SlideShare una empresa de Scribd logo
1 de 233
Copyright James B. Maginnis 2000-2005

1

                                Organizational Kinetics
                                            Copyright 2003 - 2009




Network Design, Security Analysis,

Risk Assessment, DR, and BCP

Presentation By Jim Maginnis
Copyright James B. Maginnis 2000-2005

2
    Today, There are >1 Billion Internet Users!

         600
                                                                  Gartner
         500

         400                                                      eMarketer
         300

         200                                                      Nielsen/NetRati
                                                                  ngs
         100
                                                                  Computer
             0                                                    Industry
                  Internet Users Worldwide                        Almanac ( CIA)
                       2001 (in millions)

    Source: Projections vs. Reality, January 2002: www.emarketer.com
Copyright James B. Maginnis 2000-2005

3
    Agenda

    • Technologies for PANs, LANs, MANs, WANs
    • IT Architecture and Network Design
      considerations
    • Outsourcing Decisions
    • Security Issues and Risk Assessments
    • Fault Tolerance Planning
    • Disaster Recover Planning
    • Business Continuity Planning
    • Management Responsibilities
Copyright James B. Maginnis 2000-2005

4
    Analog Signals

    • Sound Waves ~ Electrical Waves in a Wire
    • Analog Signal         Electrical Wave
    • Sound Wave Characteristics
                                                                 frequency (hertz)
        – Frequency (Hz)                                             = cycles per second

                                             amplitude (volts)
        – Spectrum
              • 100 – 6,000 Hz
              • 300 – 3,000 Hz                                                       Time
                                                                                     (sec)
        – Bandwidth = diff
        – Amplitude (dB)                                             1 cycle
        – Phase (alignment)
Copyright James B. Maginnis 2000-2005

5
    Analog Communications Technology

    • Amplitude Modulation (AM), Frequency
      Modulation (FM), Phase Modulation (PM)
Copyright James B. Maginnis 2000-2005

6
    Digital Signaling

                        • Represented by square waves or pulses
                        • Bit loss rather than attenuation loss
    amplitude (volts)




                           1 cycle




                                                                        time
                                                                          (sec)


                                              frequency (hertz)
                                                  = cycles per second
Copyright James B. Maginnis 2000-2005

7
    Broadband, Baseband, and Narrowband
    • Broadband means telecommunications in
      which a wide band of frequencies is
      available to transmit multiplexed information
        – DSL and Cable (with bandwidth expectations)
              • Usually analog with modem and/or multiplexer
              • At least 256,000 bps – Jupiter Communications
              • Over 6 MHz – IBM Dictionary of Computing
    • Baseband means one digital channel
        – Ethernet (―BASE‖) / Token Ring (―single band‖)
    • Narrow means just voice (500 to 64 kbps)
        – Mobile, Radio, Paging services (―dual-band‖)
Copyright James B. Maginnis 2000-2005

8
    Connection Data Rates / Speed / Bandwidth
Technology         Max Data Rate              Medium    Technology      Max Data Rate Medium
GSM                9.6 to 14.4 Kbps           RF        USB 1.0         12 Mbps           TP
POTS               56 Kbps                    TP        DS3/T-3         44.736 Mbps       Coax
GPRS               56 to 114 Kbps             RF        OC-1/DC-1       51.84 Mbps        Fiber/Coax
BRI ISDN           64-128 Kbps                TP        802.11g         54-108 Mbps       RF
EDGsmE             384 Kbps                   RF        Fast E-net      100 Mbps          TP, Fiber
Satellite          400 Kbps                   RF        FDDI            100 Mbps          Fiber
Frame Relay Normal 56 Kbps                    TP/Coax   OC-3/SDH        155.52 Mbps       Fiber
Bluetooth          1 Mbps                     RF        IEEE 1394       400 Mbps          TP
DS1/T-1            1.544 Mbps                 Various   ATM             155 / 622 Mbps TP / Fiber
UMTS/.16.20 1-3/2-155 Mbps                    RF        OC-12/STM-4     622.08 Mbps       Fiber
T-1C               3.152 Mbps                 Various   SSA or SCSI     80 Mbytes/sec     TP, Fiber
Token Ring         4 to 16 Mbps               Various   Gigabit E-net   1 / 10 Gbps       TP, Fiber
DSL                D:½ to 8 Mbps              TP        Fiber Channel 1 Gbps              Fiber
Cable              D:½ to 52 Mbps             Coax      OC-768          40 Gbps           Fiber
Ethernet           10 Mbps                    Various   DWDM            1 Petabit, 1015   Fiber
Copyright James B. Maginnis 2000-2005


    Advantages of Segmenting – Internetworking
9




    • Reduces the number of users per segment
        – Increase effective bandwidth and security
    • Switch VLANs work at wire speed
    • Using Bridges to segment
        – Each segment in a different collision domain
        – Same broadcast domain for non-routed protocols
    • Using Routers (layer-3) to segment
        – Reduced broadcast messages
        – Improved manageability
              • Multiple active paths
              • Flow and congestion control, explicit packet controls
        – 30% slower connectivity than a bridge
Copyright James B. Maginnis 2000-2005

1
0   Switches, Routers, Bridges, and Gateways
    • LinkSys G-kit: $183.00
    • 3Com NJ200 4-port, SNMP
      QoS, VLAN, 1.4‖ Switch
    • Modular Systems start with
      a chassis (Cisco 6509
      sold $1 billion in 1999)
    • Forum Phone ―Bridge‖
    • Gateways (e.g. Mail)
        – A traffic controller from one
          network or service to another
        – Often a proxy server for
          security and caching
Copyright James B. Maginnis 2000-2005


    Processors – Firewalls
1
1




    • A ―real‖ firewall supports ―stateful packet
      inspection‖ with the ability to open packets to
      ensure that the ones coming from the Internet
      were responses to ones that went out.
        – SOHOware NBG800 Router/Firewall for $70
        – 3COM OfficeConnect Secure Gateway for $250,
          NetScreen, WatchGuard, SonicWALL, SnapGear,
          and Cisco processors also support IPsec VPNs
    • Strongest firewall is Secure Computing’s
      SideWinder with a hardened OS, and can be
      purchased separately, on servers from Dell,
      or embedded in 3COM Ethernet cards
Copyright James B. Maginnis 2000-2005


    Devices From The OSI Model’s Perspective
1
2




                                            • SSL, S/MIME,
                                              PGP, and SET
                                            • NOS API
                                            • VoIP
                                            • Router/Firewall
                                            • IPsec
                                            • Bridge/Switch
                                            • Hubs/Modems
Copyright James B. Maginnis 2000-2005

1
3   What is a Virtual Private Network Connection?
    • A VPN (virtual private network) uses a public
      infrastructure (Internet) to provide remote
      offices or users access to an organization's
      network using ―tunneling‖ rather than using
      more expensive private or leased lines.
    • IPsec (Internet Protocol Security) provides
      two choices of security service:
        – Authentication Header (AH), which essentially
          allows authentication of the sender of data
        – Encapsulating Security Payload (ESP), which
          supports both authentication of the sender and
          encryption of data as well.
Copyright James B. Maginnis 2000-2005

1
4   Network Design Process

    • Consider Cost, Functionality, Manageability,
      Scalability, Adaptability, and Effectiveness
                  • WAN vs. LAN and
                      Upfront vs. Support Costs
                                      – Labor as much as 43% of TCO
                                      – Support normally 80% of TCO
                                      – Training, Downtime, DRP/Recovery
                                      – Client/Server, N-tier, Distributed
                                                    – HP Openview
                                                    – Cisco Netsys
                                                    – Modeling tools
Copyright James B. Maginnis 2000-2005

1
5   Information Architecture Plan

    • Especially critical in today’s multi-vendor,
      distributed environment
    • Common vision on mandatory standards and
      key information & communication interfaces
    • Derive IT Architecture from department’s
      strategic and business requirements
    • A long term process based
      on as many IT and business
      staff as practicable with
      continuous review and update
Copyright James B. Maginnis 2000-2005

1
6   What is an Enterprise IT Architecture?
    • IT Architecture                        “A blueprint to guide
                                               how IT elements
      Components                                 should work
        – Business flows                           together”
          and relationships
        – Application
          development
        – Data descriptions
        – Network / Telecom
        – Operating System(s)
        – Security and privacy
        – Risk factors
        – Migration Plan
Copyright James B. Maginnis 2000-2005

1
7   IAP Models, Protocols, and Standards

    • Reference Model (e.g. OSI)
        – a generic framework
        – logical breakdown of an activity
    • Protocol (e.g TCP/IP)
        – details of how to accomplish specific task
        – required to implement models
    • Standard (e.g. IEEE 802.3)
        – what a reference model and its protocol become
          when approved by an important standard-setting
          group (de jure standard), or are adopted by the
          marketplace ( de facto standard).
Standards are, in essence, the blueprint for the Information Architecture
Copyright James B. Maginnis 2000-2005

1
8   Who Sets Standards?

    • Federal government:
        – by law can establish regulatory standards
        – National Institute for Standards and Technology
    • National standards bodies
        – ANSI, IEEE, or ISO
    • International standards bodies
        – ISO (International Organization for
          Standardization)
        – International Telecommunication Union (CCITT)
    • Other vendor groups, professional
      associations, trade associations, etc
        – IEEE, VESA, ATM Alliance, SQL group, IETF
Copyright James B. Maginnis 2000-2005

1
9    Standards Openness Continuum
Closed                   • proprietary and closed
(unpublished)               – Intel chip, MS Windows
                            – IBM mainframe
                         • proprietary but licensed (for fee)
                            – postscript
                         • proprietary but published (free or token fee)
                            – IBM’s original ISA bus
                            – SUN’s NFS (network file system)
                            – Intel’s PCI (peripheral component
                              interconnect)
                         • non-proprietary consortia or similar
                            – VESA bus
                            – ATM (asynchronous transfer mode) protocol
                            – DVD
    Open                 • „official‟ de jure (open) standards products
    (published)             – Ethernet, ISDN, DSL
Copyright James B. Maginnis 2000-2005


    ―Well-Formed‖ Risk Statement
2
0




            Asset                      Threat       Vulnerability      Mitigation
         What are you                What are you    How could the    What is currently
       trying to protect?             afraid of      threat occur?     reducing the
                                     happening?                            risk?



                     Impact                                  Probability
            What is the impact to the                How likely is the threat given
                   business?                                the controls?


                                Well-Formed Risk Statement
Copyright James B. Maginnis 2000-2005

2
1   Defining Roles / Responsibilities

          Executive
                                      Determine
          Sponsor                   acceptable risk
          “What's
          important?”


          Information
                                     Assess risks      Define security     Measure security
          Security Group                                requirements          solutions
          “Prioritize risks”




          IT Group                                    Design and build       Operate and
          “Best control solution”                     security solutions   support security
                                                                              solutions
Copyright James B. Maginnis 2000-2005

2
2   Security Risk Management Process


                     4       Measuring      1     Assessing
                               Program              Risk
                            Effectiveness




             3      Implementing
                      Controls
                                            2     Conducting
                                                Decision Support
Copyright James B. Maginnis 2000-2005

2
3   Internet Enabled Technology Architectures
         Policies and Standards                               Network Management
                                                                   Software
                                             Management

    Firewalls
    Passwords
    Encryption                                 Content           Software     Authoring
                            Security
                                               and Data           Tools       Tools




                                             Infrastructure

                        TCP/IP           Hypermedia
                                                       Servers     Browsers
                        Network          Databases
Copyright James B. Maginnis 2000-2005

2
4   Requirement Sets for Two Design Options

                    Bare
                                                               “Cadillac”
                   Bones




                               Win-         Implementation            Win-
            UNIX                                             UNIX
                               dows          Environments             dows




                                              Off                             Off
  In         Out             Con-                      In     Out     Con-
                                              the                             the
House       Source           sult                    House   Source   sult
                                             shelf                           shelf
                                               Sources
Copyright James B. Maginnis 2000-2005

2
5   Architecture - Internal vs. External sourcing

    • Costs and Knowledge base
        – Investment in hardware, software and facilities
        – Applications and database technologies
    • Reliability, (DRP and BCP)
        – Redundancy (no single point of failure)
              • Components, systems, multiple sites
    • Entire project or just portion (computer room)
    • Pull campus network lines or pay carrier
    • SSL, certificates, dynamic passwords
        – SecureID, CryptoCard, Safeword
Copyright James B. Maginnis 2000-2005

2
6   Comparison Criteria
    •    Feasibility and Cost/Benefit
    •    Available Resources: What can you do?
    •    Development Time
    •    Developmental and Operational Costs
    •    Efficiency and Ease of Use
    •    Compatibility
    •    Security
    •    Emotional: What do you want to do?
    •    ―Evaluation_Tools‖…http://mime1.marc.gate
         ch.edu/mm_tools/evaluation.html
Copyright James B. Maginnis 2000-2005

2
7   Different Sources of Software Components

                                Source of     When to Go to This          Internal Staffing
                                Application   Type Organization           Requirements
    Producers
                                Software?     for Software

    Hardware                    Generally     For system software and     Varies
    Manufacturers               not           utilities

    Packaged                    Yes           When supported              Some IS and user
    Software                                  task is generic             staff to define
    Producers                                                             requirements and
                                                                          evaluate packages
    Custom Software             Yes           When task requires          Internal staff may
    Producers                                 custom support and          be needed,
                                              system                      depending on
                                              can’t be built internally   application
    In-House                    Yes           When resources and          Internal staff
    Developers                                staff are available and     necessary though
                                              system must be built        staff size may vary
                                              from scratch
Copyright James B. Maginnis 2000-2005


    Applications – Voice Over IP
2
8




    • Transmit voice over                    • Motivations
      IP data networks                         – Very cost effective
        – Voice Signal                         – Multimedia
              • Digitized                        communication
              • Compressed                     – Integrated voice and
              • Converted to IP packets          data network
                and transmitted over IP
                network                      • Challenges
        – Signaling Protocols                  –   Quality of voice
              • Set-up and tear down the       –   Interoperability
                calls                          –   Security
              • Locate users                   –   Integration with PSTN
              • Negotiate capabilities
                                               –   Scalability
    • Waiting for IPv6
Copyright James B. Maginnis 2000-2005


    Applications – New IPv6 Functionality
2
9



    • 128-bit Addressing
        – Then every IP address with a microphone and
          speaker will be a phone and vice versa, every
          camera will also be searchable in real time
    • More Secure – Phone bill vs. credit card
    • Quality of Service (QoS) Queuing
        – Critical for CIT Voice and Video
    • Multicast Services
        – The ability to send real time information to
          multiple locations – Pay-per-View and per-Play
    • Improved Mobile Support
        – No wires for a billion devices remotely monitored
Copyright James B. Maginnis 2000-2005


    Applications – Voice over ISDN and ATM
3
0




    • Point-to-point ISDN and ATM networks are
      the solution today
    • 128kbps ISDN Video Conferencing works
      better than sharing a 1.54Mbps T1
    • ATM (asynchronous transfer mode) use 53-
      byte cell units in a multiplexed dedicated-
      connection switching environment
    • ATM is the current most common solution for
      internetworking a campus or WAN backbone
      with real-time analog and data requirements
Copyright James B. Maginnis 2000-2005

3
1   5 Top Ways To Lower Costs & Raise Uptime

    •    Converge multiple WAN/MAN backbones
    •    Improve Quality of Service (QoS)
    •    Support Voice Over IP (VOIP)
    •    Cheap & easy IPsec VPNs to remote users
    •    Improve network management control
    •    All with
         different
         security
         issues
Copyright James B. Maginnis 2000-2005

3
2   Network Management Goals

    • Monitor network, backup, and vendor health
    • Automatic restoration options
    • Dedicated 7 x 24 hour local support w/DRP
    • Demonstrate business continuity plans
    • Dynamic reconfigurations
    • Bandwidth-on-demand (BoD) pools
      alternative to temporary peeking or DRP
    • Renewal of insurance policies
    • Meeting industry rules
Copyright James B. Maginnis 2000-2005

3
3   Need To Consider Current Environments

    • Platform alternatives
        – Host or mainframe
        – Mid-tier (UNIX) platforms
        – Mid-tier (Windows NT)
        – Client/Server
        – Three-tier web-based
        – Peer to Peer
        – Distributed
    • Hardware and software standards
    • Support resources’ ability to deploy solutions
Copyright James B. Maginnis 2000-2005

3
4   Metropolitan Area Nets (MANs)

    • Metropolitan backbones
    • SONET rings – solving the
      vulnerabilities of last mile
    • 25 Mbps Microwave
    • Single mode fiber, 10-Gigabit
      Ethernet will go 40 kilometers
      this year ($24 billion). Expected
      to capture 30% of high speed
      Internet market by ’05. (Gartner)
    • More ASPs, MSPs, SSPs – Trust / Security
Copyright James B. Maginnis 2000-2005

3
5   Trends in Telecommunications and Voice

    • Convergent system for V&D requirements
    • Open access with large bandwidth changes
    • Starbucks began with 2,000 802.11 routers
    • Virtual Private Networks for Global Model
    • Rainbow consortium of Microsoft, IBM, Intel,
      AT&T Wireless, and Verizon to create a
      single nationwide Wi-Fi company / network
    • In the meantime, Cable will be the big winner
      for Internet, TV, movies, and phone services
           – Satellite’s 25% share of TV will hold
           – DOCSIS 1.1 supports tiered services
Copyright James B. Maginnis 2000-2005

3
6   Trends in Telecommunications and Voice

    • Need to get all this new stuff to work
      together = increase in central network
      management software
    • Need to get it to work harder (60% idle)
        – Reselling excess capacity
        – Return to MIS Data Center focus
    • Increasing security (esp. governmental and
      biotechnologies) and ethical concerns
    • Thinner margins and continued bankruptcies
    • New SPAM laws and New Taxes!
Copyright James B. Maginnis 2000-2005


    EDI – B2B Legacy Communications
3
7




        High Support Needs = Security Issues

                Buyer                                                     Supplier
                    RFP

                                                              Response to RFP
                       Purchase Order
                                                         P.O. Acknowledgement

                Purchase Order Change
                                                P.O. Change Acknowledgement

                                       Functional Acknowledgement
                                          (for each Transaction )


              RFP = Request for Proposal                  P.O. = Purchasing Order
Copyright James B. Maginnis 2000-2005

3
8   The Role of Extranets (was called internets)
     Adds everyone else‟s security problems


                                             Access Issues

                                             eBusiness
                                                             No Firewalls
    Insecure VPNs
                                            Viruses
                                                         Wireless Access
Copyright James B. Maginnis 2000-2005

3
9    Internet Applications = More Security Issues
     Businesses are rapidly installing intranets, extranets,
     and enterprise information portals throughout their
     organizations in order to enhance communication
     and collaboration, and to publish and share business
     information easily and at lower cost.

