Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security...

39
Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov Wilhelm Schickard Institute for Computer Science

Transcript of Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security...

Page 1: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Introduction to Computer SecuritySecurity Principles, Vulnerabilities and Threats

Pavel LaskovWilhelm Schickard Institute for Computer Science

Page 2: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

What is security?

Protection of organization’s assetsTechnical instruments (software and hardware infrastructure)Organizational measures (access control, policies etc.)A struggle with user work habits

Security vs. reliabilitySolutions vs. management

Page 3: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

What is security?

Protection of organization’s assetsTechnical instruments (software and hardware infrastructure)Organizational measures (access control, policies etc.)A struggle with user work habits

Security vs. reliabilitySolutions vs. management

Page 4: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

What is security?

Protection of organization’s assetsTechnical instruments (software and hardware infrastructure)Organizational measures (access control, policies etc.)A struggle with user work habits

Security vs. reliability

Solutions vs. management

Page 5: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

What is security?

Protection of organization’s assetsTechnical instruments (software and hardware infrastructure)Organizational measures (access control, policies etc.)A struggle with user work habits

Security vs. reliabilitySolutions vs. management

Page 6: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Assets

Specific constituents of an organization’s businessPhysical devices, e.g. computers, communication lines, etc.SoftwareDataIntellectual property and know-howBusiness reputation

Asset valuation:Monetary replacement valueLost revenue

How long can your business survive without an asset X?

Page 7: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.

How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 8: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 9: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”

Vulnerability analysisThreat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 10: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysis

Threat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 11: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysis

Risk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 12: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysis

Infrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 13: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysisInfrastructure design

Policy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 14: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 15: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Security management

Goal: protection of organization’s assets.How?

Asset “inventory”Vulnerability analysisThreat analysisRisk analysisInfrastructure designPolicy definition

Security scapegoat: Chief Information Security Officer(“Datenschutzbeaftragte”)

Page 16: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Vulnerabilities

Weaknesses of a system that can be exploited to damageassets

Technical: software bugs, lack of input validationConfigurational: unnecessary ports openAdministrative: wrong access permissions, etc.

Vulnerability repositories: CVE, BugTraq, etc.Vulnerability scanners: nmap, nessus, Webinspect.Vulnerability ratings:

Critical: automatic exploitation possibleModerate: exploitability mitigated by configurationLow: exploitability extremely difficult, low gain

Page 17: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Threats

Actions by adversaries toexploit vulnerabilitiesThreat examples:

Identity spoofingInformation disclosureDenial of serviceElevation of privilegeMalware infection...

Attack trees can be constructed tohandle complex attack scenarios

Page 18: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Cost of security

Security cost vs. asset costWhat are my assets worth?Asset inventory

Security cost vs. potential damageHow much will I loose (e.g. in future income) if... ?Risk analysis

Technology vs. operational costShall I buy a product X or hire an additional sysadmin?One-time vs. continuous investment

Page 19: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Risk analysis

Risk is a function of assets, vulnerabilities and threats:

Risk = Assets× Vulnerabilities× Threats

Quantitative analysisValues from a mathematical domain, e.g. price and probabilityOutcome: a mathematical characterization, e.g. expected loss

Qualitative analysisValues from a domain without a mathematical structureOutcome: ad-hoc advice by security experts

Page 20: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

A fundamental quadrilemma

Cost (low)

Security (high)

Functionality (rich)

User expertise (low)

Poorly qualified users undermine security features.Rich functionality is in conflict with security.Security at no cost does not exist.

Page 21: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Design principles of computer security

Economy of mechanism: keep it simple.Fail-safe defaults: when in doubt, do not grant access.Open design: no “security by obscurity”.Separation of privilege: don’t make it root.Least privilege: minimum access rights necessary.

