securitatea calculatoarelor si a retelelor

18
Introduction to Security October 8, 2013

Upload: parama777

Post on 18-Jul-2016

51 views

Category:

Documents


6 download

DESCRIPTION

Securitatea calculatoarelor si a retelelor

TRANSCRIPT

Page 1: Securitatea calculatoarelor si a retelelor

Introduction to Security

October 8, 2013

Page 2: Securitatea calculatoarelor si a retelelor

Welcome!

This will be a long journey…

… so let’s make it interesting and useful!

2

Page 3: Securitatea calculatoarelor si a retelelor

Course StructureNo. Course Title Date

1 Introduction to Security 2013-10-08

2 Security Threats 2013-10-15

3 Securing Network Devices 2013-10-22

4 ACLs & AAA 2013-10-29

5 Firewalls 2013-11-05

6 IDS & IPS 2013-11-12

Midterm Assessment 2013-11-19

7 Endpoint Security 2013-11-26

8 Cryptography 2013-12-03

9 VPNs 2013-12-10

10 MPLS 2013-12-17

11 MPLS VPN 2014-01-07

3

Page 4: Securitatea calculatoarelor si a retelelor

Lab Schedule

All Tuesdays

17-19 ED 011

19-20 This room

20-22 ED 011

Course:

Laura Gheorghe ([email protected])

Greatly skilled lab assistants:

Traian Popeea ([email protected])

Sergiu Costea ([email protected])

4

Page 5: Securitatea calculatoarelor si a retelelor

Grading

The course grade is made up of:

Midterm assessment – single choice, multiple answer, from the first 6 lectures: 2.5 points

Final assessment – the final 6 lectures: 2.5 points

The lab grade is made up of:

Lab activity: 2.5 points

Hands-on exam: 2.5 points

There is a bonus of 1 point for course involvement

The PASSING grade is 5.00

5

Page 6: Securitatea calculatoarelor si a retelelor

Computer security

Security’s first myth says:

“There is security !”

…and we know myths are just wrong!

6

Page 7: Securitatea calculatoarelor si a retelelor

What is there to secure?

Stored data

Business data must not be leaked to competitors

Personal information

Copyrighted software

Securing data must also ensure persistence

Data must not be lost due to attacks or lack of skill

Transactions

Protect information from being tampered with

Make sure that the sender is who he/she claims to be

Make sure the receiver is the one intended

Data is often sent across public (insecure) networks – it can easily be intercepted

7

Page 8: Securitatea calculatoarelor si a retelelor

Intercepting data

Intercepting is also known as “sniffing”

It is often executed directly at the physical layer

“Listening” for interesting traffic on a transmission medium is not ever regarded as an attack

8

Question: Can you avoid having your sensitive data being sniffed?

Answer: NO

But you can make that data useless to the interceptor

Page 9: Securitatea calculatoarelor si a retelelor

Protecting transactions

Encrypted data must not be interpreted by a sniffer, even if it is captured

Thus, encryption is tightly connected to the sender’s and receiver’s identities

Encryption methods can be weak or … better

Weak encryption = it can be broken in a reasonable time

Strong encryption = it can be broken too…

…but it might take you more than a lifetime

A lot more about encryption in a latter lecture

9

Page 10: Securitatea calculatoarelor si a retelelor

What is there to secure?

Secure access

Access to computers

Access to networks

Access to certain privileges

Humans access everything

Humans are the least trustworthy

10

Page 11: Securitatea calculatoarelor si a retelelor

11

Page 12: Securitatea calculatoarelor si a retelelor

Security and humans

Security policies must be in place

…and must be followed.

Regardless of how strong (and expensive) your secure deployment is:

Humans can still write their passwords on post-it notes

Humans can still give their passwords to anyone they trust

Humans can still open tempting attachments…

12

Page 13: Securitatea calculatoarelor si a retelelor

Social engineering

Non-technical intrusion

Involves tricking people to break security policies

Manipulation

Relies on false confidence

Everyone trusts someone

Authority is usually trusted by default

Non-technical people don’t want to admit their lack of expertise

They ask fewer questions.

Most people are eager to help.

When the attacker poses as a fellow employee in need.

13

Page 14: Securitatea calculatoarelor si a retelelor

Social engineering

People are not aware of the value of the information they possess

Vanity, authority, eavesdropping – they all work

When successful, social engineering bypasses ANY kind of security

14

Page 15: Securitatea calculatoarelor si a retelelor

Why is it working so well?

15

Page 16: Securitatea calculatoarelor si a retelelor

Security and complexity

Downside: Complexity brings vulnerability

How secure is a 1000-computer network with >1000 users and 200 different applications?

How secure is a simple button?

Still, we DO need complexity to accomplish our tasks

… so security becomes a continuous process

…and a tedious one!

16

Page 17: Securitatea calculatoarelor si a retelelor

Least privilege

Complex systems are more difficult to secure

The more application deployed, the more possible vulnerabilities

Users and applications must receive the least amount of privileges as possible

“The things you have access to are the things you can break.”

17

Page 18: Securitatea calculatoarelor si a retelelor

The Final Truth

“There is no security on this Earth.

There is only opportunity.”

Douglas MacArthurUS WWII general & war hero

18