       E-mail (S/MIME)                                      Telnet (SSH)

                                              Popular
                                             Uses of the         File
    E-Commerce (SSL)                          Internet         Transfer
                                                            Protocol (PGP)

         Internet Relay                                    Search Engines
           Chat (VPN)                                       (Anonimizer)
Copyright James B. Maginnis 2000-2005

4
0   Groupware for Enterprise Collaboration
     Enterprise Collaboration       Groupware                                Database
     Systems (ECS) support              for                                  Access
     communication, coordination    Enterprise
                                                                             Security
     and collaboration among the   Collaboration
                                                                             Concerns
     members of business teams
     and workgroups.       Often set up with full                           access

      Electronic                                Electronic          Collaborative Work
    Communications                             Conferencing            Management
        Tools                                     Tools                   Tools

    •E-Mail                                  •Data Conferencing      •Calendaring
    •Voice Mail, IP Phone                    •Voice Conferencing     •Task and Project Mgt
    •Web Publishing                          •Videoconferencing      •Workflow Systems
    •Faxing                                  •Discussion Forums      •Knowledge Mgt
                                             •Electronic Meetings    •Document Sharing
Copyright James B. Maginnis 2000-2005

4
1   Electronic Conferencing = Access Issues

     • Data Conferencing
           – E.g.. MS-Netmeeting
     • Voice Conferencing
     • Videoconferencing
           – Real time need point
             to point connections
     • Discussion Forums
     • P-T-P Chat (IRC)
     • Electronic Meetings
Copyright James B. Maginnis 2000-2005

4
2   Communications and Collaboration Tools

    •   Electronic Mail
    •   Voice Mail
    •   Faxing
    •   Web Publishing
    •   Calendaring/Scheduling
    •   Task/Project Management
    •   Workflow Systems
    •   Knowledge Management
        More Access Worries!
Copyright James B. Maginnis 2000-2005


    Applications – Internal and Off The Shelf
4
3




    • Web Pages
       – Static vs. dynamic
    • Database
       – Storage
    • Legacy MIS
      systems

     Access control is
     a never-ending
     security effort!
Copyright James B. Maginnis 2000-2005


    Applications – Buffer Overflow Prevention
4
4



    #include <stdio.h>
     void main(void){
        char buffer[50];
     // gets( buffer );
        fgets( buffer, 49, stdin );
        buffer[49] = 0;
        printf("Input: %sn", buffer);
     }
     When using gets(), indeterminate behavior
     may result from excessive input length.
     Thus, fgets() should be favored over gets().
Copyright James B. Maginnis 2000-2005

4
5   Security Must Be Integrated With SDLC
    • All security considerations should be
      documented in the standard SDLC docs
    • Develop Needs Statement
       – Access and other Controls
       – Audit and Integrity Review
    • All test plans will include testing security,
      internal controls, and audit trail features and
      take place in a secure area
    • The CSO will work with the component
      sponsor to build and sign off on a Security
      Requirements Workplan and Validation Plan
Copyright James B. Maginnis 2000-2005

4
6   Security - Overview

    Accessibility to
    authorized, but
    not others
    – Permanent - not
      alterable (can't
      edit, delete)
    – Reliable -
      (changes
      detectable)
Copyright James B. Maginnis 2000-2005


    Security – Firewalls
4
7




    Stateful Inspection
     Checking inside packets
       One firewall is not
           enough!
    A DMZ (demilitarized zone)
          is a small network
         inserted between a
          company's private
      network and the outside
        networks to prevent
         external users from
       getting direct access to
      sensitive company data.
Copyright James B. Maginnis 2000-2005

4
8   Processors                               Internet      Web Browsers


    • Modems                                             Router

                                                         Switch
    • Multiplexers                                        Firewall
    • Internetwork Processors                             Load Balancer
                                                          SSL Acceleration
        – Repeaters
                                                         Switch   Appli-
        – Hubs                                                    cation
                                                                  and
        – Switches                                                Web
                                                                  Servers
        – Bridges                                       Switch

        – Routers                                        Firewall
                                                        LAN Backbone Switch
        – Gateways                    V.92                        New and
                                    Modem                         Legacy Data
    • Firewalls                      Bank                         Resources
Copyright James B. Maginnis 2000-2005


    Security – Threats / Responses / Newsletters
4
9




    • Hacking, viruses, theft, patches, shredding
    • Web related, DOS, spoofing, firewalls
    • CERT Coordination Center
        – At Carnegie-Mellon (www.us-cert.org)
    • SANS Institute
        – For-profit with free services (www.sans.org)
    • National Infrastructure Protection Center
        – Now Homeland Security (www.dhs.gov)
    • Microsoft (www.microsoft.com/security)
    • Trend Micro Anti-virus Software
        – Now Japanese owned (www.trendmicro.com)
Copyright James B. Maginnis 2000-2005

5
0   Passive vs. Active Threats

                                     CERT received
                                     53,000 reports
                                    of active attacks
                                         in 2001




    Eavesdropping / traffic                    Packets intended to disrupt
    analysis for attack or                     service, to gain access, or
    info “black markets”                       modify information.
Copyright James B. Maginnis 2000-2005

5
1   Model for Network Security
Copyright James B. Maginnis 2000-2005


    NAT Router ―Firewall‖ Web Service Example
5
2


                                                                   Web Host
                                              Internet
                                                                  130.27.8.35
                          To 24.88.48.47:20           To 130.27.8.35:80
                        from 130.27.8.35:80          from 24.88.48.47:20

               Router 24.88.48.47 with NAT that Masquerades
          To 192.168.0.20:x                          To 130.27.8.35:80
         from 130.27.8.35:80                        from 192.168.0.20:x

           Host                    Web Client        Host           Host
        192.168.0.10               192.168.0.20   192.168.0.30   192.168.0.40
        Web Server                                 FTP Server
         port 80                                    port 23
Copyright James B. Maginnis 2000-2005

5
3   PGP (Pretty Good Privacy) Encryption

    • See www.pgpi.com and www.pgp.com




     Mostly used for
     encrypting FTP
    files and e-mail;
     is international
    banking standard
Copyright James B. Maginnis 2000-2005

5
4   Example PGP Encrypted eMail

    To: “John Doe" <johndoe@hotmail.com>
    From: Jim Maginnis <jimmaginnis@email.uophx.edu>
    Subject: EBUS400: PGP Endeavor...
    Cc:
    Bcc:
    X-Attachments:

    -----BEGIN PGP MESSAGE-----
    Version: PGPfreeware 6.5.2 for non-commercial use
       <http://www.pgp.com>

    qANQR1DBwU4D6cjDU+QAxCwQB/9IZFOIuDSIIQbwa28SQ63DDioFb4bH4bmKfopX
    cvdDVQ1X53fSJzyLt12RslfQToje8YxRNidYMNg1zDTT7CR9q7LRFoAwBFVtQhWJ
    jFNXn1+aE8oePReMi6vS0DXSSDfgDuUb1R+c8htHoeik6Oebe9R90J3d51yyCojV
    /5Io5nlM7T11PDaWqsjLr2ttrSySzARt5fAJ9l1mOH+hSl1YebRjZPaxWw+bsYuqN
    a0GYr2UdwgE1u5HQuhZ+bOIbSliShfKiNuDGHe6VJrchROHnC9Po2JWAOD7wMFq6
    STZ/MPGzViaCUaaWPLSKleiURUh4Ly5/LaNYkaumO9vh+241FPqtZKqRVmHRg6dY
    Ro9edu01qTiXJj25cXHxeNMdA1txLxR3ontbExow+ML5kxs=
    =68Hd
    -----END PGP MESSAGE-----
Copyright James B. Maginnis 2000-2005


    PGP: Things to be aware of…
5
5




    • Does not encode mail headers
          – Subject can give away useful information
          – To and From provides traffic analysis
            information as well as usernames
    • PGP uses original file name and
      modification date
    • Certificates often verify that the sender is
      ―John Smith‖ but not which ―John Smith.‖
      So, PGP allows pictures in certificates.
Copyright James B. Maginnis 2000-2005

5
6   Kerberos For Authentication
         (Radius Server also for
         centralized passwords)
Copyright James B. Maginnis 2000-2005

5
7   Kerberos Issues

    • Kerberos transfers username/passwords
      in open text from Masters to Slaves
    • Cryptographers worry that it might be
      breakable through reversing Ksession
    • V4 only uses 4 bytes for IP address, so
      does not support Novel, Appletalk, IPv6
    • V5 allows easier spoofing and delegation
      but greatly improves ticket renewal and
      allows for public key cryptography
Copyright James B. Maginnis 2000-2005

5
8   Breaking DES

    • DES released
      March 17th, 1975
    • Electronic Frontier Foundation concerned with
      wide use and exaggerated government claims
      of being unbreakable while attempting to bully
      companies into only using DES method
    • In 1997, RSA offered $10,000 to break; was
      claimed 5 months later using the Internet
    • Everyone now uses Triple-DES
    • NIST has chosen the Rijndael encryption
      algorithm to supplant DES starting in 2003
Copyright James B. Maginnis 2000-2005

5
9   Breaking RFID (40-48 bit key / 24-bit packets)
    • Small, wireless Radio-Frequency ID (RFID) Digital
      Signature Transponder (DST) consisting of a small
      encapsulated passive microchip and antenna coil.
        – Vehicular Immobilizers (automobile keys w/rolling codes)
        – Electronic Payment (ExxonMobil SpeedPass )
    • Future use by Wal-mart and others of an EPC
      (Electronic Product Code) wireless barcode and
      may soon be available for as little as 5 cents/unit.
    • EPC tags lack sufficient circuitry to implement even
      symmetric-key cryptographic primitives, don’t use
      128-bit keys, and key case/slots are not shielded
Copyright James B. Maginnis 2000-2005

6
0   Private and Public-Key Use
Copyright James B. Maginnis 2000-2005

6
1   Future Encryption Keys

    Secret value is added by both parties to
    message before the ―hash‖ function is used
    to get the Message Integrity Check.
Copyright James B. Maginnis 2000-2005

6
2   Global Scanning Activities




                               http://www.incidents.org/
Copyright James B. Maginnis 2000-2005

6
3   Examples of Weak Passwords

    • Default or empty passwords
    • Same as the username
    • The word ―password‖
    • Short words, 1 to 3 characters long
    • Words in an electronic dictionary (60,000)
    • User’s hobbies, family names, birthday, etc.
      => most likely last or maiden name
    • Phone number, social security number,
      street address, license plate number, etc.
Copyright James B. Maginnis 2000-2005

6
4   Password Gathering
    • Look under keyboard, telephone etc.
    • Look in the Rolodex under ―X‖ and ―Z‖
    • Call up pretending to from ―micro-support‖ or
      a senior merger manager and ask for it
    • ―Snoop‖ a network for plaintext passwords.
    • Tap a phone line with special modem
    • Forward the phone line remotely and fake
      login request (and pass to legitimate login)
    • Use a ―Trojan Horse‖ program to record key
      stokes (e.g.: http://www.winwhatwhere.com/)
Copyright James B. Maginnis 2000-2005

6
5   Viruses, Worms, and Trojan Horses
    •    Virus - code that copies itself into other programs
    •    Bacteria - replicates until fills disks or CPU cycles
    •    Worm - uses email / file undocumented features
    •    Payload - harmful things it does after it has spread
    •    Trojan Horse - looks good, but does bad things
    •    Logic Bomb - malicious code activates on an event
    •    Trap Door (Back Door) - undocumented entry point.

                      Needs Host Program                      Independent


          Trapdoors             Logic           Trojan   Viruses   Bacteria   Worms
                                Bombs           Horses
Copyright James B. Maginnis 2000-2005

6
6   Types of Viruses
    • Boot Sector Virus - infects the boot sector of a
      disk, activating on boot up (1st MS-DOS viruses)
    • Memory-resident Virus - lodges in main memory
      as part of the residual OS
    • Parasitic Virus - attaches itself to executable files
      as part of their code. Runs when program runs
    • Stealth Virus - explicitly designed to hide from
      Virus Scanning programs
    • Polymorphic Virus - mutates with every new host
      to prevent signature detection
    • KEEP PATCHES & DEFINITIONS UP TO DATE
Copyright James B. Maginnis 2000-2005

6
7   Honey Pots, Tar Pits, and Sink Holes

    • A Honey pot is a trap to detect and deflect
      attacks with a ―dangle‖ computer or data
        – Such as 9/11 ―no plane at the Pentagon‖ hoax
    • Tar Pits are a section of a honey pot or DMZ
      designed to slow down TCP based attacks
    • Sink Holes are the network equivalent with
      BGP routers to assist analyzing attacks
        – Monitor attack noise, scans, and use of dark IPs
        – Ready to advertise routes and accept traffic to
          minimize risk while investigating incident
Copyright James B. Maginnis 2000-2005

6
8   What To Monitor In A Sink Hole

    • Scan ―Dark‖ unused IP space
    • Scan for infections of Worms and Bots
    • Look for backscatter from attacks & garbage
      traffic on networks (RFC-1918 leaks)
    • Expand dedicated Sink Hole router with a
      variety of tools to pull DOS/DDOS attack
        – Arbor Network’s Peakflow checks scan rates
    • 2 Router IP addresses: 1 for management
      and 1 for Anycast DNS caches to share load
Copyright James B. Maginnis 2000-2005

6
9   More Sink Hole Notes

    • SQL Slammer Worm doubled infections
      every 8.5 sec to spread 100x than Code Red
        – at peak, was scanning 55 million hosts / second
    • Sink holes have proven their value, with
      worm mitigation (after containment)
    • Need to work at various security levels
    • No IGB on Sinkhole; Sinkhole is a RRc
    • Must not loop traffic back out management
      interface (remotely controlled: VNC / Telnet)
Copyright James B. Maginnis 2000-2005

7
0   The Good, Bad, and Ugly Packets
    • The Good - legitimate communications
    • The Bad - poorly configured equipment
    • The Ugly - intended to do damage
        – Speed is too high (storming)
        – Host is violating port-usage policy
        – UDP packet contains no data
        – No data transfer, too many ports or IP
          destinations
        – Offset + Length > 65,608 bytes for Fragments
        – Responses without requests, responses have
          different data from requests
Copyright James B. Maginnis 2000-2005

7
1   So Many Packets, And So Little Time
    • A 50% loaded 100base-t Ethernet carries
      about 20,000 pps, or 1.2 million per minute
    • Detecting the Ugly is difficult because they
      are such a small fraction of the total, and the
      Bad often set off false alarms. Among the
      techniques that are being used are:
        – Single packet signatures
              • illegal flags, long fragments
        – Timing based techniques
              • DOS Floods / automated Telnet
        – AI programs that train or learn characteristics
        – Flow-based statistical schemes
Copyright James B. Maginnis 2000-2005


    True Examples of ―Bad‖ and ―Ugly‖
7
2




    • A T1 Internet is completely jammed for 45
      minutes from 120 hosts downloading 1.2 MB
      of files from an CAI FTP server.
    • One week-end before Napster was
      reportedly going out of business, two hosts
      jam the T1 connection by downloading
      Gigabytes of data from peer-to-peer servers.
    • A host appears to be repeatedly scanning
      the network for servers on a half-dozen
      different port numbers.
    • A rapid rate of short fragmented packets
      brings down a top-ten site for half a day.
Copyright James B. Maginnis 2000-2005

7
3   Some Techniques to Determine The Ugly

    1. Data Flow follows IP Rules, transfers data:
      Good unless -
      Ugly - Speed is too high
      Ugly - Host is violating port-usage policy
      Ugly - UDP packet contains no data
    2. Host is receiving rejects (TCP or ICMP)
      Bad - Web Server or client ending persistent
      connections, such as Napster
      Ugly - From, or to, too many ports or IP
      destinations
Copyright James B. Maginnis 2000-2005

7
4   Examples of The Ugly (continued)

    3. Host is sending packets, but no replies:
      Bad - Web load-balancer is bypassed for
      down-stream traffic
      Ugly - No data transfer, too many ports or IP
      destinations
    4. Fragmented IP packets. Bad unless:
      Ugly - very short and/or speed is too high
      Ugly - Offset + Length > 65,608 bytes
Copyright James B. Maginnis 2000-2005

7
5   Examples of The Ugly (continued)

    5. Pings and Ping Responses
      Good - if balanced and reasonable
      Ugly - Responses without requests,
      responses have different data from requests
                 (covert channel)
      Only a few new types of legitimate network
      activity appear each year. It’s much easier to
      characterize the new legitimate network
      protocols, than it is to keep up with the
      hacker community’s latest creations.
Copyright James B. Maginnis 2000-2005

7
6   Examples of The Ugly (continued)
    • Packets that violate Internet Protocols in ways that
      have been found to cause computers, firewalls, or
      intrusion detection systems (IDS) to crash or
      operate improperly.
        – Teardrop Attack - IP Fragments that overlap.
        – Ping of Death - IP Fragmented Datagram with Offset
          plus Length > 65,507
        – (one method - # ping -l 65510 192.168.4.5 )
    • Short packets, perhaps belonging to A above, that
      arrive at such a high rate that they cause damage.
        – Rapid TCP ―SYN‖ packets, or Isolated Fragments - tie
          up computer memory.
Copyright James B. Maginnis 2000-2005

7
7   Examples of The Ugly (continued)

    • Packets going to various hosts and ports that are
      being used to map the network - looking for
      vulnerable hosts.
        – TCP ―SYN-FIN‖ or other improper TCP Flag
          combinations
        – UDP Packets with zero data bytes
        – TCPs that cause TCP ―Reject‖, or UDPs that causes
          ICMP ―Host Unavailable‖
    • Hardest to detect, packets that would belong to
      "The Good" except that the two hosts should not be
      talking to each other, at least not on that service or
      port number.
        – Detection - Compare to database of allowed Server ports.
Copyright James B. Maginnis 2000-2005

