Tutun Juhana Telecommunication engineering School of electrical engineering & informatics

40
TUTUN JUHANA TELECOMMUNICATION ENGINEERING SCHOOL OF ELECTRICAL ENGINEERING & INFORMATICS INSTITUT TEKNOLOGI BANDUNG ET4085/ET5085 Keamanan Jaringan Telekomunikasi ET4085/ET5085 Telecommunication Network Security

description

ET4085/ET5085 Keamanan Jaringan Telekomunikasi ET4085/ET5085 Telecommunication Network Security . Tutun Juhana Telecommunication engineering School of electrical engineering & informatics Institut teknologi bandung. Security Principles. - PowerPoint PPT Presentation

Transcript of Tutun Juhana Telecommunication engineering School of electrical engineering & informatics

Page 1: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

TUTUN JUHANA TELECOMMUNICAT ION ENGINEERING

SCHOOL OF ELECTRICAL ENGINEERING & INFORMATIC SINST ITUT TEKNOLOGI BANDUNG

ET4085/ET5085 Keamanan Jaringan Telekomunikasi

ET4085/ET5085 Telecommunication Network Security

Page 2: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

2

Security Principles

Page 3: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

3

Security is the sum of all measures taken to prevent loss of any kind

Loss can occur because of : user error defects in code malicious acts hardware failure, and acts of nature

http://www.clipartof.com

Page 4: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

4

User Errors

Deleting file(s) unintentionallyShared folders without passwordUsing weak passwords

Username: tutunPassword: tutun

Etc.

Page 5: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

5

Code Flaws

Page 6: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

6

Malicious Acts

Spywarewww.comphandyman.com

VirusSIM Cloning Carding

Page 7: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

7

Hardware failure

Denial of Service (DoS)

Page 8: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

8

Acts of nature

Denial of Service (DoS)

Page 9: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

9

Security is the antithesis of convenience

The more secure something is, the less convenient it is

Page 10: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

10

Why Computers Aren’t Secure

Page 11: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

11

Security is an annoyance

Administrators often fail to implement security features in operating systems because doing so causes problems for users

Users also circumvent security choosing easy-to-use (easy-to-guess)

passwords never changing passwords disclosing those passwords to co-workers, or

sharing user accounts. Vendors ship software so that it will

install in the most feature-filled configuration with its security features disabled so that unskilled users won’t run into roadblocks and don’t have to understand and configure it correctly before they use it The vast majority of installations are never

properly secured.

Page 12: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

12

Features are rushed to market

Vendors concentrate their efforts on adding features that make their software more useful, with little thought to security

A perfect example of this is the addition of scripting language support to Microsoft Outlook and Outlook Express. Spreading e-mail viruses

Page 13: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

13

Vendors who spend time on security are eclipsed by the competition

Customers don’t truly value security.If they did, they would use older, well-tested,

security-proven software that doesn’t have all the bells and whistles of the latest versions.

Companies like Microsoft that retrofitted their existing products to work on the Internet decimated their competition.

Had they waited to do it securely, they would have been beaten to market by someone who didn’t.

The end result? The least-secure products always get to market first and become standards.

Page 14: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

14

Computers and software evolve very quickly

Moore’s law : computer hardware will double in power every two years

Protocols that were not developed to be secure were adapted to purposes that they were never intended for and then grew in popularity to a far wider audience than the original creators could have imagined

Page 15: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

15

Programmers can’t accurately predict flaws

The programmers who created a project could never come up with the complete set of attacks that the million hackers who attempt to exploit it will

Page 16: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

16

There is little diversity in the software market

OSes Apps

IIS

Narrowing hackers targets

Page 17: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

17

Vendors are not motivated to reveal potential flaws

They hide their product’s problem

It discourage discussion of their flaws

Page 18: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

18

Patches are not widely deployed and can cause problems when they are installed

Not everyone gets the notice or installs the patch

In fact, the majority of users never install security patches for software unless they actually get hacked

Page 19: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

19

Key Principles of Network Security

Page 20: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

20

(C-I-A)confidentiality, integrity, and availability

Depending upon the application and context, one of these principles might be more important than the others.

Page 21: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

21

ConfidentialityConfidentiality is concerned with preventing

the unauthorized disclosure of sensitive information.

