Title: Security in the Trenches
1Security in the Trenches
2Who are the defenders in the trenches?
- Security staff
- Monitor threats and behavior without invading
privacy - Tactical calculation of acceptable risk and
response - Design trenches that allow free flow of
information and services - Respond to breeches and threats without causing
harm
3Who are the defenders in the trenches?
- Everyone at a keyboard
- Everyone with a network connection
- Everyone that uses or manages Information
Technology
4Who are the defenders in the trenches?
- Students
- Exposed to constant scans, malicious messages,
and fraud attempts. - Cant trust messages from their friends or even
the administration or support organization
(administration_at_jmu.edu, support_at_jmu.edu ) - Computer malfunctions and compromise of personal
information and accounts - Potential identity theft victims when central
stores of information are compromised
5Who are the defenders in the trenches?
- Faculty
- Exposed to constant scans, malicious messages,
and fraud attempts. - Threat environment makes it difficult to
experiment safely. - Confidential commercial research may be
compromised - Fulfilling grant security requirements complicate
research efforts - Lose valuable messages in storm of SPAM
- Unable to get or share information because
criminal element has made it too risky
6Who are the defenders in the trenches?
- Staff
- Exposed to constant scans, malicious messages,
and fraud attempts. - Safeguard information of constituents
- Spyware calls burying support resources making
them unavailable to others - Responding to constant stream of threats.
- Fear of being the person who makes the next
headlines by clicking the wrong thing. - Loss of trust
7Who are the defenders in the trenches?
- Management
- Exposed to constant scans, malicious messages,
and fraud attempts. - Strategic calculation of acceptable risk and
response - Hesitant to offer forward thinking services
because of risk. - Headlines dont explain acceptable and
residual risk. - Risk is always unacceptable if an incident
occurs. - Growing security expenditures take from line of
business needs
8Who are the defenders in the trenches
- General Public
- Exposed to constant scans, malicious messages,
and fraud attempts. - Lose battles daily for control of their
computers, documents, and accounts - Deluged with simplistic, ineffective, overly
complex, sensationalist, and/or accusing advice.
9WE ARE ALL IN THE TRENCHES!
- Defending
- Our own computer and information
- Our constituents information and services
- Our organizations information and services
10Trench Warfare
- Trench - a long, narrow ditch dug by soldiers for
cover and concealment - Trench Warfare form of fighting whereby two
sides fight each other from opposing trenches - Conscription a system of compulsory recruitment
for the armed forces - Home Front the name given to the part of war
that was not actively involved in the fighting
but which was vital to it - No-mans land the barren territory that lay
between the opposing Allied and German trenches
on the Western Front - Attrition strategy of wearing down the enemy
through continual attack and pressure - Deterrent something designed to stop a person
or people from doing something - Entrenched to be fixed or deeply rooted in an
area - Retaliation to fight back, revenge
- Shell shock medical condition caused by
prolonged exposure to the distressing experiences
of trench warfare - Stand-down name given to the daily evening
routine in the trenches
11Who is the Enemy?
- Vandals
- Joy Riders
- Graffiti artists
- Kids and professionals
- Thieves
- Extortionists
- Manipulators
- Voyeurs
- Egotists
- Competitors (business, romance, research, etc.)
- Free loaders
- Anarchists
- Exploiters
- Terrorists
- Multiple simultaneous enemies
- Multiple motivations
- Varying capabilities
12Where are the enemies trenches?
- They have none!
- Worldwide, instant mobility
- Worldwide, anonymous mobility
- Worldwide, unrestricted mobility
- At every network connection
- At every keyboard
- At every exposed web site
13Guerilla Warfare
- Guerrilla warfare operates with small, mobile and
flexible combat groups without a front line - Guerrilla tactics are based on ambush, sabotage,
espionage, and avoiding the response of the
defenders through greater mobility - The mobility provided by the Internet and the
ability to commandeer computers results in the
attackers being able to wage open warfare on the
defenders with relative anonymity. - Freely available weaponry on the Internet
- Mercenaries BOTS
- Smart bombs - viruses, worms
14Where are our weaknesses?
- Our networks provide attacker mobility
- Global
- Limitless
- Unauthenticated
15What are our Weaknesses?
- Networks and Societies Must Have Cooperation to
Work - Throwing bricks through windows
- Driving down the wrong side of the street
- Stealing mail from mailboxes
- Can you secure your house or car?
- The Internet extends the reach of uncooperative
members
16Where are our weaknesses?
- Our Systems provide soft targets
- Complex error prone in design, implementation,
configuration, and usage - Defective security controls
- Lack of access controls in most default
configurations - Not designed for hostile environment
- Not maintained for hostile environment
17Where are our weaknesses?
- We, ourselves, provide opportunity
- Complexity breeds mistakes
- Decisions
- Design
- Implementation
- Configuration
- Operation
- Priorities
- We cannot spend all our time on defense nor make
all our decisions based on security. - The attackers have no such limitations
- Acceptable risk
- Conflicting Business Goals
- Desire for universal, easy accessibility
- Minimize access controls for location, method,
source, or destination - Desire for autonomy and personalization
18Where are Our Weaknesses?
- An intruder only has to find one entry point.