7
8   Microsoft Break-in Example

    • Employee created file on PC at home and
      caught 2-month old virus
    • Employee e-mailed virus to self at work
    • Was not caught by a Mail Gateway
    • Workstation also did not have patches nor
      definition files up to date
    • Payload was an open tunnel to a Ukrainian
    • Who downloaded all development source
      (e.g. Windows XP); was not caught = no IDS
Copyright James B. Maginnis 2000-2005

7
9   Anomaly-based Intrusion Detection

                                            High statistical variation in
                                            most measurable network
                                            behavior parameters results
                                            in high false-alarm rate
Copyright James B. Maginnis 2000-2005

8
0   Distributed Host-based IDS


                                                                   Highly recommended
                                                                   for critical servers



                                     Modules must be installed and configured on hosts.
Copyright James B. Maginnis 2000-2005

8
1   Signature-based IDS
     Data Packets are compared to a growing library
     of known attack signatures. These include port
     numbers or sequence numbers that are fixed in
     the exploit application, and sequences of
     characters that appear in the data stream.
Copyright James B. Maginnis 2000-2005


    Six ―Signatures‖ from the Snort Database
8
2


    • alert tcp $EXTERNAL_NET any -> $HOME_NET 7070 (msg: "IDS411
      - RealAudio-DoS"; flags: AP; content: "|fff4 fffd 06|";)

    • alert udp $EXTERNAL_NET any -> $HOME_NET any (msg: "IDS362
      - MISC - Shellcode X86 NOPS-UDP"; content: "|90 90 90 90 90
      90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90
      90|";)

    • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS359 -
      OVERFLOW-NOOP-HP-TCP2";flags:PA; content:"|0b39 0280 0b39
      0280 0b39 0280 0b39 0280|";)

    • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS345 -
      OVERFLOW-NOOP-Sparc-TCP";flags:PA; content:"|13c0 1ca6 13c0
      1ca6 13c0 1ca6 13c0 1ca6|";)

    • alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS355 -
      OVERFLOW-NOOP-Sparc-UDP2"; content:"|a61c c013 a61c c013
      a61c c013 a61c c013|";)

    • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg: "IDS291
      - MISC - Shellcode x86 stealth NOP"; content: "|eb 02 eb 02
      eb 02|";)
Copyright James B. Maginnis 2000-2005

8
3   Signature-based IDS May Miss New Attacks


                     Back Orifice
                                                 Land Attack
                                                                Attacks with Names



                                            Win Nuke
                                                               Attacks without Names
                                                                  (not analyzed yet)
           IP Blob


                                                Trino
                                                                Alarm on Activities
                                                                  in these areas.
Copyright James B. Maginnis 2000-2005

8
4   Flow-based IDS Technology

       An approach that recognizes normal traffic
           can detect new types of intrusions
                                                    Attacks with Names
                    Back Orifice
                                                    Attacks without Names
                                Land Attack           (not analyzed yet)
                    FTP                   Web
                               Win Nuke             Normal Network Activities

    IP Blob
                                                      Alarm on Activities
                                  Trino               in this areas.
           NetBIOS
                                            Email
Copyright James B. Maginnis 2000-2005

8
5   Flow-based Statistical Analysis
                                                         A “Flow” is the stream of
                                                         packets from one host to
                                                         another related to the same
                                                         service (e.g., Web, email,
                                                         telnet, …). Data in packet
                 Flow-                       Flow-
                Statistics                  Statistics   headers is used to build up
                Counters                    Counters     counts (leads to high
           Number of Packets
                                                         speed).
        Number of Total Bytes                            After the flow is over,
        Number of Data Bytes                             counters are analyzed and a
            Start Time of Flow
                                                         value is derived for the
            Stop Time of Flow
                                                         probability that the flow was
                                                         crafted, perhaps for probing
              Duration of Flow
                                                         the network for
    Flag-Bit True-False Combo                            vulnerabilities or for denial
           Fragmentation Bits                            of service.
    ICMP Packet Responses to
                UDP Packets

                                              Counters
Copyright James B. Maginnis 2000-2005

8
6   IDS Types Should be Combined

      Host-    Can detect misuse of OS access
      Based          and file permissions.
    Signature Can detect attacks embedded in
     -Based network data - if signature is known
    Anomaly On host or network: can detect new
     -Based     types, but high false alarm rate
      Flow-   Can detect new types of attacks by
      Based    network activity. Should be used
              with Host- and/or Signature-Based
Copyright James B. Maginnis 2000-2005

8
7   The Stages of a Network Intrusion

    1. Scan the network to:        Flow-based "CI" and/or signature-based
        • locate which IP addresses are in use,
        • what operating system is in use,
        • what TCP or UDP ports are ―open‖
           (being listened to by Servers).
                                                            Signature-based
    2. Run ―Exploit‖ scripts against open ports
    3. Gain access to ―suid‖ Shell (―root‖ privileges)           Host-based
    4. Download from Hacker Web site special versions of
    systems files that will let Cracker have free access in the
    future without CPU or disk usage being noticed by auditing
    programs.                 Signature-based "Port-Locking", Host-based
    5. Use IRC (Internet Relay Chat) to invite others to the feast.
                                            Signature-based "Port-Locking", Host-based
Copyright James B. Maginnis 2000-2005

8    Web Server                                                      Browser
8                              One Solution: Segment
     Application                                                     Application
       Layer                        Bridge-Router-Firewall             Layer
       (HTTP)                          can drop packets               (HTTP)
         Port 80                                                      Port 31337
     Transport
                                           based on                  Transport
     Layer                           source or destination,          Layer
     (TCP,UDP)                      IP address, and/or port          (TCP,UDP)

    Segment No.                                                      Segment No.
    Network                                                          Network
    Layer (IP)                                                       Layer (IP)
     IP Address                       Network       Network             IP Address
    130.207.22.5                      Layer         Layer              24.88.15.22

     E'net Data                                    Token Ring        Token Ring
                                      E'net Data
     Link Layer                       Link Layer Data Link Layer   Data-Link Layer

        Ethernet                                    Token Ring       Token Ring
                                      E'net Phys.
     Phys. Layer                      Layer         Phys. Layer      Phys. Layer
Copyright James B. Maginnis 2000-2005

8
9   Simple Network Man. Protocol v1, v2, and v3

    • SNMPv2 makes use of TCP for ―reliable,
      connection-oriented‖ server. SNMPv1 is
      ―connectionless‖ since it utilized UDP (rather
      than TCP) as the transport layer protocol.
    • Addressed by version 2:
        – Lack of support for distributed management
        – Functional deficiencies (since v2 can use
          TCP/IP and Novel IPX)
    • Addressed by version 3:
        – V1 used a community name as a password
Copyright James B. Maginnis 2000-2005

9
0   Security - Authentication

    • Authentication – process to ensure both
      the message’s content and sender’s identity
      have been verified by an authorized source
      and content was not altered.
    • Digital Certificate – contains digital identity
      information including; name, public key,
      operational period, and serial number.
    • Certificate Authority – authorized issuer of
      digital certificates
Copyright James B. Maginnis 2000-2005

9
1   X.509 Authentication Service (e.g. Verisign)
    • An International Telecommunications Union
      (ITU) recommendation (versus ―standard‖)
      for allowing computer host or users to
      securely identify themselves over a network.
    • An X.509 certificate purchased from a
      ―Certificate Authority‖ (trusted third party)
      allows a merchant to give you his public key
      in a way that your Browser can generate a
      session key for a transaction, and securely
      send that to the merchant for use during the
      transaction (padlock icon on screen closes to
      indicate transmissions are encrypted).
Copyright James B. Maginnis 2000-2005

9
2   X.509 Authentication Service (continued)

    • Once a session key is established, no one
      can ―high jack‖ the session (after your enter
      your credit card information, an intruder can
      not change the order and delivery address).
    • User only needs a Browser that can
      encrypt/decrypt with the appropriate
      algorithm, and generate session keys.
    • Merchant’s Certificate is available to the
      public, only the secret key must be
      protected. Certificates can be cancelled if
      secret key is compromised.
Copyright James B. Maginnis 2000-2005

9
3   VISA SET Steps in a Transaction
    1. Customer opens account with card company or bank that supports SET
    2. Bank issues X.509 certificate to Customer with RSA Public-Private Keys
    3. Merchant has two certificates, one for signing messages and one for key
         exchange
    ----
    4. Customer places an order
    5. The Merchant sends the customer a copy of his certificate
    6. The Customer sends Order Information (OI), and Payment Information
         (PI) encrypted so the Merchant can not read it
    ---
    7. Merchant requests payment by sending PI to the ―Payment Gateway‖
         (who can decrypt it) and verifies Customer’s credit is good
    8. Merchant confirms the order to the Customer
    9. Merchant ships goods to Customer
    10. Merchant sends request for payment to the Payment Gateway which
         handles transfer of funds
Copyright James B. Maginnis 2000-2005

9
4   Why Is SET Not Happening? (but PayPal is)




                                            But, Merchant must pay
      Issuer gets
    greatest benefit
Copyright James B. Maginnis 2000-2005

9
5   Covert Channels

    • Sending data in a way that network watchers
      (sniffer, IDS, ..) will not be aware that data is
      being transmitted.
    • For IP Networks:
        – Data hidden in the IP header
        – Data hidden in ICMP Echo Request and
          Response Packets
        – Data tunneled through an SSH connection
        – ―Port 80‖ Tunneling, (or DNS port 53 tunneling)
        – In image files.
Copyright James B. Maginnis 2000-2005

9
6   Packet Header Hiding: Normal Packet
            20-64 bytes           20-64 bytes             0-65,488 bytes

          IP Header TCP Header DATA


                                                                Dear Friend,
                                                                  I am having a good
                                                                time at the beach.




                                  TCP Source Port

                                        TCP Destination Port




      IP Source Address

             IP Destination Address
Copyright James B. Maginnis 2000-2005

9
7   NOTE: Long IP Packets Are Fragmented
            20-64 bytes          20-64 bytes                    0-65,488 bytes

          IP Header TCP Header DATA

                                                                      Dear Friend,
                                                                                                    watching the waves
                                                                        I am having a good
                                                                                                    roll in.
                                                                      time at the beach.




                                 TCP Source Port
                                                                                                        The
                                                                                                        TCP
                                         TCP Destination Port




                                                                                                        Header
      IP Source Address                                           IP Source Address
                                                                                                        is not
              IP Destination Address                                       IP Destination Address

       IP Ident = x                                                IP Ident = x                         repeated
       More Fragments = True.                                      More Fragments = False.
Copyright James B. Maginnis 2000-2005

9
8   Other Convert Channel Tools

    • SSH (SCP, FTP Tunneling, Telnet
      Tunneling, X-Windows Tunneling, ...) - can
      be set to operate on any port (<1024 usually
      requires root privilege).
    • Loki (ICMP Echo R/R, UDP 53)
    • NT - Back Orifice (BO2K) plugin BOSOCK32
    • Reverse WWW Shell Server - looks like a
      HTTP client (browser). App headers mimic
      HTTP GET and response commands.
Copyright James B. Maginnis 2000-2005

9
9   Steganography

       The hiding of a secret message within an
      ordinary message so that no one suspects it
      exists. Ideally, anyone scanning the data will
         fail to know it contains encrypted data.
        see http://www.jjtc.com/Steganography
Copyright James B. Maginnis 2000-2005

1
0
0
    Detecting Covert Channels
    • A network IDS will detect a ―Ping Unbalance‖
      - more Ping Responses than Requests
    • Block all ICMP packets at firewall
    • Signature-based IDS will detect known
      rogue programs
    • Port 53 Tunneling - Block inbound and
      outbound TCP/UDP-53 packets at firewall
      except to/from known internal DNS servers
    • Port 80 Tunneling - look for long-lasting
      flows to outside server, excess client-to-
      server data flow
Copyright James B. Maginnis 2000-2005

1
0
1
    Detecting Covert Channels (continued)
    • Port-profile violation
    • Steganography - If Zombie, look for Port-
      profile violation, or known hacker-site server.
    • Monitor for new and unknown processes
    • Check for new or unknown ports and
      devices
    • Know and understand all ―suid root‖ or
      administrator programs
    • If you don’t need an account - delete it!
    • Check System logs
Copyright James B. Maginnis 2000-2005

1
0
2
    Middleware Security Policies and Software
    • No Read Up (Simple Security Property): - a
      subject can only read an object of less or
      equal security level
    • No write down (*-Property): - a subject can
      only write to an object of greater or equal
      security level (can not lower the security
      classification of information by writing to an
      object with a lower security level). You can
      contribute information to a higher security
      level report, but can not read the report
    • Reference Monitor: - a way to enforce the
      two rules above (security middleware)
Copyright James B. Maginnis 2000-2005


    Alice’s program has a Trojan Horse inside
1
0
3
Copyright James B. Maginnis 2000-2005


    Running Alice’s Program Reads Secret file
1
0
4
Copyright James B. Maginnis 2000-2005

1
0
5
    Reference Monitor Controls Access
Copyright James B. Maginnis 2000-2005

1
0
6
    Will Not Allow Secret Information Out
Copyright James B. Maginnis 2000-2005

1
0
7
    www.trustedsystems.com
Copyright James B. Maginnis 2000-2005

1
0
8
    Other Utilities to Scan for Security Holes

    • Saint and Satan run exploits
           – Saint - http://www.wwdsi.com/saint/
           – Satan - http://www.fish.com/satan/
    • www.ethereal.com protocol analyzer
    • www.nessus.org/intro.html scanner
    • naughty.monkey.org/~dugsong/dsniff/
    • www.tripwire.com (has academic version)
    • Public snmpwalk or Bay Networks nman
    • Only download source format with a PGP (or
      GPG) certificate that you can check
    • www.iss.net makes popular commercial IDS
Copyright James B. Maginnis 2000-2005

1
0
9
    Some MS-Windows Considerations
    • Standard install NOT Secure! Use few local
      Accounts (only Administrator and Guest)
    • Many undocumented and unchecked system
      variables and functions
    • SMB challenge-response and compatibility
      system problems, especially ports 135-139
    • All powerful Administrator account, and
      completely open EVERYONE account
    • Uses more secure microkernel technologies
      and networking Redirectors
    • Trusted Domain architectures similar to NIS,
      but has not yet seen the same security
Copyright James B. Maginnis 2000-2005

1
1
0
    Some UNIX Considerations
    • Berkley ―r‖ commands not a good idea,
      routinely delete all .rhost files
    • Issues with SUID utilities and anonymous
    • SunRPC, NFS, YP, NIS designed with few
      security mechanisms - naïve client / server
      assumptions allows spoofing opportunities
    • Open /etc/password file, use shadow file
    • More mature OS = fewer system calls with
      unchecked parameters and ACL (Access
      Control Lists) now similar to NT
    • All modern Unix’s enforce resource limits so
      that programs can not over inflate its priority
Copyright James B. Maginnis 2000-2005

1
1
1
    Network Tunnels




      • Modems
      • VPNs – Virtual Private Networks
      • Wireless Hubs – biggest threat today!
Copyright James B. Maginnis 2000-2005

1   Anyone can convert their cube or office Ethernet jack into a
1
2   Wireless Hub (and add a public entry point into the Network)

“30 percent of all enterprises risk security breaches
  because they've deployed 802.11b wireless local
      area networks without proper security.”
                    - Gartner Inc.




                                                           Linksys Wireless
    D-Link Wireless
                                            SMC Wireless   Cable/DSL Router
    Router/Print
                                            Cable/DSL      $119
    Server & Card
    $129                                    Router $115
Copyright James B. Maginnis 2000-2005


    A vs. G ―fixed‖ Wireless 802.11 Technologies
1
1
3


    • Up to 11Mbps (4-                       • Up to 54Mbps
      5Mbps common)
    • Very inexpensive                       • Only 10% premium
      and simple, conflicts                    for five times the
      with cordless                            bandwidth
      phones / microwave
      ovens, 100 – 300 ft
      range, penetrates                      • 100-150 ft
      most walls
    • Growing public                         • Compatible with
      access (2,000                            802.11a
      Starbucks in 2003)
Copyright James B. Maginnis 2000-2005

1
1
4
    Freeware WEP Cracking Tools

    • Of 120 wireless systems located by the
      Atlanta Journal, only 32 had activated the
      included encryption protection and no
      hardware used ―real‖ random numbers
    • Adam Stubblefield was the first to
      implement, but AirSnort and WEPCrack
      are the first made publicly available
    • AirSnort only needs approximately 5-10
      million encrypted packets to guess the
      encryption password in under a second
      (http://airsnort.sourceforge.net)
Copyright James B. Maginnis 2000-2005

1
1
5
    WPA vs. WEP (vs. 802.1x) on WAP

    • Wireless Access Point (WAP) is the bridge
    • Weak WEP is the standard way to encrypt
    • WPA adds Temporal Key Integrity Protocol
      (TKIP); password MUST not be simple ones
    • 802.1x is only about port access, usually
      using a username/password challenge,
      thus, should be used with WEP (or WPA)
    • MAC filtering and SSID hiding don’t help
    • Most networks unsecured (see USA Today
      article and another about FBI presentation)
Copyright James B. Maginnis 2000-2005

1
1
6
    Network Stumbler Displays 802.11 Networks




                            ―Wardriving‖
                              web site
                             maintains
                            data base of
                              all user
                              uploads
Copyright James B. Maginnis 2000-2005

1
1
7
    AiroPeek Maps Out Users

    WEP uses the RC4 encryption algorithm (with 40
    or 80 bit key), which is weak and inappropriate
    (assumes packets arrive in order) to save CPU
Copyright James B. Maginnis 2000-2005

1
1
8
    AiroPeek Maps Out Users (continued)




                                            Data sniffed off
                                             the air from
                                              non-WEP
                                             session with
                                              AiroPeek.
Copyright James B. Maginnis 2000-2005

1
1
9
    WEP Problems

    • One start-up, AirDefense,
      has catalogued
          – 100 types of denial-of-service attacks jamming the
            airwaves with noise to shut down wireless LANs
          – 27 attacks to take over wireless LAN stations
          – 490 probes to scan wireless LANs for weaknesses
          – 190 ways to spoof media access control (MAC)
            addresses and SSIDs to assume another’s identity
    • Wireless LANs are a billion-dollar a year
      business and growing fast, but NIST has
      recommended against the govt. using them
Copyright James B. Maginnis 2000-2005

1
2
0
    Wireless Defense Best Efforts

     • Enable highest encryption available (up to
       256-bit), and upgrade firmware often
     • Use WPA with a strong key, change often
     • Change the default Admin password
     • Turn off router with $5 lamp timer at night
     • Often recommended but easy to bypass:
           – Using MAC address filtering, also very
             cumbersome for large corp. environments
           – Changing the default SSID, re-changing
             periodically, and turning off broadcasts
Copyright James B. Maginnis 2000-2005

1
2
1
    WEP Defense Efforts (continued)

     • Purchase only 802.11 Hubs and PC
       Cards that have flash memory and can
       be field upgraded for new standards
     • Treat wireless subnets like attachments
       to the Web, isolated by Firewalls and
       Intrusion Detection Systems (IDS)
     • Move the transmitter inside buildings
       and away from windows (most common)
     • Use higher level security protocols
Copyright James B. Maginnis 2000-2005

1
        Process
                                 Defense => Add Higher                 Process
2
2                                Level Secure Protocols
     Application                                                       Application

          SSL                                                          SSL
                                             Router
     Transport                                                         Transport
                                       Buffers Packets that            Layer
     Layer
                                       need to be forwarded            (TCP,UDP)
     (TCP,UDP)                         (based on IP address).

