form 2. Digitally sign claim 3.
Encrypt Transaction
4. Decrypt claim 5. Check Validity 9. Process
claim
UI Office/SESA
Claimant
PKI - Public Key Infrastructure
49Public Key Infrastructure
PKI
Certification Authority (CA)
- Management
- Certificate Authorities to validate integrity of
public keys by - Issuing Certificates
- Validating Certificates
- Revoking Certificates
- Cooperating with other CAs
- Assigning Responsibility and Liability
- Technical
- Browser, Server and E-mail software to support
- Key Generation
- Symmetric Encryption
- Public/private Key Encryption
- Secure Key Storage
- Digital Signature Creation/Verification
PKI Initiatives
Utah Digital Signature Program Access
Certificates for Electronic Services
(ACES) Corporate PKIs - example, Texas
Instrument, US West
PKI Support
Commercial CAs - Verisign, Digital Signature
Trust PKI Tool Development - Verisign, Entrust,
RSA
50Internet Application Processes
51Securing the Processes
52ITSC Contacts
- ITSC Web Site http//www.itsc.state.md.us
- Steve Miksell smiksell_at_itsc.org Phone
301.982.1116 - Henry James, Executive Director of the ITSC
hjames_at_itsc.org