Defense%20in%20Depth: - PowerPoint PPT Presentation

About This Presentation
Title:

Defense%20in%20Depth:

Description:

The FBI Double Agent Program. ... Community's Comprehensive Compendium of Future Intelligence Requirements. ... FBI counterintelligence techniques, sources, ... – PowerPoint PPT presentation

Number of Views:461
Avg rating:3.0/5.0
Slides: 34
Provided by: reggie9
Category:

less

Transcript and Presenter's Notes

Title: Defense%20in%20Depth:


1
Defense in Depth
Securing the Desktop in a Managed Environment
Jeff Stevenson Federal Network Consultant jeff_ste
venson_at_3com.com NMCI Symposium June 18, 2003
2
Network Security is a Serious Issue
  • 202 Billion Lost Every Year by Companies to
    Cybercrime
  • 90 of cybercrime financial losses are INTERNAL
    (intranets)
  • U.S. Government alone will experience over
    300,000 Internet attacks this year
  • Over 400,000 WWW pages contain some form of
    Hacker Tools
  • Cybercrimes are estimated to take place every 20
    seconds...

3
Network attacks byinsiders are a real threat
  • Computer Crime and Security Survey 2001
  • Joint CSI/FBI survey of 538 US organizations
  • 97 with Web sites
  • 47 provide electronic commerce services
  • 78 reported financial losses due to attacks
  • Only 37 could quantify loss monetarily
  • 377 million in total losses reported
  • 49 reported incidents of unauthorized network
    access by insiders

Source Computer Crime and Security Survey 2001
4
Know Whos on Your Network Robert Hanssen
  • Unauthorized access to
  • The National Measurement and Signature
    Intelligence Program, involving acoustic
    intelligence, radar intelligence and nuclear
    radiation detection.
  • The FBI Double Agent Program.
  • The Intelligence Community's Comprehensive
    Compendium of Future Intelligence Requirements.
  • A study on recruitment operations of the KGB
    against the CIA.
  • An assessment of the KGB's effort to gather
    information on U.S. nuclear programs.
  • A CIA analysis of the KGB's First Chief
    Directorate (FCD), its international intelligence
    division.
  • FBI counterintelligence techniques, sources,
    methods and operations. .

"In one case, he compromised an entire technical
program of enormous value, expense and importance
to the United States Government," the affidavit
states.
5
Who are the Hackers?
  • 49 are inside employees or contractors on the
    internal network
  • 17 come from remote access (still inside people)
  • 34 are from Internet or an external connection
    to another company of some sort
  • The major area of financial loss in hacking is
    internal more money is lost via internal hacking
    and exploitation (by a factor of 30 or more)
  • Most of the hacking that is done is from
    technical personnel in technical positions within
    the company

6
Networked Servers
What are we protecting?
  • Information Servers
  • Infrastructure Servers
  • Applications Servers

Security is required to protect the privacy and
integrity of server contents and to ensure that
network resources business process availability
are not compromised
7
Typical Attacks
  • Insider attack
  • Social engineering
  • Virus infiltration
  • Denial of Service
  • OS or application bug
  • Infiltration via passwords
  • Infiltration via no security
  • Spoofing
  • Trojan horse
  • Brute force
  • Stealth infiltration
  • Protocol flaw or exploit

8
Current Network Security The Big Picture
Web Srvr(s)
Internet
Internet
9
Current Network Picture
  • Perimeter Firewalls
  • Departmental Firewalls
  • Assume all hacking is inter-departmental
  • Topology Dependent
  • Dont provide for sniffing/spoofing protection
  • Dont harden individual hosts
  • Intrusion Detection Systems
  • Only detects and do not protect
  • IDS signatures have to be updated
  • Only deal with known protocol deficiencies or
    known applications
  • IDS can be Noisy, forwarding many False
    Positives
  • Distributed anti-virus
  • Signature based and needs to be updated