     Network                                                           Network
     Layer (IP)                                                        Layer (IP)
                                      Network       Network
          IPsec                         Layer        Layer              IPsec
     802.11                             802.11       Ethernet            Ethernet
     Link Layer                       Link Layer   Data Link Layer   Data-Link Layer

       WEP                                  WEP      Ethernet          Ethernet
     802.11                           802.11        Phys. Layer        Phys. Layer
    Phys. Layer                      Phys. Layer
Copyright James B. Maginnis 2000-2005


    Privacy – Cookies, Will You Allow Them?
1
2
3



    • Piece of information that allows a Web site
      to record one’s comings and goings
       – Session and Permanent
    • Cookies are Bad
       – Advertising / Receiving and transmitting of
         data (unknown and unencrypted)
       – Europe is considering banning cookies
    • Cookies are Good
       – Passwords and login (encryption)
Copyright James B. Maginnis 2000-2005

1
2
4
    What is spamming?

    • Spamming (from Monty Python reference)
       – “the practice of indiscriminate distribution of
         messages (for example junk mail) without
         permission of the receiver and without
         consideration for the messages’
         appropriateness”
    • Spamming’s negative impacts
       – Spam has comprised 30% of all mail sent
         on America Online
             • slowing the Internet in general
             • shutting ISPs down completely
Copyright James B. Maginnis 2000-2005

1
2
5
    Controlling Spamming

    • Disable the relay feature on SMTP (mail)
      servers so mail cannot be bounced off the
      server
    • Tell users not to validate their addresses by
      answering spam requests for replies if they
      want to be taken off mailing lists. Delete
      spam and forget it— it’s a fact of life and not
      worth wasting time over
    • Software packages, e.g. www.getlost.com
      and www.junkbusters.com
Copyright James B. Maginnis 2000-2005


    10-Minute Break…
1
2
6


        Question:
        What do you
        get what you
        cross an
        instructor with
        a spud?



                                            Answer:
                                            A Facili-Tator
Copyright James B. Maginnis 2000-2005

1
2
7
    Encryption Policy

    • The 128-BIT Encryption Debate
         – Export 128-bit encryption is 3X10 to the 26th
           power times more difficult to decipher than
           the preceding legally exportable technology.

       Secure e-commerce Government‟s legal requirements
      For the past 20 years     Recent legislation
      there was a limitation     allows 128 bit in
           on exported       specific circumstances
      encryption devices of  thus paving the way for
           56 bit codes        the Compaq permit
Copyright James B. Maginnis 2000-2005


    Privacy – Legislation Examples
1
2
8


    • Electronic Theft (NET) Act
        – Imposed criminal liability for individuals who
          reproduce or distribute copies of copyrighted work
    • Digital Copyright Clarification and Technology
      Education Act
        – Limits the scope of digital copyright infringement
          by allowing distance learning exemptions
    • Online Copyright Liability Limitation Act
        – Seeks to protect Internet access providers from
          liability for direct and vicarious liability under
          specific circumstances where they have no control
          or knowledge of infringement
Copyright James B. Maginnis 2000-2005


    Clinton’s Intellectual Property Legacy
1
2
9


    • Harassment of Phil Zimmerman (PGP)
    • Intelligence Auth Act (IAA) of 1996
        – Expands Foreign Intl Surveillance Court (FISC),
          circumventing 1st, 4th, 5th, and 6th amendments
    • Economic Espionage Act (EEA) of 1996
        – Replaces most state and federal copyright laws
        – Violates several international treaties
    • Digital Millennium Copyright Act of 1998
        – Makes anti-copying technology illegal – forbids
          even some copying of public domain information
        – Threatens free speech and the right of fair use
Copyright James B. Maginnis 2000-2005

1
3
0
    Now, The PATRIOT Act
    • “Provide Appropriate Tools Required to
      Intercept and Obstruct Terrorism”
    • Anti-Terrorism Act (ATA), formerly known as
      the Mobilization Against Terrorism Act
      (MATA), was co-sponsored by Jon Kyl
    • Stewart Baker (employed by NSA to block
      unbreakable cryptography), "Don't look for a
      dramatic increase in <new wiretaps>,
      because the Bureau was performing such
      surveillance years before the bill passed,
      without Congress' explicit approval."
    • Also frees the CIA to recruit unsavory
      infiltrators (other terrorists) without restraint
Copyright James B. Maginnis 2000-2005

1
3
1
    Copyright Protection Techniques

    • Digital Watermarks
        – Embedding of invisible marks
        – Can be represented by bits in digital content
        – Hidden in the source data, becoming
          inseparable from such data
    • Digital Signatures
        – Used to authenticate the identity of the sender of
          a message or the signer of a document (not to
          be confused with a digital certificate)
        – Electronic Signatures in Global and National
          Commerce Act (referred as the e-signature bill)
Copyright James B. Maginnis 2000-2005

1
3
2
    Electronic Contracts and Licenses

    • Shrink-wrap agreements (or box top licenses)
        – The user is bound to the license by opening the package
        – This has been a point of contention for some time
        – The court felt that more information would provide more
          benefit to the consumer given the limited space available
          on the exterior of the package
    • Click-wrap contracts
        – The software vendor offers to sell or license the use of
          the software according to the terms accompanying the
          software
        – The buyer agrees to be bound by the terms based on
          certain conduct
Copyright James B. Maginnis 2000-2005

1
3
3
    Biometrics Controls

    •    Photo of face (―Snooper‖ Bowl)
    •    Fingerprints (Laptops)
    •    Hand geometry
    •    Blood vessel pattern in the retina of eye
    •    Voice Recognition
    •    Signature
    •    Keystroke dynamics


                          All can be easily beaten!
Copyright James B. Maginnis 2000-2005

1
3
4
    Security Summary

    •    Segment and use ―real‖ firewalls with DMZ
    •    Remove databases from Internet
    •    Control VPN nodes and Fill wireless holes
    •    Keep IE and application patches and viral
         definitions up to date (Update Expert)
    •    Improve network management (ManageX)
    •    Build Security Policy and Awareness
    •    Get involved in software development
    •    Check system / network logs and alerts
Copyright James B. Maginnis 2000-2005

1
3
5
    Security Summary (continued)

    • Encrypt with 3DES or Rijndael
    • Setup Kerberos, Radius, Directory Services,
      and Window’s roaming profiles
    • Verify good passwords
    • Use host, signature, anomaly, and flow IDS
    • Consider Monitor Middleware
    • Regularly scan for security holes
    • Don’t use default installation for Windows
    • Review legal issues
Copyright James B. Maginnis 2000-2005

1
3
6
    Other Security Policy Items

    • Use individual customer digital certificates
      over SSL for all client data access
    • Internet access only with hardware token
    • Enforce utilizing ―strong‖ passwords and
      every person having own account
    • Strict limitation of Java applet functionality
    • Applications not in root or nobody accounts
    • Track Inventory and licenses (TrackIT)
    • Use WebTrends Security Analyzer
Copyright James B. Maginnis 2000-2005


    Number one security issue still remains…
1
3
7



      Use cross or dot (not strip)
      shredder with good document
      destruction procedures

    • Targeted attack will mostly likely come
      through your trash
        – Everything there is in the ―public domain‖
        – All your ―secrets‖ are out in the open
Copyright James B. Maginnis 2000-2005

1
3
8
    Risk Assessment and Management
    • Part of the New Economy is a willingness to
      take more risks - many companies, however,
      work in a ―risk denial‖ mode: estimating and
      planning as if all variables are known
    • Get inputs from Software Development
      Plans, QA Plans, and/or Technology Plans
    • Identify and Prioritize exposed uncertainties
      and risk factors
        – Identify Risk Indicators (e.g. discussed security
          issues or technology and project experience)
        – Decide on avoidance, transfer, or acceptance
Copyright James B. Maginnis 2000-2005

1
3
9
    Risk Assessment Planning (continued)
    • Recommend mitigation strategies for minimizing
      the top 10 risks => ―Actions taken to reduce or
      eliminate the detrimental impact of certain events.‖
        – Build Prototypes and do tests modeling the workload
        – Management tools, regular reviews, change control
        – A project being late is an effect, not a risk
    • Don’t forget alternatives and backup plans (do
      nothing is always one approach)
    • Each with varying risk approaches
        – Decisions to Build or Buy Solutions (Can you imagine
          this effort/product for sale?)
        – Outsourcing and Technology Insurance can share the
          risks of doing business
Copyright James B. Maginnis 2000-2005

1
4
0
    Information Gathering Methods

    • Tools and methods to obtain information
      about a subject (including the existing
      systems) aka Fact Finding
        – Interviews
        – Questionnaires or surveys
        – Workshops, Brainstorming, Storyboarding
        – Reviewing Documentation
        – Observation
        – Measuring
        – Prototyping and proofs of concept
Copyright James B. Maginnis 2000-2005

1
4
1
    Systems Analysis Means a Holistic Approach

                                                                Actively
                                             Organizational     learning to
    Technology
                                                                better use the
                                                                best people,
                            Productivity                        practices, &
                                                                technology to
                                                 Key            positively
People          Process                        Areas of         influence
                                               Systems          productivity.
                                               Analysis

                Present                                        Functional
                System                                        Requirements
Copyright James B. Maginnis 2000-2005

1
4
2
    The Big Picture
Copyright James B. Maginnis 2000-2005

1
4
3
     The Risk Management Mindset
                 Identification                                                                         Mitigation
                                                          2. “Java                                                   2. Mitigation by
                   Project                                skills not                              Project            avoidance: Use
                   Finish                                 high                                    Finish             Visual Basic
                                                          enough.”                                                   (or by transfer:
                                                                                                                     Out source

                            Risk 2                                                                        Risk 2



                                    Risk 1                                               Risk 1                      1. mitigation
                                                                                                                     by conquest:
    1. “May not be
                                                 Avoid / Delay,                                                      Demonstrate
                                                                                                                     image super-
    possible to                                    Transfer,                                                         imposition (or
    superimpose                                                                                                      by delay or by
    images                                Project Accept, or    Project
                                                                                                                     tolerance)
    adequately.”                           Start   Tolerate      Start
Adapted from Software Engineering: An Object-Oriented Perspective by Eric J. Braude (Wiley 2001), with permission.
Copyright James B. Maginnis 2000-2005

1
4
4
    Investigation Includes Feasibility Analysis

          Economic                           Organizational
          Feasibility                           Feasibility
       Can we afford it?                     Is it a good fit?




        Technical                               Operational
        Feasibility                               Feasibility
        Does the                            Will it be accepted?
     capability exist?
Copyright James B. Maginnis 2000-2005


    Accounting – Do benefits outweigh costs?
1
4
5



    • Payback Analysis: how long will it take
      (usually in years) to pay back
    • Return on Investment (ROI): compares the
      lifetime profitability of alternative solutions
    • Net Present Value: determines the
      profitability in terms of today’s dollar values.
      This will require an estimated inflation and
      discount rate (for industry/company)
    • Currency conversion in business context
      allows tracking in management’s language
Copyright James B. Maginnis 2000-2005

1
4
6
    Who is responsible for What?
    • Chairman of the Board => To
      protect and insure for continuity of
      the corporation
    • President => To protect and insure
      for profitability of the corporation
    • Managers => To maintain
      information as a strategic asset of the corporation
    • IS Security Manager => To insure written security
      policies are developed, implemented and followed
    • Users => Ultimate responsibility for accidental or
      intentional destruction or disclosure
Copyright James B. Maginnis 2000-2005

1
4
7
    Security Policies
    •    ―Guidelines‖ if management support is weak
    •    Less effective if not applied consistently
    •    Assures proper implementation of controls
    •    Guides product selection and development
    •    Demonstrates management support
    •    Avoids liability and protects trade secrets
    •    Helps adapt to dynamic communications
    •    Coordinates the activities of groups
           – Only software approved by IT, Passwords will
             never be hard coded or written down, Users
             must sign Responsibility/Liability documents
Copyright James B. Maginnis 2000-2005

1
4
8
    Physical Security

    • Access to every office, computer room, and
      work area must be restricted by need
    • And, by an appropriate method: guard or
      receptionist, key lock, card lock, etc.
    • Use of physical firewalls and fire doors for
      physical access security
    • All multi-user or communication equipment
      must be locked and cable kept in conduit
    • Use of ID Badges
    • Workers must never allow admittance to
      someone not identified
Copyright James B. Maginnis 2000-2005

1
4
9
    Physical Security (continued)

    • Propped open doors require a guard
    • Sign-out sheets and bar code stickers for
      tracking all equipment
    • Fire Resistance materials, self-closing
      openings, fire extinguishing for secure areas
    • Example physical security systems inspector
      guide:http://www.oa.doe.gov/guidedocs/000
      9pssig/0009pssig.html
Copyright James B. Maginnis 2000-2005

1
5
0
    Other Physical Security Issues
    • Limited access to letter head, Check Stock,
      employee lists, and other forms
    • No Smoking, Eating, and Drinking in the
      Computer Room, not be an access site
    • Access to Software Installation Media
    • Three or more officers, or five or more
      employees, must not take the same airplane
    • Decide areas where electronic monitoring of
      workers will and will not be used
    • ―Clean Desk‖ Policy and Storage of Laptops
    • Positioning and moving computer screens
      away from windows and close blinds
Copyright James B. Maginnis 2000-2005

1
5
1
    Other Physical Security Issues (continued)
    • Sensitive data not stored on local drives
    • Approved methods for the storage and
      destruction of discarded hardcopies
    • Can disk drives be returned to
      manufacturers under maintenance?
    • White boards must be erased after meetings
    • No signs indicating computer room location
    • Location of facilities will be in-town and away
      from natural and man-made hazards
    • Background checks or escorts for anyone
      being granted physical access
Copyright James B. Maginnis 2000-2005

1
5
2
    Awareness Raising Methods
    • Change the log-on banner or log-in screen
    • New Employee packet with security policy
    • Ticket warnings reflecting policy violations
    • Conduct audits and vulnerability demos
    • Adopt an Annual Information Security Day
    • Add security questions to reviews
    • Purchase Security CBT and log when run
    • Regular emails concerning current security
      issues, virus warnings, etc
    • Post Security Policy on company Intranet
    • Survey middle and upper managers
Copyright James B. Maginnis 2000-2005

1
5
3
    Tiger Team Best Practices (without panic)
    • Protection, Detections, and Reaction (PDR)
    • Computer Incident Response Team (CIRT)
      includes both technicians and management
    • Clear procedures for activating the team
        – Different incidents may require different people
    • What can be done while they’re on their way?
        – Do Install Plans have back out plans
          (capacity is a security issue)?
        – Automated shutdown for containment subnetting
        – Heighten automatic monitoring
    • Determine nature and scope of incident
        – Intrusion-logs, check modifications, monitor
          network / systems, coordinate with remote sites
Copyright James B. Maginnis 2000-2005

1
5
4
    Tiger Team Best Practices (continued)
    • Produce, Approve, and Implement an
      Emergency Response Plan
       – E.G. backup systems, undo modifications
         found, and rebuild secure network
    • Increase security perimeter defenses,
      monitoring, and awareness
    • Non-technical issues: Public image, legal
      actions, customer relations, and reporting
    • Attack and penetration assessments
        – Identify Achilles heels and potential costs
        – Assess Risk Level of each system/subnet
        – Setup Automated and Manual scanning
Copyright James B. Maginnis 2000-2005

1
5
5
    Vulnerability Report should include:

    • Tracking Information
    • Identification of the affected products,
      vendors, and partners
    • Initial impact assessment
    • Description of recommended test environment
    • Technical description
    • Possible exploitation details
    • Initial work-around, if possible
    • Contact information
Copyright James B. Maginnis 2000-2005

1
5
6
    Response Team Performance Delay Metrics
    a. From discovery to
       verification
    b. From verification
       to reporting
    c. From reporting to
       acknowledgement
    d. From reporting to
       patch release
    e. From reporting to
       advisory release
    f. Total = (a+b) +
       max (d, e)
Copyright James B. Maginnis 2000-2005

1
5
7
    Issues to Settle by Launch
    •    Process to be used
    •    Security goals
    •    Manner of tracking security goals
    •    How team will make decisions
    •    What to do if security goals not attained
           – fallback positions
    • What to do if plan not approved
           – fallback positions
    • Define team roles
    • Assign team roles
Copyright James B. Maginnis 2000-2005

1
5
8
    Distributed versus Centralized Systems

    A distributed system is one in which the
    DATA, PROCESS, and INTERFACE
    components of an information system are
    distributed to multiple locations in a computer
    network. Accordingly, the processing workload
    is distributed across the network.