Page 22: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Defense-in-depth

Internet

Emailserver

Web, DNSservers

SQLservers

Intranetserver

Fileserver

User workstations

− Email antivirus− User authentication

− Web server antivirus

− Server IPS− User authentication

− Server antivirus− User authentication

− Personal firewall− Antivirus scanner− User authentication

− Network firewall− Network IPS− VPN gateway− Web application firewall

− Network firewall− Network IPS− User authentication

Layered protection: complementary security layersDefense in multiple placesDiversification: use of complementary products

Page 23: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

The onion model of protection mechanisms

Application security: application-levelprotection mechanismsServices security: security ofservices such as DNS, DHCP etc.Operating system security: main OSsecurity mechanismsOS kernel security: security modelsat hardware abstraction levelHardware security: tamper-resistanthardware modules, (e.g. for PKI)

hardware

OS kernel

operating system

services

applications

Page 24: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Access to the layer below

Attackers will attempt to overcome security mechanisms by“digging deeper” in the system hierarchy.Examples of “layer-below”-attacks:

System call hooking: overwriting pointers to audit functions withcustomized codeHacking in the physically available memoryUse of recovery tools to access raw memory dumpsHypervisor attacks in virtualized systems

Page 25: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Resume of security management

Security is not a solution but an ongoing process.Security management is a struggle between 4 conflictingforces: security, functionality, cost and user qualification.The main problem of security management is highuncertainty in cost factors:

Asset costRisk and theat analysisHuman factor

Main security design principles are defense-in-depth andlayered protectiion.

Page 26: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!Email programs: surprisingly quiet!Applications: Office, PDF, Flash, Browser plugins (!)

Page 27: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!Email programs: surprisingly quiet!Applications: Office, PDF, Flash, Browser plugins (!)

Page 28: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!Email programs: surprisingly quiet!Applications: Office, PDF, Flash, Browser plugins (!)

Page 29: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!

Email programs: surprisingly quiet!Applications: Office, PDF, Flash, Browser plugins (!)

Page 30: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!Email programs: surprisingly quiet!

Applications: Office, PDF, Flash, Browser plugins (!)

Page 31: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Current vulnerability landscape

Operating systems: vulnerability decreasingFew computers are connected directly to InternetWidespread deployment of firewalls (including PCs)Improving OS quality (less than 10 vulnerabilities per year)Still occasional problems (e.g. 17-year old VDM bug inWindows XP – 7 allows priviledge escalation)

General network services: rarely seriously exploitedMostly DDoS-AttacksDNS cache poisoning (2008): gradual transition to DNSSEC

Web browsers: highly wanted!Email programs: surprisingly quiet!Applications: Office, PDF, Flash, Browser plugins (!)

Page 32: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Service portfolio of Internet organized crime

End services: phishing, spam, DDoS extortion, Ebay fraud,banking fraud, industrial espionageTechnical services: exploit trade, support services (includinglicense keys), botnet leasingResearch and development: vulnerability research,development of obfuscation techniques.Other services:

“Bullet-proof” hosting (in countries with lacking Internetcontrols)Domain-name falcification“Botnet-warfare”

Page 33: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Example of an exploit auction

Page 34: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Earning money with security violations

Study by T. Holz, M. Engelberth and F. Freiling at theUniversity of Mannheim in April - October 2008.Methodology: recovery of stolen credentials from dropzones.Malware:

Limbo/Nethell: keylogger, infection via drive-by-downloadZeuS/Zbot: keylogger, infection via spam attachments

Page 35: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Impersonation attacks using keyloggers

A keylogger is installed on a usermachine by some attack vector.Keylogger downloads configurationdata from a dropzone.Keylogger monitors keystrokesduring access to specific websitesand uploads them to a dropzone.Attacker retrieves credentials from adropzone and sells it.

Page 36: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Analysis methodology

Collect malware samples from honeypots and spam-traps.Execute malware samples in a specially instrumentedsandbox, record and analyze outgoing communication.Contact a dropzone and download log files.Assess market value of stolen credentials using well-knownestimates.

Page 37: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Kassensturz

Credentials Amount Price range Average value

Bank accounts 10,775 $10 - 1000 $5,387,500Credit cards 5,682 $0.40 - 20 $56,820Social network IDs 78,359 $1 - 15 $587,162Auction accounts 7,105 $1-8 $28,420Email passwords 149,458 $4-30 $2,540,786

Total 224,485 $8,600,688

Page 38: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Summary

Threat landscape is highly dynamic as it is driven byeconomic motivation, and especially organized crime.No “final state of security”Prevention not always possible; intelligent responsemechanisms are strongly needed.

Page 39: Introduction to Computer Security - uni-tuebingen.de · Introduction to Computer Security Security Principles, Vulnerabilities and Threats Pavel Laskov ... Asset valuation: Monetary

Next lecture

Principles of secure communicationSymmetric cryptographyAsymmetric cryptography