SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Understanding Security
       Nat Torkington




Tuesday, 30 August 2011
“secure”




Tuesday, 30 August 2011

I’d like to start by looking at the word “secure”. We talk about
something “being secure”, but to professionals in the area it’s not so
simple.
“secure”
       “lawful”



Tuesday, 30 August 2011

Security is a lot like the law, in fact. Outsiders think it’s black and white,
but you know that it’s an ocean of grey which requires interpretation,
argument, judgement.
“The only secure computer
       is one that’s unplugged,
       locked in a safe, and buried
       20 feet under the ground in
       a secret location ... and I’m
       not even too sure about that
       one.”
                      –Denis Hughes
Tuesday, 30 August 2011

This quote sums up the attitude of the real computer professional.
Secure from what? I could follow your car to the secret location, dig up
the safe, break into it, plug it back in, and access your files!
“secure”




Tuesday, 30 August 2011

So the word “secure” just doesn’t make a lot of sense. Instead,
“posture”




Tuesday, 30 August 2011

security professionals talk about your security posture. That is, what
direction are you expecting an attack to come from, what form will it
take, and how are you prepared to respond? Implicit is the idea that
you’re going to ignore some attacks as too improbable or too hard to
defend against.
Imagine a street fight: you expect punches and kicks, maybe a headbutt.
A knife? Possibly. Are you safe if you know how to defend against
those? What about a gun? What if there’s a sniper? What if someone
drives a car into you? There are always more possibilities for attack, and
part of a rational defence is figuring out what to guard against.
“what do you have?”
       “how might you be attacked?”
       “how likely are those attacks?”
       “how could I defend against
       them?”
       “how much will that cost?”


Tuesday, 30 August 2011

These are the kinds of questions you have to ask yourself. But, of
course, to do this you need to know how you can be attacked! I’m going
to take you quickly through these questions so you can get a sense of
what you might need to defend against.
What do you have of value?




Tuesday, 30 August 2011
What do you have of value?
           client lists




Tuesday, 30 August 2011

contact details and phone numbers.
What do you have of value?
           client lists
           your credit card and other personal details




Tuesday, 30 August 2011

and of course, information about yourself. Maybe that’s useful to an
identity thief, or someone who wants to go on a spree with your
Platinum Amex
What do you have of value?
           client lists
           your credit card and other personal details
           sensitive background documents for cases




Tuesday, 30 August 2011

internal documents from clients, confidential and commercially
sensitive. Full of competitive information, plans, weaknesses, and
candid observations.
What do you have of value?
           client lists
           your credit card and other personal details
           sensitive background documents for cases
           notes on how you will argue in court




Tuesday, 30 August 2011

preparation for your arguments and presentations
What do you have of value?
           client lists
           your credit card and other personal details
           sensitive background documents for cases
           notes on how you will argue in court
           email and private communications that could be
           embarrassing if released




Tuesday, 30 August 2011

and, of course, your text messages and emails and whatever. You might
have an affair, you might tell a partner that your client is a pain in the
arse, etc.
What could happen?




Tuesday, 30 August 2011

So now let’s ask what a bad guy might do. (we call them “black hats” in
the computer business, it’s a nice way of avoiding sounding like George
Bush ranting against “the evil durrs”)
What could happen?
           copy




Tuesday, 30 August 2011

Well, obviously they might copy the information off to their own
systems. You might never know. Suddenly the competition would know
what your clients were up to, or your credit card was used. Telecom ran
into this last year when it was revealed that a rival had access to
Telecom’s customer list via a call centre application.
What could happen?
           copy
           delete




Tuesday, 30 August 2011

A malicious attacker could simply delete the information. Imagine the
chaos if, just before you rock up to court, someone blew away your
online notes. Or the chaos your billing would be in without your
administrative information.
What could happen?
           copy
           delete
           prevent your access or use