    In centralized systems, a central, multi-user
    computer hosts all the DATA, PROCESS, and
    INTERFACE components of an information
    system. Users interact with the system via
    terminals (or terminal emulators).
Copyright James B. Maginnis 2000-2005

1
5
9
    Flavors of Distributed Computing
Copyright James B. Maginnis 2000-2005


    Client/Server Architecture – The Clients
1
6
0



    A client/server system is a solution in which the
    presentation, presentation logic, application logic,
    data manipulation, and data layers are distributed
    between client PCs and one or more servers.
    A thin client is a                      A fat client is a personal
    personal computer that                  computer or workstation
    does not have to be very                that is typically more
    powerful (or expensive)                 powerful (and expensive)
    in terms of processor                   in terms of processor
    speed and memory                        speed, memory, and
    because it only presents                storage capacity. Most
    the user interface.                     PCs are fat clients.
Copyright James B. Maginnis 2000-2005

1
6
1
    Multi-Tier Architecture = Better Security/Perf
    • A database server hosts one or more shared
      databases and executes all data manipulation.
    • A transaction server hosts services that ultimately
      ensure that all database updates for a single
      transaction succeed or fail as a whole.
    • An application server hosts the application or
      business logic and services for an IT system.
    • A messaging or groupware server hosts
      services for e-mail, calendaring, etc.
    • A web server hosts Internet or intranet web sites
      and services, communicating through thin-client
      interfaces such as web browsers.
Copyright James B. Maginnis 2000-2005

1
6
2
    On-Line Transaction Processing (OLTP)

    •    File, Database, Record, Field … Then …
    •    What is Transaction Processing?
    •    Audit Trails, Backup and Recovery
    •    Data entry validation
    •    Interactive, Real-time, and Batch
    •    Applications
           – Inventory Control
           – Payroll
           – General Ledger
           – Financial, Marketing, Manufacturing, HR, ERP
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies
Networking Strategies

Más contenido relacionado

La actualidad más candente

Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standardsM.k. Praveen
 
Catalog transceivers v4 Gbic
Catalog transceivers v4 GbicCatalog transceivers v4 Gbic
Catalog transceivers v4 GbicAlexandre Barros
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technologyTauseef khan
 
Ciphop product datasheet
Ciphop product datasheetCiphop product datasheet
Ciphop product datasheetErcole Rovida
 
Widhop product datasheet
Widhop product datasheetWidhop product datasheet
Widhop product datasheetErcole Rovida
 
History of 100G and Internet2
History of 100G and Internet2History of 100G and Internet2
History of 100G and Internet2Ed Dodds
 
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)Ari Zoldan
 
Hybrid fiber powerline communicatiion (hfpc)
Hybrid fiber powerline communicatiion (hfpc)Hybrid fiber powerline communicatiion (hfpc)
Hybrid fiber powerline communicatiion (hfpc)Broto Santoso
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkIDATE DigiWorld
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
Access network
Access networkAccess network
Access networkBala V
 
Robulink AMI System Technology
Robulink AMI System TechnologyRobulink AMI System Technology
Robulink AMI System Technologyjessie968
 

La actualidad más candente (20)

Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Catalog transceivers v4 Gbic
Catalog transceivers v4 GbicCatalog transceivers v4 Gbic
Catalog transceivers v4 Gbic
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technology
 
Ptp800 05 br-022012
Ptp800 05 br-022012Ptp800 05 br-022012
Ptp800 05 br-022012
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Ciphop product datasheet
Ciphop product datasheetCiphop product datasheet
Ciphop product datasheet
 
14A81A05A6
14A81A05A614A81A05A6
14A81A05A6
 
Widhop product datasheet
Widhop product datasheetWidhop product datasheet
Widhop product datasheet
 
History of 100G and Internet2
History of 100G and Internet2History of 100G and Internet2
History of 100G and Internet2
 
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)
Spotwave Z1900 PCS 1900 MHz Cell Phone Signal Booster (Quantum-Wireless.com)
 
Hybrid fiber powerline communicatiion (hfpc)
Hybrid fiber powerline communicatiion (hfpc)Hybrid fiber powerline communicatiion (hfpc)
Hybrid fiber powerline communicatiion (hfpc)
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
 
MagicBubble Slide show
MagicBubble Slide showMagicBubble Slide show
MagicBubble Slide show
 
Meraki Datasheet MR58
Meraki Datasheet MR58Meraki Datasheet MR58
Meraki Datasheet MR58
 
4 g
4 g4 g
4 g
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
Access network
Access networkAccess network
Access network
 
Robulink AMI System Technology
Robulink AMI System TechnologyRobulink AMI System Technology
Robulink AMI System Technology
 

Destacado

Operational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasOperational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasTreat Risk
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksRaj vardhan
 
Deepwater Horizon Oil Spill
Deepwater Horizon Oil SpillDeepwater Horizon Oil Spill
Deepwater Horizon Oil SpillJessica Goodman
 
broad band networks
 broad band networks broad band networks
broad band networksVikas Jagtap
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networksichiswa
 
How to conduct a risk assessment
How to conduct a risk assessmentHow to conduct a risk assessment
How to conduct a risk assessmentJim Booth
 

Destacado (7)

Operational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasOperational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvas
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Deepwater Horizon Oil Spill
Deepwater Horizon Oil SpillDeepwater Horizon Oil Spill
Deepwater Horizon Oil Spill
 
broad band networks
 broad band networks broad band networks
broad band networks
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
 
How to conduct a risk assessment
How to conduct a risk assessmentHow to conduct a risk assessment
How to conduct a risk assessment
 
Feedback Canvas
Feedback CanvasFeedback Canvas
Feedback Canvas
 

Similar a Networking Strategies

Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5rajrayala
 
Evolution of communication system
Evolution of communication system Evolution of communication system
Evolution of communication system Shabbir Chunawala
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational contentOlajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentOlajide Kuku
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6Seung-Bum Lee
 
Telecommunication: The Needs and Demands of Telecoms
Telecommunication: The Needs and Demands of TelecomsTelecommunication: The Needs and Demands of Telecoms
Telecommunication: The Needs and Demands of TelecomsNapier University
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System DesignMrirfan
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless CommunicationsSuraj Katwal
 
BICSI Wireless Presentation
BICSI Wireless PresentationBICSI Wireless Presentation
BICSI Wireless PresentationCam Lau PMP
 
early development of 4g technology
early development of 4g technologyearly development of 4g technology
early development of 4g technologydvishalya1
 
Wireless communication system
Wireless communication systemWireless communication system
Wireless communication systemajay bharwal
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
4G technology
4G technology4G technology
4G technologyArun V
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptTestUser621581
 

Similar a Networking Strategies (20)

Blue tooth
Blue toothBlue tooth
Blue tooth
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
Evolution of communication system
Evolution of communication system Evolution of communication system
Evolution of communication system
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6
 
Telecommunication: The Needs and Demands of Telecoms
Telecommunication: The Needs and Demands of TelecomsTelecommunication: The Needs and Demands of Telecoms
Telecommunication: The Needs and Demands of Telecoms
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System Design
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless Communications
 
BICSI Wireless Presentation
BICSI Wireless PresentationBICSI Wireless Presentation
BICSI Wireless Presentation
 
early development of 4g technology
early development of 4g technologyearly development of 4g technology
early development of 4g technology
 
Wireless communication system
Wireless communication systemWireless communication system
Wireless communication system
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
broad band
broad band broad band
broad band
 
4G technology
4G technology4G technology
4G technology
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 
lecture10-wireless.pptx
lecture10-wireless.pptxlecture10-wireless.pptx
lecture10-wireless.pptx
 

Más de Jim Maginnis, MBA

Más de Jim Maginnis, MBA (9)

The holistic handbook to a successful suicide
The holistic handbook to a successful suicideThe holistic handbook to a successful suicide
The holistic handbook to a successful suicide
 
50 ways to untwist your thinking
50 ways to untwist your thinking50 ways to untwist your thinking
50 ways to untwist your thinking
 
Week1 Dq5 Rev2
Week1 Dq5 Rev2Week1 Dq5 Rev2
Week1 Dq5 Rev2
 
Conscience And Self Reliance
Conscience And Self RelianceConscience And Self Reliance
Conscience And Self Reliance
 
Memorizing The Presidents
Memorizing The PresidentsMemorizing The Presidents
Memorizing The Presidents
 
Best Practices
Best PracticesBest Practices
Best Practices
 
Sales Talk
Sales TalkSales Talk
Sales Talk
 
What Is Quality
What Is QualityWhat Is Quality
What Is Quality
 
Workplace Spirituality
Workplace SpiritualityWorkplace Spirituality
Workplace Spirituality
 