10
Analysis
  • Internal network security is still the most
    pervasive corporate threat
  • It is usually totally open to anyone who connects
    and accesses information
  • Many different levels of security are necessary
    to deal with the threats
  • Apply internal security in proper measure to meet
    the actual or perceived threat environment

11
How Do You REALLY AddressInternal Network
Security?
  • Ubiquitous net security
  • Create protected enclaves
  • Node-specific security policies
  • Intrusion detection closest to the asset
  • Adaptive facilities
  • Centralized management of security facilities
  • Controlled asset management through protected
    network access
  • Extensive logging and reporting for evidentiary
    reasons and for security management reports

12
Introducing the 3Com Embedded Firewall
  • Implements distributed tamper-resistant firewalls
    at the NIC
  • Enforces security policy at the network
    connection
  • Limits network access on a need-to-know basis
  • Creates protected enclaves
  • Provides intrusion resistance
  • Allows for asset management

13
Introducing Hardware Based Distributed Firewalls
  • 3Com Firewall Cards with 10/100 LAN
  • Embedded Firewall
  • With security co-processor
  • Offload IPSec to the card (VPN Acceleration)
  • Centrally managed policies on remote machines
  • Easy deployment, manageability and upgradeable
  • Via policy server which manages servers, desktop
    and laptops
  • Tamper Resistance
  • Cannot be turned off by malicious code
  • Policy cannot be changed or disabled by user
  • HW based Firewall

14
DARPA Is Excited About Embedded Firewall
  • EFW demonstration tremendously
    successfulidentified by the U.S. Navy as the
    most promising technology. The Navy has begun the
    process of programming and budgeting to buy these
    EFWs in bulk.
  • April 2002 DARPA Fact File
  • http//www.darpa.mil/body/Newsitems/darpa_fact.htm
    l
  • Distributed firewall technology places a
    firewall inside every computer on a
    networkproviding much more robust protection
    than a single network firewall.
  • April 2002 Testimony to U.S. Congress

15
EFW Combines the Best of Hardware and Software
  • EFW provides the advantages of hardware security
  • Unlike software firewalls, EFW is extremely
    tamper resistant
  • Throwing more security software at a security
    problem that is caused by the essentially
    insecure nature of software is like going to a
    blind barber -- it can only end badly and, more
    likely than not, bloodily. - Software Security
    is Soft Security - John Pescatore, Gartner
    Research Vice President
  • EFW also allows the flexibility, mobility and
    central management of distributed software

16
Implementation approaches software/personal
firewall
  • Protects the local OS and applications from
    network attacks
  • Firewall actions visible to OS, applications, and
    users
  • Relies on OS for firewall integrity
  • Attacker or applications could bypass or
    interfere
  • User may have some control over rules within
    software
  • Successful external attacks demonstrated

17
Vulnerabilities of software firewalls
18
Implementation approaches Embedded Firewall
  • Firewall actions transparent to OS, applications,
    and users
  • Independent of local OS
  • Unable to Bypass
  • Tamper-resistant
  • User has no control over rules
  • Centrally managed
  • Secure against external attack
  • Examples 3Com Embedded Firewall

19
Superiority of Embedded Firewalls
Operating System
OS sends information to embedded hardware for
examination
Embedded Firewall
20
Components of the 3Com Embedded Firewall
  • Policy Server
  • Centrally creates, defines and distributes
    security policies to the NICs
  • Management Console
  • Provides intuitive user interface
  • 3Com 10/100 Secure NICs with Embedded Firewall
  • Executes the packet filtering rules dictated to
    it by the Policy Server

21
Embedded Firewall Domain
Up to 3 Policy Servers per domain
Management Console
Policy Server
Policy Server
Policy Server
Primary
Secondary
Primary Policy Server
Secondary Policy Server
Tertiary Policy Server
Primary
Domain
Secondary
22
Create Protected Enclaves
  • Provides access on a need-to-know basis
  • Topology independent
  • Dont need to configure at every point in the
    path
  • Policies are role based
  • Enclaves can limit access to
  • Individual devices
  • Host based applications