Tuesday, 30 August 2011

This is like deleting the information, but instead of having to remove it
from your system, they just have to prevent you from getting to it. So it
might all exist on the hard drive, but the machine won’t start up. Or
your accounts live on in Xero but they’ve changed your password and
you can’t log in to get to it. Or they flood your Internet line with so
much traffic that you can’t get to your Google mail.
What could happen?
           copy
           delete
           prevent your access or use
           alter




Tuesday, 30 August 2011

The most insidious behaviour is to subtly change your information. For
example, I might quietly break in and change the settings on your email
to deliver to my anonymous email address another copy of all your
email. Or I might change your notes so you argue badly in court.
Attack Actions




Tuesday, 30 August 2011

Ok, so now we know what we’re afraid of happening to our business,
how might it happen? Let’s look at scenarios in increasing order of
deviousness.
Attack Actions
           physically destroy




Tuesday, 30 August 2011

Well, I might smash your laptop or computer. I’m not going to be able
to accomplish every goal this way, but I can certainly deny you access to
your files in this way. All I have to do is burn your office building.
Backups obviously help here, whether to the cloud or just to a DVD
that’s kept somewhere else.
Attack Actions
           physically destroy
           physically remove




Tuesday, 30 August 2011

What I can’t achieve by destroying the machine, I might be able to
achieve by taking it away from you--steal your laptop, break in and
whisk away your server. These are some of the prime scenarios why
people encrypt their hard drives. You might have my physical computer
but you’ll never get the information off it, sonny!
Attack Actions
           physically destroy
           physically remove
           physically copy




Tuesday, 30 August 2011

Now we get more devious. You might never know I’ve been in and out if
I’ve physically copied the information but otherwise left things as they
were. It’s like photocopying paper files.
Even better, if you’ve encrypted documents and I copy the document, I
can then (on my own site, in my own time) throw all the computing
resources I have at breaking that encryption. Brute force (trying zillions
of plausible passwords) works almost all the time.
Attack Actions
           physically destroy
           physically remove
           physically copy
           overhear




Tuesday, 30 August 2011

I might physically tap your outgoing broadband to read your email or
watch your accounts, just as I might tap your phone to listen to your
conversations. I might watch as you unlock your iPhone in line at the
airport.
Attack Actions
           physically destroy
           physically remove
           physically copy
           overhear
           malware




Tuesday, 30 August 2011

I might put software onto your computer that you can’t see, but which
works for me: it tells me what you type, it sends me the web pages you
look at, it sends me every file on your computer. From afar, I could even
instruct your computer to send spam, attack another computer, or
destroy the hard drive. Collectively this bad software is called
“malware”, and it encompasses specialist terms like “trojan”, “virus”, and
so on.
Attack Vectors




Tuesday, 30 August 2011

Ok, so if I were a black hat hoping to do some of those bad things to
you, what am I going to do?
Attack Vectors

           B&E




Tuesday, 30 August 2011

Possibly the easiest to break into your office and steal the computer.
Those of you in small practices are particularly vulnerable to bricks
through the window. Before the security company arrives, I’ll have
hoofed it with your computer.
If I don’t want you to know that I have your stuff, I’ll sweep a couple of
folders off the desk but also sneak in and put a keylogger between your
keyboard and your computer. Then all I have to do is repeat the process
two weeks later and i’ll have your passwords and
Tuesday, 30 August 2011

This is a before and after of a keylogger installed on a computer. You
wouldn’t notice, but it’s silently listening to every keystroke.
Attack Vectors

           B&E
           Employees




Tuesday, 30 August 2011

But, to be honest, B&E is too risky. It involves leaving one’s chair. The
easiest way to get inside your computers is to have someone at your
company give it to me. At big companies with corporate IT, it’s easy
(“hi, it’s Jill here on Level 4 -- I’ve forgotten how to change my
password, could you do it for me?”).
At a smaller company, I could just call and pretend to be Microsoft
support. Well, I could until the newspapers got ahold of it. But the basic
idea is sound: pretend to be someone I’m not, get you to give me the
passwords, and I’m in. This is called “social engineering”, and is the
digital equivalent of pretending to be the pizza delivery man or cleaners
to get physical access.
Attack Vectors