- A defender has to close or watch all entry
points. - One mistake, one oversight, one wrong mouse click
creates opportunity for the attacker
19Battle Statistics
- Thousands of infected e-mail messages received
daily - 60 of incoming e-mail messages are SPAM
dozens, sometimes hundreds, containing fraud
attempts such as phishing and Nigeria scams
20Battle Statistics
- Malicious Instant Message Events
21Battle Statistics
Malicious Web Sites
22Battle Statistics
23Symantec Internet Security Threat Report
January-June 2005
- 10,866 new Windows viruses
- Of the 50 most common reported, 74 expose
confidential information - 10,352 BOTS detected per day
- 1,862 new software defects
- Average time to exploit 6 days
- Average time to patch 54 days
- 5.7 million fraudulent phishing email messages
per day
24Issues and Incidents
- Lifetime of unpatched computer
- Malware sophistication
- Security software neutralization
- Back channel communications, instant notification
- BOTS
- Distributed Denial of Service
- Rootkits
- Keyloggers
- Unrecognized malware
- Exploits of unfixed defects
- Below the radar communications
- Social engineering
- DDOS
- E-gold
- E-bay hijack
- E-bay phish
- IM keylogger data stream
- Organized crime
- Targeted spam Lexus Nexus
- Higher Education incidents
- Credit Card battle
- One mistake
25What are we trying to protect?
- Confidentiality
- Integrity
- Availability
- if we dont protect them we may have
26If we dont protect C-I-A we may have
- Liability
- Operational disruption
- Theft
- Vandalism
- Loss of reputation, confidence, and/or trust
- ...which may lead to the loss of
27Which may lead to the loss of
- Time
- Money
- Freedom
- Jobs
- Mission
- Quality of Life (in the worst case, life itself
health, military, terrorism)
28Security Goal
- Reduce the risk of loss to an acceptable level
- We can not eliminate risk. There will always be
residual risk. - Reducing risk will always have costs
- Time (always)
- Money
- Access
- Convenience
- Privacy
- Freedom
- Complaints
- Quality of life
- Service delivery
- Compare to costs of security incidents on
previous slide - balance
29Security Keystones
Security
30Security Keystones
- Awareness of the risks and a desire to do
something to reduce those risks - Assessment of the risks and a willingness to
accept the costs of addressing unacceptable risks
leading to - Policies and procedures to reduce the risks to an
acceptable level - Controls enforcing the policies and procedures
- Monitoring operation of the controls and
compliance with policies and procedures - Responding to non-compliance incidents and
altered risk assessment parameters through
changing awareness - Repeat as necessary
- Best practices and common sense can shorten the
process, though without detailed analysis and
comparisons, one may be led into a false sense of
security and/or unproductive efforts.
31Security Keystones
- No one keystone can stand alone
- No keystone is infallible.
- Multiple layers of each keystone provide the best
protection to minimize effects of failures and
mistakes
32Keystone Risk Assessment
- The factors that go into a risk assessment are
constantly changing. - Value
- Threats
- Vulnerabilities
- Probabilities
- Exposure
- Attack Activity
- Motivation
33Keystone Risk Assessments
- Risk Consequence x (threat x vulnerability)
- Consequences are rising rapidly as more services
and data are made accessible online and systems
are interconnected - Threats are rising rapidly as attacks grow in
number and sophistication - Vulnerabilities are still rising as software gets
more complex, services are pushed out faster,
more services are exposed, automated exploit kits
proliferate, and businesses struggle with global
competition - Risk will increase for the foreseeable future
34Generalizing Risk Assessment Best Practices
- Provide access only to that which is needed
(default deny and least privilege) - Defense in depth (i.e. redundant layers)
- These fundamental security principles havent
changed in centuries. We ignore them at our peril.
35Keystone - Policies and Procedures
- Surrounds the whole process
- Like a risk assessment, usually lags the
environment and is difficult to implement for
varying, complex systems needing good reaction
times.
36Keystone Access ControlLayered Defense Theory
37Keystone Access ControlLayered Defense Practice
Backup Systems
Self Service Student Information and Human
Resources Systems
Faculty/Staff (indirect path)
Desktops and other unidentified sensitive systems
38What Data is on Your Desktops?
- Grades
- SSN
- Credit Cards
- Performance Evaluations
- Medical
- Resumes
- Research
- Vendor
- Purchasing
- Financial Reports
- Organizational Planning
- Environmental control systems
- Credit card processing systems
- Building entry and security systems
- ID/debit card systems
- Office desktops?
- Home desktops?
- Laptops?
- CD?
- USB Drive?
- Floppy?
- Cell phone?
- PDA?
- Shared folder?
- One mistake
39Keystone - Access Control
- Granting access indicates explicit trust
- Not controlling access indicates implicit trust
- To read
- To alter
- To destroy
- The more we depend upon trust, the less control
we have. - SPAM
- Network access Scanning, bandwidth depletion,
denial of service attacks, exploit attempts,
unauthorized account access, patch urgency - Computer access running malicious programs,
unsafe configurations, incompatible
configurations - Inappropriate use
40Trust gt Risk
- Ignorance (failure of awareness)
- Faulty Risk Assessment assumptions
- Failed Access Controls
- Failed Monitoring Processes
- Inadequate Response
- Inappropriate Use
-
- Misplaced TRUST
- Unaccepted Access gt Unaccepted Risk
- The more we trust, the more we better monitor.
41Keystone - Monitoring
- We have to monitor unless
- Our trust in everything is 100 justified
- The factors that went into the risk assessment
dont change - Were not interested in detecting when were the
victim of the residual assumed risk. - As malware and attacks move toward encrypted open
ports (web), monitoring is going to be a lot
harder. - The more we trust, the more we better monitor.
42Risk Evolution
- Decreasing
- Fundamental operating system and server defects
- Increasing
- Human error due to complexity
- Desktops
- Distributed data exposure
- Client applications
- Web applications
43Key Defense Improvements for Todays Threat
Environment
- Reduce exposure
- Default deny networks
- Default deny computers (least privilege accounts
e.g. non-Administrator) - Increase monitoring
- Reduce reaction time to the inevitable security
failure and new threat - Awareness ! Education
44WE ARE ALL IN THE TRENCHES!
- Defending
- Our own computer and information
- Our constituents information and services
- Our organizations information and services