Último

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Networking Strategies

  • 1. Copyright James B. Maginnis 2000-2005 1 Organizational Kinetics Copyright 2003 - 2009 Network Design, Security Analysis, Risk Assessment, DR, and BCP Presentation By Jim Maginnis
  • 2. Copyright James B. Maginnis 2000-2005 2 Today, There are >1 Billion Internet Users! 600 Gartner 500 400 eMarketer 300 200 Nielsen/NetRati ngs 100 Computer 0 Industry Internet Users Worldwide Almanac ( CIA) 2001 (in millions) Source: Projections vs. Reality, January 2002: www.emarketer.com
  • 3. Copyright James B. Maginnis 2000-2005 3 Agenda • Technologies for PANs, LANs, MANs, WANs • IT Architecture and Network Design considerations • Outsourcing Decisions • Security Issues and Risk Assessments • Fault Tolerance Planning • Disaster Recover Planning • Business Continuity Planning • Management Responsibilities
  • 4. Copyright James B. Maginnis 2000-2005 4 Analog Signals • Sound Waves ~ Electrical Waves in a Wire • Analog Signal Electrical Wave • Sound Wave Characteristics frequency (hertz) – Frequency (Hz) = cycles per second amplitude (volts) – Spectrum • 100 – 6,000 Hz • 300 – 3,000 Hz Time (sec) – Bandwidth = diff – Amplitude (dB) 1 cycle – Phase (alignment)
  • 5. Copyright James B. Maginnis 2000-2005 5 Analog Communications Technology • Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)
  • 6. Copyright James B. Maginnis 2000-2005 6 Digital Signaling • Represented by square waves or pulses • Bit loss rather than attenuation loss amplitude (volts) 1 cycle time (sec) frequency (hertz) = cycles per second
  • 7. Copyright James B. Maginnis 2000-2005 7 Broadband, Baseband, and Narrowband • Broadband means telecommunications in which a wide band of frequencies is available to transmit multiplexed information – DSL and Cable (with bandwidth expectations) • Usually analog with modem and/or multiplexer • At least 256,000 bps – Jupiter Communications • Over 6 MHz – IBM Dictionary of Computing • Baseband means one digital channel – Ethernet (―BASE‖) / Token Ring (―single band‖) • Narrow means just voice (500 to 64 kbps) – Mobile, Radio, Paging services (―dual-band‖)
  • 8. Copyright James B. Maginnis 2000-2005 8 Connection Data Rates / Speed / Bandwidth Technology Max Data Rate Medium Technology Max Data Rate Medium GSM 9.6 to 14.4 Kbps RF USB 1.0 12 Mbps TP POTS 56 Kbps TP DS3/T-3 44.736 Mbps Coax GPRS 56 to 114 Kbps RF OC-1/DC-1 51.84 Mbps Fiber/Coax BRI ISDN 64-128 Kbps TP 802.11g 54-108 Mbps RF EDGsmE 384 Kbps RF Fast E-net 100 Mbps TP, Fiber Satellite 400 Kbps RF FDDI 100 Mbps Fiber Frame Relay Normal 56 Kbps TP/Coax OC-3/SDH 155.52 Mbps Fiber Bluetooth 1 Mbps RF IEEE 1394 400 Mbps TP DS1/T-1 1.544 Mbps Various ATM 155 / 622 Mbps TP / Fiber UMTS/.16.20 1-3/2-155 Mbps RF OC-12/STM-4 622.08 Mbps Fiber T-1C 3.152 Mbps Various SSA or SCSI 80 Mbytes/sec TP, Fiber Token Ring 4 to 16 Mbps Various Gigabit E-net 1 / 10 Gbps TP, Fiber DSL D:½ to 8 Mbps TP Fiber Channel 1 Gbps Fiber Cable D:½ to 52 Mbps Coax OC-768 40 Gbps Fiber Ethernet 10 Mbps Various DWDM 1 Petabit, 1015 Fiber
  • 9. Copyright James B. Maginnis 2000-2005 Advantages of Segmenting – Internetworking 9 • Reduces the number of users per segment – Increase effective bandwidth and security • Switch VLANs work at wire speed • Using Bridges to segment – Each segment in a different collision domain – Same broadcast domain for non-routed protocols • Using Routers (layer-3) to segment – Reduced broadcast messages – Improved manageability • Multiple active paths • Flow and congestion control, explicit packet controls – 30% slower connectivity than a bridge
  • 10. Copyright James B. Maginnis 2000-2005 1 0 Switches, Routers, Bridges, and Gateways • LinkSys G-kit: $183.00 • 3Com NJ200 4-port, SNMP QoS, VLAN, 1.4‖ Switch • Modular Systems start with a chassis (Cisco 6509 sold $1 billion in 1999) • Forum Phone ―Bridge‖ • Gateways (e.g. Mail) – A traffic controller from one network or service to another – Often a proxy server for security and caching
  • 11. Copyright James B. Maginnis 2000-2005 Processors – Firewalls 1 1 • A ―real‖ firewall supports ―stateful packet inspection‖ with the ability to open packets to ensure that the ones coming from the Internet were responses to ones that went out. – SOHOware NBG800 Router/Firewall for $70 – 3COM OfficeConnect Secure Gateway for $250, NetScreen, WatchGuard, SonicWALL, SnapGear, and Cisco processors also support IPsec VPNs • Strongest firewall is Secure Computing’s SideWinder with a hardened OS, and can be purchased separately, on servers from Dell, or embedded in 3COM Ethernet cards
  • 12. Copyright James B. Maginnis 2000-2005 Devices From The OSI Model’s Perspective 1 2 • SSL, S/MIME, PGP, and SET • NOS API • VoIP • Router/Firewall • IPsec • Bridge/Switch • Hubs/Modems
  • 13. Copyright James B. Maginnis 2000-2005 1 3 What is a Virtual Private Network Connection? • A VPN (virtual private network) uses a public infrastructure (Internet) to provide remote offices or users access to an organization's network using ―tunneling‖ rather than using more expensive private or leased lines. • IPsec (Internet Protocol Security) provides two choices of security service: – Authentication Header (AH), which essentially allows authentication of the sender of data – Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data as well.
  • 14. Copyright James B. Maginnis 2000-2005 1 4 Network Design Process • Consider Cost, Functionality, Manageability, Scalability, Adaptability, and Effectiveness • WAN vs. LAN and Upfront vs. Support Costs – Labor as much as 43% of TCO – Support normally 80% of TCO – Training, Downtime, DRP/Recovery – Client/Server, N-tier, Distributed – HP Openview – Cisco Netsys – Modeling tools
  • 15. Copyright James B. Maginnis 2000-2005 1 5 Information Architecture Plan • Especially critical in today’s multi-vendor, distributed environment • Common vision on mandatory standards and key information & communication interfaces • Derive IT Architecture from department’s strategic and business requirements • A long term process based on as many IT and business staff as practicable with continuous review and update
  • 16. Copyright James B. Maginnis 2000-2005 1 6 What is an Enterprise IT Architecture? • IT Architecture “A blueprint to guide how IT elements Components should work – Business flows together” and relationships – Application development – Data descriptions – Network / Telecom – Operating System(s) – Security and privacy – Risk factors – Migration Plan
  • 17. Copyright James B. Maginnis 2000-2005 1 7 IAP Models, Protocols, and Standards • Reference Model (e.g. OSI) – a generic framework – logical breakdown of an activity • Protocol (e.g TCP/IP) – details of how to accomplish specific task – required to implement models • Standard (e.g. IEEE 802.3) – what a reference model and its protocol become when approved by an important standard-setting group (de jure standard), or are adopted by the marketplace ( de facto standard). Standards are, in essence, the blueprint for the Information Architecture
  • 18. Copyright James B. Maginnis 2000-2005 1 8 Who Sets Standards? • Federal government: – by law can establish regulatory standards – National Institute for Standards and Technology • National standards bodies – ANSI, IEEE, or ISO • International standards bodies – ISO (International Organization for Standardization) – International Telecommunication Union (CCITT) • Other vendor groups, professional associations, trade associations, etc – IEEE, VESA, ATM Alliance, SQL group, IETF
  • 19. Copyright James B. Maginnis 2000-2005 1 9 Standards Openness Continuum Closed • proprietary and closed (unpublished) – Intel chip, MS Windows – IBM mainframe • proprietary but licensed (for fee) – postscript • proprietary but published (free or token fee) – IBM’s original ISA bus – SUN’s NFS (network file system) – Intel’s PCI (peripheral component interconnect) • non-proprietary consortia or similar – VESA bus – ATM (asynchronous transfer mode) protocol – DVD Open • „official‟ de jure (open) standards products (published) – Ethernet, ISDN, DSL
  • 20. Copyright James B. Maginnis 2000-2005 ―Well-Formed‖ Risk Statement 2 0 Asset Threat Vulnerability Mitigation What are you What are you How could the What is currently trying to protect? afraid of threat occur? reducing the happening? risk? Impact Probability What is the impact to the How likely is the threat given business? the controls? Well-Formed Risk Statement
  • 21. Copyright James B. Maginnis 2000-2005 2 1 Defining Roles / Responsibilities Executive Determine Sponsor acceptable risk “What's important?” Information Assess risks Define security Measure security Security Group requirements solutions “Prioritize risks” IT Group Design and build Operate and “Best control solution” security solutions support security solutions
  • 22. Copyright James B. Maginnis 2000-2005 2 2 Security Risk Management Process 4 Measuring 1 Assessing Program Risk Effectiveness 3 Implementing Controls 2 Conducting Decision Support
  • 23. Copyright James B. Maginnis 2000-2005 2 3 Internet Enabled Technology Architectures Policies and Standards Network Management Software Management Firewalls Passwords Encryption Content Software Authoring Security and Data Tools Tools Infrastructure TCP/IP Hypermedia Servers Browsers Network Databases
  • 24. Copyright James B. Maginnis 2000-2005 2 4 Requirement Sets for Two Design Options Bare “Cadillac” Bones Win- Implementation Win- UNIX UNIX dows Environments dows Off Off In Out Con- In Out Con- the the House Source sult House Source sult shelf shelf Sources
  • 25. Copyright James B. Maginnis 2000-2005 2 5 Architecture - Internal vs. External sourcing • Costs and Knowledge base – Investment in hardware, software and facilities – Applications and database technologies • Reliability, (DRP and BCP) – Redundancy (no single point of failure) • Components, systems, multiple sites • Entire project or just portion (computer room) • Pull campus network lines or pay carrier • SSL, certificates, dynamic passwords – SecureID, CryptoCard, Safeword
  • 26. Copyright James B. Maginnis 2000-2005 2 6 Comparison Criteria • Feasibility and Cost/Benefit • Available Resources: What can you do? • Development Time • Developmental and Operational Costs • Efficiency and Ease of Use • Compatibility • Security • Emotional: What do you want to do? • ―Evaluation_Tools‖…http://mime1.marc.gate ch.edu/mm_tools/evaluation.html
  • 27. Copyright James B. Maginnis 2000-2005 2 7 Different Sources of Software Components Source of When to Go to This Internal Staffing Application Type Organization Requirements Producers Software? for Software Hardware Generally For system software and Varies Manufacturers not utilities Packaged Yes When supported Some IS and user Software task is generic staff to define Producers requirements and evaluate packages Custom Software Yes When task requires Internal staff may Producers custom support and be needed, system depending on can’t be built internally application In-House Yes When resources and Internal staff Developers staff are available and necessary though system must be built staff size may vary from scratch
  • 28. Copyright James B. Maginnis 2000-2005 Applications – Voice Over IP 2 8 • Transmit voice over • Motivations IP data networks – Very cost effective – Voice Signal – Multimedia • Digitized communication • Compressed – Integrated voice and • Converted to IP packets data network and transmitted over IP network • Challenges – Signaling Protocols – Quality of voice • Set-up and tear down the – Interoperability calls – Security • Locate users – Integration with PSTN • Negotiate capabilities – Scalability • Waiting for IPv6
  • 29. Copyright James B. Maginnis 2000-2005 Applications – New IPv6 Functionality 2 9 • 128-bit Addressing – Then every IP address with a microphone and speaker will be a phone and vice versa, every camera will also be searchable in real time • More Secure – Phone bill vs. credit card • Quality of Service (QoS) Queuing – Critical for CIT Voice and Video • Multicast Services – The ability to send real time information to multiple locations – Pay-per-View and per-Play • Improved Mobile Support – No wires for a billion devices remotely monitored
  • 30. Copyright James B. Maginnis 2000-2005 Applications – Voice over ISDN and ATM 3 0 • Point-to-point ISDN and ATM networks are the solution today • 128kbps ISDN Video Conferencing works better than sharing a 1.54Mbps T1 • ATM (asynchronous transfer mode) use 53- byte cell units in a multiplexed dedicated- connection switching environment • ATM is the current most common solution for internetworking a campus or WAN backbone with real-time analog and data requirements
  • 31. Copyright James B. Maginnis 2000-2005 3 1 5 Top Ways To Lower Costs & Raise Uptime • Converge multiple WAN/MAN backbones • Improve Quality of Service (QoS) • Support Voice Over IP (VOIP) • Cheap & easy IPsec VPNs to remote users • Improve network management control • All with different security issues
  • 32. Copyright James B. Maginnis 2000-2005 3 2 Network Management Goals • Monitor network, backup, and vendor health • Automatic restoration options • Dedicated 7 x 24 hour local support w/DRP • Demonstrate business continuity plans • Dynamic reconfigurations • Bandwidth-on-demand (BoD) pools alternative to temporary peeking or DRP • Renewal of insurance policies • Meeting industry rules
  • 33. Copyright James B. Maginnis 2000-2005 3 3 Need To Consider Current Environments • Platform alternatives – Host or mainframe – Mid-tier (UNIX) platforms – Mid-tier (Windows NT) – Client/Server – Three-tier web-based – Peer to Peer – Distributed • Hardware and software standards • Support resources’ ability to deploy solutions
  • 34. Copyright James B. Maginnis 2000-2005 3 4 Metropolitan Area Nets (MANs) • Metropolitan backbones • SONET rings – solving the vulnerabilities of last mile • 25 Mbps Microwave • Single mode fiber, 10-Gigabit Ethernet will go 40 kilometers this year ($24 billion). Expected to capture 30% of high speed Internet market by ’05. (Gartner) • More ASPs, MSPs, SSPs – Trust / Security
  • 35. Copyright James B. Maginnis 2000-2005 3 5 Trends in Telecommunications and Voice • Convergent system for V&D requirements • Open access with large bandwidth changes • Starbucks began with 2,000 802.11 routers • Virtual Private Networks for Global Model • Rainbow consortium of Microsoft, IBM, Intel, AT&T Wireless, and Verizon to create a single nationwide Wi-Fi company / network • In the meantime, Cable will be the big winner for Internet, TV, movies, and phone services – Satellite’s 25% share of TV will hold – DOCSIS 1.1 supports tiered services
  • 36. Copyright James B. Maginnis 2000-2005 3 6 Trends in Telecommunications and Voice • Need to get all this new stuff to work together = increase in central network management software • Need to get it to work harder (60% idle) – Reselling excess capacity – Return to MIS Data Center focus • Increasing security (esp. governmental and biotechnologies) and ethical concerns • Thinner margins and continued bankruptcies • New SPAM laws and New Taxes!
  • 37. Copyright James B. Maginnis 2000-2005 EDI – B2B Legacy Communications 3 7 High Support Needs = Security Issues Buyer Supplier RFP Response to RFP Purchase Order P.O. Acknowledgement Purchase Order Change P.O. Change Acknowledgement Functional Acknowledgement (for each Transaction ) RFP = Request for Proposal P.O. = Purchasing Order
  • 38. Copyright James B. Maginnis 2000-2005 3 8 The Role of Extranets (was called internets) Adds everyone else‟s security problems Access Issues eBusiness No Firewalls Insecure VPNs Viruses Wireless Access
  • 39. Copyright James B. Maginnis 2000-2005 3 9 Internet Applications = More Security Issues Businesses are rapidly installing intranets, extranets, and enterprise information portals throughout their organizations in order to enhance communication and collaboration, and to publish and share business information easily and at lower cost. E-mail (S/MIME) Telnet (SSH) Popular Uses of the File E-Commerce (SSL) Internet Transfer Protocol (PGP) Internet Relay Search Engines Chat (VPN) (Anonimizer)
  • 40. Copyright James B. Maginnis 2000-2005 4 0 Groupware for Enterprise Collaboration Enterprise Collaboration Groupware Database Systems (ECS) support for Access communication, coordination Enterprise Security and collaboration among the Collaboration Concerns members of business teams and workgroups. Often set up with full access Electronic Electronic Collaborative Work Communications Conferencing Management Tools Tools Tools •E-Mail •Data Conferencing •Calendaring •Voice Mail, IP Phone •Voice Conferencing •Task and Project Mgt •Web Publishing •Videoconferencing •Workflow Systems •Faxing •Discussion Forums •Knowledge Mgt •Electronic Meetings •Document Sharing
  • 41. Copyright James B. Maginnis 2000-2005 4 1 Electronic Conferencing = Access Issues • Data Conferencing – E.g.. MS-Netmeeting • Voice Conferencing • Videoconferencing – Real time need point to point connections • Discussion Forums • P-T-P Chat (IRC) • Electronic Meetings
  • 42. Copyright James B. Maginnis 2000-2005 4 2 Communications and Collaboration Tools • Electronic Mail • Voice Mail • Faxing • Web Publishing • Calendaring/Scheduling • Task/Project Management • Workflow Systems • Knowledge Management More Access Worries!
  • 43. Copyright James B. Maginnis 2000-2005 Applications – Internal and Off The Shelf 4 3 • Web Pages – Static vs. dynamic • Database – Storage • Legacy MIS systems Access control is a never-ending security effort!
  • 44. Copyright James B. Maginnis 2000-2005 Applications – Buffer Overflow Prevention 4 4 #include <stdio.h> void main(void){ char buffer[50]; // gets( buffer ); fgets( buffer, 49, stdin ); buffer[49] = 0; printf("Input: %sn", buffer); } When using gets(), indeterminate behavior may result from excessive input length. Thus, fgets() should be favored over gets().
  • 45. Copyright James B. Maginnis 2000-2005 4 5 Security Must Be Integrated With SDLC • All security considerations should be documented in the standard SDLC docs • Develop Needs Statement – Access and other Controls – Audit and Integrity Review • All test plans will include testing security, internal controls, and audit trail features and take place in a secure area • The CSO will work with the component sponsor to build and sign off on a Security Requirements Workplan and Validation Plan
  • 46. Copyright James B. Maginnis 2000-2005 4 6 Security - Overview Accessibility to authorized, but not others – Permanent - not alterable (can't edit, delete) – Reliable - (changes detectable)
  • 47. Copyright James B. Maginnis 2000-2005 Security – Firewalls 4 7 Stateful Inspection Checking inside packets One firewall is not enough! A DMZ (demilitarized zone) is a small network inserted between a company's private network and the outside networks to prevent external users from getting direct access to sensitive company data.
  • 48. Copyright James B. Maginnis 2000-2005 4 8 Processors Internet Web Browsers • Modems Router Switch • Multiplexers Firewall • Internetwork Processors Load Balancer SSL Acceleration – Repeaters Switch Appli- – Hubs cation and – Switches Web Servers – Bridges Switch – Routers Firewall LAN Backbone Switch – Gateways V.92 New and Modem Legacy Data • Firewalls Bank Resources
  • 49. Copyright James B. Maginnis 2000-2005 Security – Threats / Responses / Newsletters 4 9 • Hacking, viruses, theft, patches, shredding • Web related, DOS, spoofing, firewalls • CERT Coordination Center – At Carnegie-Mellon (www.us-cert.org) • SANS Institute – For-profit with free services (www.sans.org) • National Infrastructure Protection Center – Now Homeland Security (www.dhs.gov) • Microsoft (www.microsoft.com/security) • Trend Micro Anti-virus Software – Now Japanese owned (www.trendmicro.com)
  • 50. Copyright James B. Maginnis 2000-2005 5 0 Passive vs. Active Threats CERT received 53,000 reports of active attacks in 2001 Eavesdropping / traffic Packets intended to disrupt analysis for attack or service, to gain access, or info “black markets” modify information.
  • 51. Copyright James B. Maginnis 2000-2005 5 1 Model for Network Security
  • 52. Copyright James B. Maginnis 2000-2005 NAT Router ―Firewall‖ Web Service Example 5 2 Web Host Internet 130.27.8.35 To 24.88.48.47:20 To 130.27.8.35:80 from 130.27.8.35:80 from 24.88.48.47:20 Router 24.88.48.47 with NAT that Masquerades To 192.168.0.20:x To 130.27.8.35:80 from 130.27.8.35:80 from 192.168.0.20:x Host Web Client Host Host 192.168.0.10 192.168.0.20 192.168.0.30 192.168.0.40 Web Server FTP Server port 80 port 23
  • 53. Copyright James B. Maginnis 2000-2005 5 3 PGP (Pretty Good Privacy) Encryption • See www.pgpi.com and www.pgp.com Mostly used for encrypting FTP files and e-mail; is international banking standard
  • 54. Copyright James B. Maginnis 2000-2005 5 4 Example PGP Encrypted eMail To: “John Doe" <johndoe@hotmail.com> From: Jim Maginnis <jimmaginnis@email.uophx.edu> Subject: EBUS400: PGP Endeavor... Cc: Bcc: X-Attachments: -----BEGIN PGP MESSAGE----- Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com> qANQR1DBwU4D6cjDU+QAxCwQB/9IZFOIuDSIIQbwa28SQ63DDioFb4bH4bmKfopX cvdDVQ1X53fSJzyLt12RslfQToje8YxRNidYMNg1zDTT7CR9q7LRFoAwBFVtQhWJ jFNXn1+aE8oePReMi6vS0DXSSDfgDuUb1R+c8htHoeik6Oebe9R90J3d51yyCojV /5Io5nlM7T11PDaWqsjLr2ttrSySzARt5fAJ9l1mOH+hSl1YebRjZPaxWw+bsYuqN a0GYr2UdwgE1u5HQuhZ+bOIbSliShfKiNuDGHe6VJrchROHnC9Po2JWAOD7wMFq6 STZ/MPGzViaCUaaWPLSKleiURUh4Ly5/LaNYkaumO9vh+241FPqtZKqRVmHRg6dY Ro9edu01qTiXJj25cXHxeNMdA1txLxR3ontbExow+ML5kxs= =68Hd -----END PGP MESSAGE-----
  • 55. Copyright James B. Maginnis 2000-2005 PGP: Things to be aware of… 5 5 • Does not encode mail headers – Subject can give away useful information – To and From provides traffic analysis information as well as usernames • PGP uses original file name and modification date • Certificates often verify that the sender is ―John Smith‖ but not which ―John Smith.‖ So, PGP allows pictures in certificates.
  • 56. Copyright James B. Maginnis 2000-2005 5 6 Kerberos For Authentication (Radius Server also for centralized passwords)
  • 57. Copyright James B. Maginnis 2000-2005 5 7 Kerberos Issues • Kerberos transfers username/passwords in open text from Masters to Slaves • Cryptographers worry that it might be breakable through reversing Ksession • V4 only uses 4 bytes for IP address, so does not support Novel, Appletalk, IPv6 • V5 allows easier spoofing and delegation but greatly improves ticket renewal and allows for public key cryptography