2nd floor
1st floor
Finance
RD
Marketing
- Enclaves
23
EmbeddedFirewall Applications
24
No Sniffing
  • Good insider logs into Telnet server
  • Bad insider sniffs the password from the LAN
  • No sniffing policy is pushed
  • Hostile insider is unable to sniff passwords

25
THREATCON Alpha
  • Protocols and/or addresses can be restricted on a
    per host basis as INFOCON changes
  • Block all port x traffic to a users machine
  • Block a service from a specific subnet

26
THREATCON Bravo
  • Each host can be at a different INFOCON level
  • Changing INFOCON is easy
  • No user action required
  • No rebooting required

27
No Denial of Service
Policy Server
Windows 2000 Server
Data
Internet
Data
Data
York (Zombie)
Win 95/98/2000 Client
Good
Senior Managers with Confidential information
Employees
  • York is a zombie launching a DDOS attack against
    the server
  • Good insiders cannot access the server
  • Block all policy is pushed to the zombie
  • Service is restored to good users

28
The Internal Network Uncontrolled Inventory
Millions of Ports Protocols are allowed in
and out of this Network
IP Addresses
Ports/Protocols
Message Send Protocol FTP (Port 21) SSH remote
login Telnet SMTP (mail) Host name server Login
host protocol Domain name server
SQL Bootstrap TFTP Finger HTTP(Port 80) Sun
RPC NetBIOS SNMP Internet relay chat HTTP
management
Unprotected System
64,000 Ports Dozens of Protocols are allowed
in and out of this system
Leave Everything Open Use Whatever You Want.
Anyone Can Attach.
29
Asset Control Defined by Security Administrator
IP Addresses
Ports/Protocols
SQL
FTP (Port 21)
Protected System
Telnet
HTTP (Port 80)
Login host protocol
Access Control Policy
SNMP
Only services (protocols) required
portsnecessary to supportservices are open on
this system
Use Only Whats Allowed!
30
Contractor WorkstationE-mail Access
  • On workstation, enforce the following rules
  • Allow access to/from IP address of e-mail server
  • Allow port 110 for POP traffic
  • Deny all other traffic

Contractor workstation
E-mail Server
31
Hardened FTP Server
  • On FTP server, enforce the following rules
  • Use Windows 2000 pre-defined rule set
  • Use FTP Server pre-defined rule set to allow the
    host to accept/provide file transfers using FTP
  • Deny all other traffic

FTP Server
FTP Client
32
Sensitive Information Server
  • On server, enforce the following rules
  • Same rules as Hardened Server
  • Allow traffic to/from specified IP addresses
  • Deny all other traffic

33
Network Attack Response(In Real Time)
  • If an attack is detected, IT administrator can
  • Block outgoing traffic from attacking host
  • Block all traffic on critical servers to prevent
    further damage/proliferation of attack
  • Block protocols or ports used in attack

Compromised Server
Attacking Host
34
Summary
  • Need-to-know policies can be enforced at each
    node in real-time
  • 3Com Embedded Firewall is tamper-resistant -
    embedded in the NIC and independent of the
    operating system
  • Provides security on both servers (extranets) and
    hosts.
  • Auditing enhances intrusion detection
  • Complements the Perimeter Firewall
  • Centrally managed and controlled transparent to
    the user
  • Remote/traveling user support
  • Supported by DARPA (Defense Advanced Research
    Projects Agency).

35
Embedded Firewalls Meet Todays Security
Challenges
  • Provides protection for every computer
  • Know whos on your network
  • Stops hackers at the most likely point of entry,
    the network connection
  • Provides managed security controls
  • Protects your valuable network assets
  • Distinguishes users based on role or function,
    not outsider versus insider

Distributed Embedded Firewalls are complementary
to existing network-centric solutions, enabling a
Defense in Depth strategy

36
For more information, please visit www.3com.com
Write a Comment
User Comments (0)
About PowerShow.com