Confidentiality involves the protection of data providing access for those who are allowed to see it, while disallowing others from learning anything about its content

The disclosure could be intentional breaking a cipher reading the information, etc.

or it could be unintentional carelessness or incompetence of individuals

handling the information.

Page 22: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

22

Tools for Confidentiality Encryption Access Control

rules and policies that limit access to confidential information to those people and/or systems with a “need to know.”

Authentication the determination of the identity or role that someone has.

Authorization the determination if a person or system is allowed access to

resources, based on an access control policy Physical Security

Page 23: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

23

IntegrityIntegrity: the property that information

has not be altered in an unauthorized way

The goals of integrity: Prevention of the modification of

information by unauthorized users Prevention of the unauthorized or

unintentional modification of information by authorized users

Page 24: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

24

Tools for integrity Backups: the periodic archiving of data. Checksums: the computation of a function that maps

the contents of a file to a numerical value. A checksum function depends on the entire

contents of a file and is designed in a way that even a small change to the input file (such as flipping a single bit) is highly likely to result in a different output value.

Data correcting codes: methods for storing data in such a way that small changes can be easily detected and automatically corrected.

Page 25: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

25

Availability

Availability: the property that information is accessible and modifiable in a timely fashion by those authorized to do so.

Availability assures that a system’s authorized users have timely and uninterrupted access to the information in the system and to the network.

Tools: Physical protections: infrastructure meant to keep

information available even in the event of physical challenges.

Computational redundancies: computers and storage devices that serve as fallbacks in the case of failures.

Page 26: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

26

Threats and Attacks

Page 27: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

27

Eavesdropping: the interception of information intended for someone else during its transmission over a communication channel.

Trudy

Page 28: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

28

Alteration: unauthorized modification of information. Example: the man-in-the-middle attack, where a

network stream is intercepted, modified, and retransmitted.

Page 29: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

29

Denial-of-service: the interruption or degradation of a data service or information access. Example: email spam, to the degree that it is meant to

simply fill up a mail queue and slow down an email server.

Page 30: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

30

Masquerading: the fabrication of information that is purported to be from someone who is not actually the author

(really is from Trudy)

Page 31: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

31

Correlation and traceback: the integration of multiple data sources and information flows to determine the source of a particular data stream or piece of information.

Page 32: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

32

Repudiation: the denial of a commitment or data receipt. This involves an attempt to back out of a

contract or a protocol that requires the different parties to provide receipts acknowledging that data has been received.

Page 33: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

33

Understanding Hacking

Page 34: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

34

What Is Hacking?

Hacking is the attempt to gain access to a computer system without authorization.

Originally, the term hacker simply referred to an adept computer user, and gurus still use the term to refer to themselves in that original sense.

But when breaking into computer systems (technically known as cracking) became popular, the media used the hacker to refer only to computer criminals, thus popularizing only the negative connotation.

Page 35: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

35

Types of Hackers

There are only two serious types of hackers the underemployed and those hackers being paid by someone to hack.

Hackers fall quite specifically into these categories, in order of increasing threat: Security experts Script kiddies Underemployed adults Ideological hackers Criminal hackers Corporate spies Disgruntled employees

Page 36: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

36

Phreak

Phreaks are hackers with an interest in telephones and telephone systems

Phreak is short for phone phreak

Page 37: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

37

Vectors That Hackers Exploit

Connecting over the Internet

By using a computer on your network directly

By dialing in via a Remote Access Service (RAS)

serverBy connecting via anonsecure wireless network

Page 38: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

38

Black or White?

Page 39: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

39

Kevin Mitnick

was"America's Most Wanted Computer

Outlaw“served five years in prison (four years of it pre-trial), 8 months of that in solitary

confinement, and was released on January 21, 2000

He says: the solitary confinement was very difficult.

Nowfounder of Mitnick Security Consulting,a security firm that offers corporations and agencies, services to better protect themselves against intrusions and attackers.

Page 40: Tutun  Juhana  Telecommunication engineering School of electrical engineering & informatics

http://wp.me/P29YQz-k

40

Kristina Svechinskaya

If convicted, she could be imprisoned for up to 40 years