  • 58. Copyright James B. Maginnis 2000-2005 5 8 Breaking DES • DES released March 17th, 1975 • Electronic Frontier Foundation concerned with wide use and exaggerated government claims of being unbreakable while attempting to bully companies into only using DES method • In 1997, RSA offered $10,000 to break; was claimed 5 months later using the Internet • Everyone now uses Triple-DES • NIST has chosen the Rijndael encryption algorithm to supplant DES starting in 2003
  • 59. Copyright James B. Maginnis 2000-2005 5 9 Breaking RFID (40-48 bit key / 24-bit packets) • Small, wireless Radio-Frequency ID (RFID) Digital Signature Transponder (DST) consisting of a small encapsulated passive microchip and antenna coil. – Vehicular Immobilizers (automobile keys w/rolling codes) – Electronic Payment (ExxonMobil SpeedPass ) • Future use by Wal-mart and others of an EPC (Electronic Product Code) wireless barcode and may soon be available for as little as 5 cents/unit. • EPC tags lack sufficient circuitry to implement even symmetric-key cryptographic primitives, don’t use 128-bit keys, and key case/slots are not shielded
  • 60. Copyright James B. Maginnis 2000-2005 6 0 Private and Public-Key Use
  • 61. Copyright James B. Maginnis 2000-2005 6 1 Future Encryption Keys Secret value is added by both parties to message before the ―hash‖ function is used to get the Message Integrity Check.
  • 62. Copyright James B. Maginnis 2000-2005 6 2 Global Scanning Activities http://www.incidents.org/
  • 63. Copyright James B. Maginnis 2000-2005 6 3 Examples of Weak Passwords • Default or empty passwords • Same as the username • The word ―password‖ • Short words, 1 to 3 characters long • Words in an electronic dictionary (60,000) • User’s hobbies, family names, birthday, etc. => most likely last or maiden name • Phone number, social security number, street address, license plate number, etc.
  • 64. Copyright James B. Maginnis 2000-2005 6 4 Password Gathering • Look under keyboard, telephone etc. • Look in the Rolodex under ―X‖ and ―Z‖ • Call up pretending to from ―micro-support‖ or a senior merger manager and ask for it • ―Snoop‖ a network for plaintext passwords. • Tap a phone line with special modem • Forward the phone line remotely and fake login request (and pass to legitimate login) • Use a ―Trojan Horse‖ program to record key stokes (e.g.: http://www.winwhatwhere.com/)
  • 65. Copyright James B. Maginnis 2000-2005 6 5 Viruses, Worms, and Trojan Horses • Virus - code that copies itself into other programs • Bacteria - replicates until fills disks or CPU cycles • Worm - uses email / file undocumented features • Payload - harmful things it does after it has spread • Trojan Horse - looks good, but does bad things • Logic Bomb - malicious code activates on an event • Trap Door (Back Door) - undocumented entry point. Needs Host Program Independent Trapdoors Logic Trojan Viruses Bacteria Worms Bombs Horses
  • 66. Copyright James B. Maginnis 2000-2005 6 6 Types of Viruses • Boot Sector Virus - infects the boot sector of a disk, activating on boot up (1st MS-DOS viruses) • Memory-resident Virus - lodges in main memory as part of the residual OS • Parasitic Virus - attaches itself to executable files as part of their code. Runs when program runs • Stealth Virus - explicitly designed to hide from Virus Scanning programs • Polymorphic Virus - mutates with every new host to prevent signature detection • KEEP PATCHES & DEFINITIONS UP TO DATE
  • 67. Copyright James B. Maginnis 2000-2005 6 7 Honey Pots, Tar Pits, and Sink Holes • A Honey pot is a trap to detect and deflect attacks with a ―dangle‖ computer or data – Such as 9/11 ―no plane at the Pentagon‖ hoax • Tar Pits are a section of a honey pot or DMZ designed to slow down TCP based attacks • Sink Holes are the network equivalent with BGP routers to assist analyzing attacks – Monitor attack noise, scans, and use of dark IPs – Ready to advertise routes and accept traffic to minimize risk while investigating incident
  • 68. Copyright James B. Maginnis 2000-2005 6 8 What To Monitor In A Sink Hole • Scan ―Dark‖ unused IP space • Scan for infections of Worms and Bots • Look for backscatter from attacks & garbage traffic on networks (RFC-1918 leaks) • Expand dedicated Sink Hole router with a variety of tools to pull DOS/DDOS attack – Arbor Network’s Peakflow checks scan rates • 2 Router IP addresses: 1 for management and 1 for Anycast DNS caches to share load
  • 69. Copyright James B. Maginnis 2000-2005 6 9 More Sink Hole Notes • SQL Slammer Worm doubled infections every 8.5 sec to spread 100x than Code Red – at peak, was scanning 55 million hosts / second • Sink holes have proven their value, with worm mitigation (after containment) • Need to work at various security levels • No IGB on Sinkhole; Sinkhole is a RRc • Must not loop traffic back out management interface (remotely controlled: VNC / Telnet)
  • 70. Copyright James B. Maginnis 2000-2005 7 0 The Good, Bad, and Ugly Packets • The Good - legitimate communications • The Bad - poorly configured equipment • The Ugly - intended to do damage – Speed is too high (storming) – Host is violating port-usage policy – UDP packet contains no data – No data transfer, too many ports or IP destinations – Offset + Length > 65,608 bytes for Fragments – Responses without requests, responses have different data from requests
  • 71. Copyright James B. Maginnis 2000-2005 7 1 So Many Packets, And So Little Time • A 50% loaded 100base-t Ethernet carries about 20,000 pps, or 1.2 million per minute • Detecting the Ugly is difficult because they are such a small fraction of the total, and the Bad often set off false alarms. Among the techniques that are being used are: – Single packet signatures • illegal flags, long fragments – Timing based techniques • DOS Floods / automated Telnet – AI programs that train or learn characteristics – Flow-based statistical schemes
  • 72. Copyright James B. Maginnis 2000-2005 True Examples of ―Bad‖ and ―Ugly‖ 7 2 • A T1 Internet is completely jammed for 45 minutes from 120 hosts downloading 1.2 MB of files from an CAI FTP server. • One week-end before Napster was reportedly going out of business, two hosts jam the T1 connection by downloading Gigabytes of data from peer-to-peer servers. • A host appears to be repeatedly scanning the network for servers on a half-dozen different port numbers. • A rapid rate of short fragmented packets brings down a top-ten site for half a day.
  • 73. Copyright James B. Maginnis 2000-2005 7 3 Some Techniques to Determine The Ugly 1. Data Flow follows IP Rules, transfers data: Good unless - Ugly - Speed is too high Ugly - Host is violating port-usage policy Ugly - UDP packet contains no data 2. Host is receiving rejects (TCP or ICMP) Bad - Web Server or client ending persistent connections, such as Napster Ugly - From, or to, too many ports or IP destinations
  • 74. Copyright James B. Maginnis 2000-2005 7 4 Examples of The Ugly (continued) 3. Host is sending packets, but no replies: Bad - Web load-balancer is bypassed for down-stream traffic Ugly - No data transfer, too many ports or IP destinations 4. Fragmented IP packets. Bad unless: Ugly - very short and/or speed is too high Ugly - Offset + Length > 65,608 bytes
  • 75. Copyright James B. Maginnis 2000-2005 7 5 Examples of The Ugly (continued) 5. Pings and Ping Responses Good - if balanced and reasonable Ugly - Responses without requests, responses have different data from requests (covert channel) Only a few new types of legitimate network activity appear each year. It’s much easier to characterize the new legitimate network protocols, than it is to keep up with the hacker community’s latest creations.
  • 76. Copyright James B. Maginnis 2000-2005 7 6 Examples of The Ugly (continued) • Packets that violate Internet Protocols in ways that have been found to cause computers, firewalls, or intrusion detection systems (IDS) to crash or operate improperly. – Teardrop Attack - IP Fragments that overlap. – Ping of Death - IP Fragmented Datagram with Offset plus Length > 65,507 – (one method - # ping -l 65510 192.168.4.5 ) • Short packets, perhaps belonging to A above, that arrive at such a high rate that they cause damage. – Rapid TCP ―SYN‖ packets, or Isolated Fragments - tie up computer memory.
  • 77. Copyright James B. Maginnis 2000-2005 7 7 Examples of The Ugly (continued) • Packets going to various hosts and ports that are being used to map the network - looking for vulnerable hosts. – TCP ―SYN-FIN‖ or other improper TCP Flag combinations – UDP Packets with zero data bytes – TCPs that cause TCP ―Reject‖, or UDPs that causes ICMP ―Host Unavailable‖ • Hardest to detect, packets that would belong to "The Good" except that the two hosts should not be talking to each other, at least not on that service or port number. – Detection - Compare to database of allowed Server ports.
  • 78. Copyright James B. Maginnis 2000-2005 7 8 Microsoft Break-in Example • Employee created file on PC at home and caught 2-month old virus • Employee e-mailed virus to self at work • Was not caught by a Mail Gateway • Workstation also did not have patches nor definition files up to date • Payload was an open tunnel to a Ukrainian • Who downloaded all development source (e.g. Windows XP); was not caught = no IDS
  • 79. Copyright James B. Maginnis 2000-2005 7 9 Anomaly-based Intrusion Detection High statistical variation in most measurable network behavior parameters results in high false-alarm rate
  • 80. Copyright James B. Maginnis 2000-2005 8 0 Distributed Host-based IDS Highly recommended for critical servers Modules must be installed and configured on hosts.
  • 81. Copyright James B. Maginnis 2000-2005 8 1 Signature-based IDS Data Packets are compared to a growing library of known attack signatures. These include port numbers or sequence numbers that are fixed in the exploit application, and sequences of characters that appear in the data stream.
  • 82. Copyright James B. Maginnis 2000-2005 Six ―Signatures‖ from the Snort Database 8 2 • alert tcp $EXTERNAL_NET any -> $HOME_NET 7070 (msg: "IDS411 - RealAudio-DoS"; flags: AP; content: "|fff4 fffd 06|";) • alert udp $EXTERNAL_NET any -> $HOME_NET any (msg: "IDS362 - MISC - Shellcode X86 NOPS-UDP"; content: "|90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90|";) • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS359 - OVERFLOW-NOOP-HP-TCP2";flags:PA; content:"|0b39 0280 0b39 0280 0b39 0280 0b39 0280|";) • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS345 - OVERFLOW-NOOP-Sparc-TCP";flags:PA; content:"|13c0 1ca6 13c0 1ca6 13c0 1ca6 13c0 1ca6|";) • alert udp $EXTERNAL_NET any -> $HOME_NET any (msg:"IDS355 - OVERFLOW-NOOP-Sparc-UDP2"; content:"|a61c c013 a61c c013 a61c c013 a61c c013|";) • alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg: "IDS291 - MISC - Shellcode x86 stealth NOP"; content: "|eb 02 eb 02 eb 02|";)
  • 83. Copyright James B. Maginnis 2000-2005 8 3 Signature-based IDS May Miss New Attacks Back Orifice Land Attack Attacks with Names Win Nuke Attacks without Names (not analyzed yet) IP Blob Trino Alarm on Activities in these areas.
  • 84. Copyright James B. Maginnis 2000-2005 8 4 Flow-based IDS Technology An approach that recognizes normal traffic can detect new types of intrusions Attacks with Names Back Orifice Attacks without Names Land Attack (not analyzed yet) FTP Web Win Nuke Normal Network Activities IP Blob Alarm on Activities Trino in this areas. NetBIOS Email
  • 85. Copyright James B. Maginnis 2000-2005 8 5 Flow-based Statistical Analysis A “Flow” is the stream of packets from one host to another related to the same service (e.g., Web, email, telnet, …). Data in packet Flow- Flow- Statistics Statistics headers is used to build up Counters Counters counts (leads to high Number of Packets speed). Number of Total Bytes After the flow is over, Number of Data Bytes counters are analyzed and a Start Time of Flow value is derived for the Stop Time of Flow probability that the flow was crafted, perhaps for probing Duration of Flow the network for Flag-Bit True-False Combo vulnerabilities or for denial Fragmentation Bits of service. ICMP Packet Responses to UDP Packets Counters
  • 86. Copyright James B. Maginnis 2000-2005 8 6 IDS Types Should be Combined Host- Can detect misuse of OS access Based and file permissions. Signature Can detect attacks embedded in -Based network data - if signature is known Anomaly On host or network: can detect new -Based types, but high false alarm rate Flow- Can detect new types of attacks by Based network activity. Should be used with Host- and/or Signature-Based
  • 87. Copyright James B. Maginnis 2000-2005 8 7 The Stages of a Network Intrusion 1. Scan the network to: Flow-based "CI" and/or signature-based • locate which IP addresses are in use, • what operating system is in use, • what TCP or UDP ports are ―open‖ (being listened to by Servers). Signature-based 2. Run ―Exploit‖ scripts against open ports 3. Gain access to ―suid‖ Shell (―root‖ privileges) Host-based 4. Download from Hacker Web site special versions of systems files that will let Cracker have free access in the future without CPU or disk usage being noticed by auditing programs. Signature-based "Port-Locking", Host-based 5. Use IRC (Internet Relay Chat) to invite others to the feast. Signature-based "Port-Locking", Host-based
  • 88. Copyright James B. Maginnis 2000-2005 8 Web Server Browser 8 One Solution: Segment Application Application Layer Bridge-Router-Firewall Layer (HTTP) can drop packets (HTTP) Port 80 Port 31337 Transport based on Transport Layer source or destination, Layer (TCP,UDP) IP address, and/or port (TCP,UDP) Segment No. Segment No. Network Network Layer (IP) Layer (IP) IP Address Network Network IP Address 130.207.22.5 Layer Layer 24.88.15.22 E'net Data Token Ring Token Ring E'net Data Link Layer Link Layer Data Link Layer Data-Link Layer Ethernet Token Ring Token Ring E'net Phys. Phys. Layer Layer Phys. Layer Phys. Layer
  • 89. Copyright James B. Maginnis 2000-2005 8 9 Simple Network Man. Protocol v1, v2, and v3 • SNMPv2 makes use of TCP for ―reliable, connection-oriented‖ server. SNMPv1 is ―connectionless‖ since it utilized UDP (rather than TCP) as the transport layer protocol. • Addressed by version 2: – Lack of support for distributed management – Functional deficiencies (since v2 can use TCP/IP and Novel IPX) • Addressed by version 3: – V1 used a community name as a password
  • 90. Copyright James B. Maginnis 2000-2005 9 0 Security - Authentication • Authentication – process to ensure both the message’s content and sender’s identity have been verified by an authorized source and content was not altered. • Digital Certificate – contains digital identity information including; name, public key, operational period, and serial number. • Certificate Authority – authorized issuer of digital certificates
  • 91. Copyright James B. Maginnis 2000-2005 9 1 X.509 Authentication Service (e.g. Verisign) • An International Telecommunications Union (ITU) recommendation (versus ―standard‖) for allowing computer host or users to securely identify themselves over a network. • An X.509 certificate purchased from a ―Certificate Authority‖ (trusted third party) allows a merchant to give you his public key in a way that your Browser can generate a session key for a transaction, and securely send that to the merchant for use during the transaction (padlock icon on screen closes to indicate transmissions are encrypted).
  • 92. Copyright James B. Maginnis 2000-2005 9 2 X.509 Authentication Service (continued) • Once a session key is established, no one can ―high jack‖ the session (after your enter your credit card information, an intruder can not change the order and delivery address). • User only needs a Browser that can encrypt/decrypt with the appropriate algorithm, and generate session keys. • Merchant’s Certificate is available to the public, only the secret key must be protected. Certificates can be cancelled if secret key is compromised.
  • 93. Copyright James B. Maginnis 2000-2005 9 3 VISA SET Steps in a Transaction 1. Customer opens account with card company or bank that supports SET 2. Bank issues X.509 certificate to Customer with RSA Public-Private Keys 3. Merchant has two certificates, one for signing messages and one for key exchange ---- 4. Customer places an order 5. The Merchant sends the customer a copy of his certificate 6. The Customer sends Order Information (OI), and Payment Information (PI) encrypted so the Merchant can not read it --- 7. Merchant requests payment by sending PI to the ―Payment Gateway‖ (who can decrypt it) and verifies Customer’s credit is good 8. Merchant confirms the order to the Customer 9. Merchant ships goods to Customer 10. Merchant sends request for payment to the Payment Gateway which handles transfer of funds
  • 94. Copyright James B. Maginnis 2000-2005 9 4 Why Is SET Not Happening? (but PayPal is) But, Merchant must pay Issuer gets greatest benefit
  • 95. Copyright James B. Maginnis 2000-2005 9 5 Covert Channels • Sending data in a way that network watchers (sniffer, IDS, ..) will not be aware that data is being transmitted. • For IP Networks: – Data hidden in the IP header – Data hidden in ICMP Echo Request and Response Packets – Data tunneled through an SSH connection – ―Port 80‖ Tunneling, (or DNS port 53 tunneling) – In image files.
  • 96. Copyright James B. Maginnis 2000-2005 9 6 Packet Header Hiding: Normal Packet 20-64 bytes 20-64 bytes 0-65,488 bytes IP Header TCP Header DATA Dear Friend, I am having a good time at the beach. TCP Source Port TCP Destination Port IP Source Address IP Destination Address
  • 97. Copyright James B. Maginnis 2000-2005 9 7 NOTE: Long IP Packets Are Fragmented 20-64 bytes 20-64 bytes 0-65,488 bytes IP Header TCP Header DATA Dear Friend, watching the waves I am having a good roll in. time at the beach. TCP Source Port The TCP TCP Destination Port Header IP Source Address IP Source Address is not IP Destination Address IP Destination Address IP Ident = x IP Ident = x repeated More Fragments = True. More Fragments = False.
  • 98. Copyright James B. Maginnis 2000-2005 9 8 Other Convert Channel Tools • SSH (SCP, FTP Tunneling, Telnet Tunneling, X-Windows Tunneling, ...) - can be set to operate on any port (<1024 usually requires root privilege). • Loki (ICMP Echo R/R, UDP 53) • NT - Back Orifice (BO2K) plugin BOSOCK32 • Reverse WWW Shell Server - looks like a HTTP client (browser). App headers mimic HTTP GET and response commands.
  • 99. Copyright James B. Maginnis 2000-2005 9 9 Steganography The hiding of a secret message within an ordinary message so that no one suspects it exists. Ideally, anyone scanning the data will fail to know it contains encrypted data. see http://www.jjtc.com/Steganography
  • 100. Copyright James B. Maginnis 2000-2005 1 0 0 Detecting Covert Channels • A network IDS will detect a ―Ping Unbalance‖ - more Ping Responses than Requests • Block all ICMP packets at firewall • Signature-based IDS will detect known rogue programs • Port 53 Tunneling - Block inbound and outbound TCP/UDP-53 packets at firewall except to/from known internal DNS servers • Port 80 Tunneling - look for long-lasting flows to outside server, excess client-to- server data flow
  • 101. Copyright James B. Maginnis 2000-2005 1 0 1 Detecting Covert Channels (continued) • Port-profile violation • Steganography - If Zombie, look for Port- profile violation, or known hacker-site server. • Monitor for new and unknown processes • Check for new or unknown ports and devices • Know and understand all ―suid root‖ or administrator programs • If you don’t need an account - delete it! • Check System logs
  • 102. Copyright James B. Maginnis 2000-2005 1 0 2 Middleware Security Policies and Software • No Read Up (Simple Security Property): - a subject can only read an object of less or equal security level • No write down (*-Property): - a subject can only write to an object of greater or equal security level (can not lower the security classification of information by writing to an object with a lower security level). You can contribute information to a higher security level report, but can not read the report • Reference Monitor: - a way to enforce the two rules above (security middleware)
  • 103. Copyright James B. Maginnis 2000-2005 Alice’s program has a Trojan Horse inside 1 0 3
  • 104. Copyright James B. Maginnis 2000-2005 Running Alice’s Program Reads Secret file 1 0 4
  • 105. Copyright James B. Maginnis 2000-2005 1 0 5 Reference Monitor Controls Access
  • 106. Copyright James B. Maginnis 2000-2005 1 0 6 Will Not Allow Secret Information Out
  • 107. Copyright James B. Maginnis 2000-2005 1 0 7 www.trustedsystems.com
  • 108. Copyright James B. Maginnis 2000-2005 1 0 8 Other Utilities to Scan for Security Holes • Saint and Satan run exploits – Saint - http://www.wwdsi.com/saint/ – Satan - http://www.fish.com/satan/ • www.ethereal.com protocol analyzer • www.nessus.org/intro.html scanner • naughty.monkey.org/~dugsong/dsniff/ • www.tripwire.com (has academic version) • Public snmpwalk or Bay Networks nman • Only download source format with a PGP (or GPG) certificate that you can check • www.iss.net makes popular commercial IDS
  • 109. Copyright James B. Maginnis 2000-2005 1 0 9 Some MS-Windows Considerations • Standard install NOT Secure! Use few local Accounts (only Administrator and Guest) • Many undocumented and unchecked system variables and functions • SMB challenge-response and compatibility system problems, especially ports 135-139 • All powerful Administrator account, and completely open EVERYONE account • Uses more secure microkernel technologies and networking Redirectors • Trusted Domain architectures similar to NIS, but has not yet seen the same security
  • 110. Copyright James B. Maginnis 2000-2005 1 1 0 Some UNIX Considerations • Berkley ―r‖ commands not a good idea, routinely delete all .rhost files • Issues with SUID utilities and anonymous • SunRPC, NFS, YP, NIS designed with few security mechanisms - naïve client / server assumptions allows spoofing opportunities • Open /etc/password file, use shadow file • More mature OS = fewer system calls with unchecked parameters and ACL (Access Control Lists) now similar to NT • All modern Unix’s enforce resource limits so that programs can not over inflate its priority
  • 111. Copyright James B. Maginnis 2000-2005 1 1 1 Network Tunnels • Modems • VPNs – Virtual Private Networks • Wireless Hubs – biggest threat today!
  • 112. Copyright James B. Maginnis 2000-2005 1 Anyone can convert their cube or office Ethernet jack into a 1 2 Wireless Hub (and add a public entry point into the Network) “30 percent of all enterprises risk security breaches because they've deployed 802.11b wireless local area networks without proper security.” - Gartner Inc. Linksys Wireless D-Link Wireless SMC Wireless Cable/DSL Router Router/Print Cable/DSL $119 Server & Card $129 Router $115
  • 113. Copyright James B. Maginnis 2000-2005 A vs. G ―fixed‖ Wireless 802.11 Technologies 1 1 3 • Up to 11Mbps (4- • Up to 54Mbps 5Mbps common) • Very inexpensive • Only 10% premium and simple, conflicts for five times the with cordless bandwidth phones / microwave ovens, 100 – 300 ft range, penetrates • 100-150 ft most walls • Growing public • Compatible with access (2,000 802.11a Starbucks in 2003)
  • 114. Copyright James B. Maginnis 2000-2005 1 1 4 Freeware WEP Cracking Tools • Of 120 wireless systems located by the Atlanta Journal, only 32 had activated the included encryption protection and no hardware used ―real‖ random numbers • Adam Stubblefield was the first to implement, but AirSnort and WEPCrack are the first made publicly available • AirSnort only needs approximately 5-10 million encrypted packets to guess the encryption password in under a second (http://airsnort.sourceforge.net)
  • 115. Copyright James B. Maginnis 2000-2005 1 1 5 WPA vs. WEP (vs. 802.1x) on WAP • Wireless Access Point (WAP) is the bridge • Weak WEP is the standard way to encrypt • WPA adds Temporal Key Integrity Protocol (TKIP); password MUST not be simple ones • 802.1x is only about port access, usually using a username/password challenge, thus, should be used with WEP (or WPA) • MAC filtering and SSID hiding don’t help • Most networks unsecured (see USA Today article and another about FBI presentation)
  • 116. Copyright James B. Maginnis 2000-2005 1 1 6 Network Stumbler Displays 802.11 Networks ―Wardriving‖ web site maintains data base of all user uploads
  • 117. Copyright James B. Maginnis 2000-2005 1 1 7 AiroPeek Maps Out Users WEP uses the RC4 encryption algorithm (with 40 or 80 bit key), which is weak and inappropriate (assumes packets arrive in order) to save CPU
  • 118. Copyright James B. Maginnis 2000-2005 1 1 8 AiroPeek Maps Out Users (continued) Data sniffed off the air from non-WEP session with AiroPeek.
  • 119. Copyright James B. Maginnis 2000-2005 1 1 9 WEP Problems • One start-up, AirDefense, has catalogued – 100 types of denial-of-service attacks jamming the airwaves with noise to shut down wireless LANs – 27 attacks to take over wireless LAN stations – 490 probes to scan wireless LANs for weaknesses – 190 ways to spoof media access control (MAC) addresses and SSIDs to assume another’s identity • Wireless LANs are a billion-dollar a year business and growing fast, but NIST has recommended against the govt. using them
  • 120. Copyright James B. Maginnis 2000-2005 1 2 0 Wireless Defense Best Efforts • Enable highest encryption available (up to 256-bit), and upgrade firmware often • Use WPA with a strong key, change often • Change the default Admin password • Turn off router with $5 lamp timer at night • Often recommended but easy to bypass: – Using MAC address filtering, also very cumbersome for large corp. environments – Changing the default SSID, re-changing periodically, and turning off broadcasts
  • 121. Copyright James B. Maginnis 2000-2005 1 2 1 WEP Defense Efforts (continued) • Purchase only 802.11 Hubs and PC Cards that have flash memory and can be field upgraded for new standards • Treat wireless subnets like attachments to the Web, isolated by Firewalls and Intrusion Detection Systems (IDS) • Move the transmitter inside buildings and away from windows (most common) • Use higher level security protocols
  • 122. Copyright James B. Maginnis 2000-2005 1 Process Defense => Add Higher Process 2 2 Level Secure Protocols Application Application SSL SSL Router Transport Transport Buffers Packets that Layer Layer need to be forwarded (TCP,UDP) (TCP,UDP) (based on IP address). Network Network Layer (IP) Layer (IP) Network Network IPsec Layer Layer IPsec 802.11 802.11 Ethernet Ethernet Link Layer Link Layer Data Link Layer Data-Link Layer WEP WEP Ethernet Ethernet 802.11 802.11 Phys. Layer Phys. Layer Phys. Layer Phys. Layer
  • 123. Copyright James B. Maginnis 2000-2005 Privacy – Cookies, Will You Allow Them? 1 2 3 • Piece of information that allows a Web site to record one’s comings and goings – Session and Permanent • Cookies are Bad – Advertising / Receiving and transmitting of data (unknown and unencrypted) – Europe is considering banning cookies • Cookies are Good – Passwords and login (encryption)
  • 124. Copyright James B. Maginnis 2000-2005 1 2 4 What is spamming? • Spamming (from Monty Python reference) – “the practice of indiscriminate distribution of messages (for example junk mail) without permission of the receiver and without consideration for the messages’ appropriateness” • Spamming’s negative impacts – Spam has comprised 30% of all mail sent on America Online • slowing the Internet in general • shutting ISPs down completely
  • 125. Copyright James B. Maginnis 2000-2005 1 2 5 Controlling Spamming • Disable the relay feature on SMTP (mail) servers so mail cannot be bounced off the server • Tell users not to validate their addresses by answering spam requests for replies if they want to be taken off mailing lists. Delete spam and forget it— it’s a fact of life and not worth wasting time over • Software packages, e.g. www.getlost.com and www.junkbusters.com
  • 126. Copyright James B. Maginnis 2000-2005 10-Minute Break… 1 2 6 Question: What do you get what you cross an instructor with a spud? Answer: A Facili-Tator
  • 127. Copyright James B. Maginnis 2000-2005 1 2 7 Encryption Policy • The 128-BIT Encryption Debate – Export 128-bit encryption is 3X10 to the 26th power times more difficult to decipher than the preceding legally exportable technology. Secure e-commerce Government‟s legal requirements For the past 20 years Recent legislation there was a limitation allows 128 bit in on exported specific circumstances encryption devices of thus paving the way for 56 bit codes the Compaq permit
  • 128. Copyright James B. Maginnis 2000-2005 Privacy – Legislation Examples 1 2 8 • Electronic Theft (NET) Act – Imposed criminal liability for individuals who reproduce or distribute copies of copyrighted work • Digital Copyright Clarification and Technology Education Act – Limits the scope of digital copyright infringement by allowing distance learning exemptions • Online Copyright Liability Limitation Act – Seeks to protect Internet access providers from liability for direct and vicarious liability under specific circumstances where they have no control or knowledge of infringement
  • 129. Copyright James B. Maginnis 2000-2005 Clinton’s Intellectual Property Legacy 1 2 9 • Harassment of Phil Zimmerman (PGP) • Intelligence Auth Act (IAA) of 1996 – Expands Foreign Intl Surveillance Court (FISC), circumventing 1st, 4th, 5th, and 6th amendments • Economic Espionage Act (EEA) of 1996 – Replaces most state and federal copyright laws – Violates several international treaties • Digital Millennium Copyright Act of 1998 – Makes anti-copying technology illegal – forbids even some copying of public domain information – Threatens free speech and the right of fair use
  • 130. Copyright James B. Maginnis 2000-2005 1 3 0 Now, The PATRIOT Act • “Provide Appropriate Tools Required to Intercept and Obstruct Terrorism” • Anti-Terrorism Act (ATA), formerly known as the Mobilization Against Terrorism Act (MATA), was co-sponsored by Jon Kyl • Stewart Baker (employed by NSA to block unbreakable cryptography), "Don't look for a dramatic increase in <new wiretaps>, because the Bureau was performing such surveillance years before the bill passed, without Congress' explicit approval." • Also frees the CIA to recruit unsavory infiltrators (other terrorists) without restraint
  • 131. Copyright James B. Maginnis 2000-2005 1 3 1 Copyright Protection Techniques • Digital Watermarks – Embedding of invisible marks – Can be represented by bits in digital content – Hidden in the source data, becoming inseparable from such data • Digital Signatures – Used to authenticate the identity of the sender of a message or the signer of a document (not to be confused with a digital certificate) – Electronic Signatures in Global and National Commerce Act (referred as the e-signature bill)
  • 132. Copyright James B. Maginnis 2000-2005 1 3 2 Electronic Contracts and Licenses • Shrink-wrap agreements (or box top licenses) – The user is bound to the license by opening the package – This has been a point of contention for some time – The court felt that more information would provide more benefit to the consumer given the limited space available on the exterior of the package • Click-wrap contracts – The software vendor offers to sell or license the use of the software according to the terms accompanying the software – The buyer agrees to be bound by the terms based on certain conduct
  • 133. Copyright James B. Maginnis 2000-2005 1 3 3 Biometrics Controls • Photo of face (―Snooper‖ Bowl) • Fingerprints (Laptops) • Hand geometry • Blood vessel pattern in the retina of eye • Voice Recognition • Signature • Keystroke dynamics All can be easily beaten!
  • 134. Copyright James B. Maginnis 2000-2005 1 3 4 Security Summary • Segment and use ―real‖ firewalls with DMZ • Remove databases from Internet • Control VPN nodes and Fill wireless holes • Keep IE and application patches and viral definitions up to date (Update Expert) • Improve network management (ManageX) • Build Security Policy and Awareness • Get involved in software development • Check system / network logs and alerts
  • 135. Copyright James B. Maginnis 2000-2005 1 3 5 Security Summary (continued) • Encrypt with 3DES or Rijndael • Setup Kerberos, Radius, Directory Services, and Window’s roaming profiles • Verify good passwords • Use host, signature, anomaly, and flow IDS • Consider Monitor Middleware • Regularly scan for security holes • Don’t use default installation for Windows • Review legal issues
  • 136. Copyright James B. Maginnis 2000-2005 1 3 6 Other Security Policy Items • Use individual customer digital certificates over SSL for all client data access • Internet access only with hardware token • Enforce utilizing ―strong‖ passwords and every person having own account • Strict limitation of Java applet functionality • Applications not in root or nobody accounts • Track Inventory and licenses (TrackIT) • Use WebTrends Security Analyzer
  • 137. Copyright James B. Maginnis 2000-2005 Number one security issue still remains… 1 3 7 Use cross or dot (not strip) shredder with good document destruction procedures • Targeted attack will mostly likely come through your trash – Everything there is in the ―public domain‖ – All your ―secrets‖ are out in the open
  • 138. Copyright James B. Maginnis 2000-2005 1 3 8 Risk Assessment and Management • Part of the New Economy is a willingness to take more risks - many companies, however, work in a ―risk denial‖ mode: estimating and planning as if all variables are known • Get inputs from Software Development Plans, QA Plans, and/or Technology Plans • Identify and Prioritize exposed uncertainties and risk factors – Identify Risk Indicators (e.g. discussed security issues or technology and project experience) – Decide on avoidance, transfer, or acceptance
  • 139. Copyright James B. Maginnis 2000-2005 1 3 9 Risk Assessment Planning (continued) • Recommend mitigation strategies for minimizing the top 10 risks => ―Actions taken to reduce or eliminate the detrimental impact of certain events.‖ – Build Prototypes and do tests modeling the workload – Management tools, regular reviews, change control – A project being late is an effect, not a risk • Don’t forget alternatives and backup plans (do nothing is always one approach) • Each with varying risk approaches – Decisions to Build or Buy Solutions (Can you imagine this effort/product for sale?) – Outsourcing and Technology Insurance can share the risks of doing business
  • 140. Copyright James B. Maginnis 2000-2005 1 4 0 Information Gathering Methods • Tools and methods to obtain information about a subject (including the existing systems) aka Fact Finding – Interviews – Questionnaires or surveys – Workshops, Brainstorming, Storyboarding – Reviewing Documentation – Observation – Measuring – Prototyping and proofs of concept
  • 141. Copyright James B. Maginnis 2000-2005 1 4 1 Systems Analysis Means a Holistic Approach Actively Organizational learning to Technology better use the best people, Productivity practices, & technology to Key positively People Process Areas of influence Systems productivity. Analysis Present Functional System Requirements
  • 142. Copyright James B. Maginnis 2000-2005 1 4 2 The Big Picture
  • 143. Copyright James B. Maginnis 2000-2005 1 4 3 The Risk Management Mindset Identification Mitigation 2. “Java 2. Mitigation by Project skills not Project avoidance: Use Finish high Finish Visual Basic enough.” (or by transfer: Out source Risk 2 Risk 2 Risk 1 Risk 1 1. mitigation by conquest: 1. “May not be Avoid / Delay, Demonstrate image super- possible to Transfer, imposition (or superimpose by delay or by images Project Accept, or Project tolerance) adequately.” Start Tolerate Start Adapted from Software Engineering: An Object-Oriented Perspective by Eric J. Braude (Wiley 2001), with permission.
  • 144. Copyright James B. Maginnis 2000-2005 1 4 4 Investigation Includes Feasibility Analysis Economic Organizational Feasibility Feasibility Can we afford it? Is it a good fit? Technical Operational Feasibility Feasibility Does the Will it be accepted? capability exist?
  • 145. Copyright James B. Maginnis 2000-2005 Accounting – Do benefits outweigh costs? 1 4 5 • Payback Analysis: how long will it take (usually in years) to pay back • Return on Investment (ROI): compares the lifetime profitability of alternative solutions • Net Present Value: determines the profitability in terms of today’s dollar values. This will require an estimated inflation and discount rate (for industry/company) • Currency conversion in business context allows tracking in management’s language
  • 146. Copyright James B. Maginnis 2000-2005 1 4 6 Who is responsible for What? • Chairman of the Board => To protect and insure for continuity of the corporation • President => To protect and insure for profitability of the corporation • Managers => To maintain information as a strategic asset of the corporation • IS Security Manager => To insure written security policies are developed, implemented and followed • Users => Ultimate responsibility for accidental or intentional destruction or disclosure
  • 147. Copyright James B. Maginnis 2000-2005 1 4 7 Security Policies • ―Guidelines‖ if management support is weak • Less effective if not applied consistently • Assures proper implementation of controls • Guides product selection and development • Demonstrates management support • Avoids liability and protects trade secrets • Helps adapt to dynamic communications • Coordinates the activities of groups – Only software approved by IT, Passwords will never be hard coded or written down, Users must sign Responsibility/Liability documents
  • 148. Copyright James B. Maginnis 2000-2005 1 4 8 Physical Security • Access to every office, computer room, and work area must be restricted by need • And, by an appropriate method: guard or receptionist, key lock, card lock, etc. • Use of physical firewalls and fire doors for physical access security • All multi-user or communication equipment must be locked and cable kept in conduit • Use of ID Badges • Workers must never allow admittance to someone not identified
  • 149. Copyright James B. Maginnis 2000-2005 1 4 9 Physical Security (continued) • Propped open doors require a guard • Sign-out sheets and bar code stickers for tracking all equipment • Fire Resistance materials, self-closing openings, fire extinguishing for secure areas • Example physical security systems inspector guide:http://www.oa.doe.gov/guidedocs/000 9pssig/0009pssig.html
  • 150. Copyright James B. Maginnis 2000-2005 1 5 0 Other Physical Security Issues • Limited access to letter head, Check Stock, employee lists, and other forms • No Smoking, Eating, and Drinking in the Computer Room, not be an access site • Access to Software Installation Media • Three or more officers, or five or more employees, must not take the same airplane • Decide areas where electronic monitoring of workers will and will not be used • ―Clean Desk‖ Policy and Storage of Laptops • Positioning and moving computer screens away from windows and close blinds
  • 151. Copyright James B. Maginnis 2000-2005 1 5 1 Other Physical Security Issues (continued) • Sensitive data not stored on local drives • Approved methods for the storage and destruction of discarded hardcopies • Can disk drives be returned to manufacturers under maintenance? • White boards must be erased after meetings • No signs indicating computer room location • Location of facilities will be in-town and away from natural and man-made hazards • Background checks or escorts for anyone being granted physical access
  • 152. Copyright James B. Maginnis 2000-2005 1 5 2 Awareness Raising Methods • Change the log-on banner or log-in screen • New Employee packet with security policy • Ticket warnings reflecting policy violations • Conduct audits and vulnerability demos • Adopt an Annual Information Security Day • Add security questions to reviews • Purchase Security CBT and log when run • Regular emails concerning current security issues, virus warnings, etc • Post Security Policy on company Intranet • Survey middle and upper managers
  • 153. Copyright James B. Maginnis 2000-2005 1 5 3 Tiger Team Best Practices (without panic) • Protection, Detections, and Reaction (PDR) • Computer Incident Response Team (CIRT) includes both technicians and management • Clear procedures for activating the team – Different incidents may require different people • What can be done while they’re on their way? – Do Install Plans have back out plans (capacity is a security issue)? – Automated shutdown for containment subnetting – Heighten automatic monitoring • Determine nature and scope of incident – Intrusion-logs, check modifications, monitor network / systems, coordinate with remote sites
  • 154. Copyright James B. Maginnis 2000-2005 1 5 4 Tiger Team Best Practices (continued) • Produce, Approve, and Implement an Emergency Response Plan – E.G. backup systems, undo modifications found, and rebuild secure network • Increase security perimeter defenses, monitoring, and awareness • Non-technical issues: Public image, legal actions, customer relations, and reporting • Attack and penetration assessments – Identify Achilles heels and potential costs – Assess Risk Level of each system/subnet – Setup Automated and Manual scanning
  • 155. Copyright James B. Maginnis 2000-2005 1 5 5 Vulnerability Report should include: • Tracking Information • Identification of the affected products, vendors, and partners • Initial impact assessment • Description of recommended test environment • Technical description • Possible exploitation details • Initial work-around, if possible • Contact information
  • 156. Copyright James B. Maginnis 2000-2005 1 5 6 Response Team Performance Delay Metrics a. From discovery to verification b. From verification to reporting c. From reporting to acknowledgement d. From reporting to patch release e. From reporting to advisory release f. Total = (a+b) + max (d, e)
  • 157. Copyright James B. Maginnis 2000-2005 1 5 7 Issues to Settle by Launch • Process to be used • Security goals • Manner of tracking security goals • How team will make decisions • What to do if security goals not attained – fallback positions • What to do if plan not approved – fallback positions • Define team roles • Assign team roles
  • 158. Copyright James B. Maginnis 2000-2005 1 5 8 Distributed versus Centralized Systems A distributed system is one in which the DATA, PROCESS, and INTERFACE components of an information system are distributed to multiple locations in a computer network. Accordingly, the processing workload is distributed across the network. In centralized systems, a central, multi-user computer hosts all the DATA, PROCESS, and INTERFACE components of an information system. Users interact with the system via terminals (or terminal emulators).
  • 159. Copyright James B. Maginnis 2000-2005 1 5 9 Flavors of Distributed Computing
  • 160. Copyright James B. Maginnis 2000-2005 Client/Server Architecture – The Clients 1 6 0 A client/server system is a solution in which the presentation, presentation logic, application logic, data manipulation, and data layers are distributed between client PCs and one or more servers. A thin client is a A fat client is a personal personal computer that computer or workstation does not have to be very that is typically more powerful (or expensive) powerful (and expensive) in terms of processor in terms of processor speed and memory speed, memory, and because it only presents storage capacity. Most the user interface. PCs are fat clients.
  • 161. Copyright James B. Maginnis 2000-2005 1 6 1 Multi-Tier Architecture = Better Security/Perf • A database server hosts one or more shared databases and executes all data manipulation. • A transaction server hosts services that ultimately ensure that all database updates for a single transaction succeed or fail as a whole. • An application server hosts the application or business logic and services for an IT system. • A messaging or groupware server hosts services for e-mail, calendaring, etc. • A web server hosts Internet or intranet web sites and services, communicating through thin-client interfaces such as web browsers.
  • 162. Copyright James B. Maginnis 2000-2005 1 6 2 On-Line Transaction Processing (OLTP) • File, Database, Record, Field … Then … • What is Transaction Processing? • Audit Trails, Backup and Recovery • Data entry validation • Interactive, Real-time, and Batch • Applications – Inventory Control – Payroll – General Ledger – Financial, Marketing, Manufacturing, HR, ERP