           B&E
           Employees
           Passwords




Tuesday, 30 August 2011

I might not even have to call you. If your computer systems are
connected to the Internet (or live in the cloud), I might just be able to try
every one of thousands of passwords until I find the one that lets me in.
Most people aren’t imaginative about their passwords: hands up
everyone who has a password that includes a person’s name. A place
name. A date.
Once I have your password, the computer thinks I’m you. I can read
your files, log in remotely, and copy and change whatever I like.
Best of all, most people reuse passwords. Maybe I throw all my
resources against the silly Internet forum you use to read funny cat
pictures, then once I’ve found that password I’ll use it to silently and
invisibly log into your work computer.
Attack Vectors

           B&E
           Employees
           Passwords
           Phishing




Tuesday, 30 August 2011

Another way for me to get you to hurt your security is to try “phishing”.
That’s where I send you mail that looks like it’s from Xero, it says “as
part of our regular security audit, we detected that you have a vulnerable
password. Please log in here and change it.” Of course, the link in the
email isn’t to Xero’s web site, it’s to a blackhat website that looks like
it’s Xero. Bingo, you’ve just told me your Xero password.
Or perhaps I don’t want you to go to Xero, I want you to open this
attachment. But the attachment is deceptive and malicious: it’s a
spreadsheet but it loads something that installs malware on your hard
drive.
Even if you think you’re onto my game and you won’t open attachments
from strangers or click links that purport to be from trusted sites, I
might still be able to get you. I’ll focus in on you, and forge an email
that looks like it’s specifically from someone you know and aimed at you.
This is called “spear phishing”.
RSA, a security company whose secure tokens are password
replacements that are heavily used in the American defense industry, was
targeted by Chinese hackers in just this fashion. Employees who weren’t
high-profile got mail with the subject line “2011 Recruitment Plan” and a
spreadsheet, which had malware in it. From there, attackers got the keys
to the encryption in RSA’s magic password system, and opened the
doors to Lockheed and other defence contractors.
Attack Vectors

           B&E
           Employees
           Passwords
           Phishing
           Internet-exploitable software vulnerability




Tuesday, 30 August 2011

But bugger it, if you’ve left your Windows machine plugged directly into
the Internet with no firewall running then I can probably bust in.
Chances are that one of the things your computer is running can’t deal
with the crap I can throw at it, and I’ll be able to use it to break in.
Are these reasonable?




Tuesday, 30 August 2011

You might be asking yourself whether you actually have something to
fear from any of these. It depends on your clients. Computer espionage
is very common between business rivals, and is very common between
nation states. As the stakes and the stature of the clients goes down,
the odds of attacks you’ll attract because of them go down. Two farmers
in Warkworth aren’t going to attract the same interest as, say, the
barrister for Julian Assange of Wikileaks.
Then again, as a computer user (regardless of your profession) on the
Internet you have to watch out for attempts to trick you into divulging
passwords or installing software: your credit card number and the use of
your computer is enough for many out there.
Reasonable Precautions




Tuesday, 30 August 2011

So here are seven reasonable precautions that you should take.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups




Tuesday, 30 August 2011

First, these are the basics. If you don’t do these, don’t even bother with
anything else. You might as well just mail your files to the Kremlin.
Firewall keeps unwanted Internet connections out. It’s like bright lights
around your building at night.
Antivirus software is now generally anti-malware. It’ll scan your
downloads and attachments and keep the bad stuff out.
Automatic updates keep your computer secure. You can’t do this once
and then walk away. Pay the money to the bloodsuckers at the antivirus
company and get the updates: no point being 2005-secure in 2011.
There’s no such thing as “2005-secure in 2011”.
Backups are to keep your files safe should your computers be stolen,
lost, or destroyed. Don’t keep your backups with your computers (fires).
If you’re worried about information being stolen, physically secure those
backups.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords




Tuesday, 30 August 2011

Lock your office doors and window. Lock your laptop too: enable
passwords and swipe codes and whatever else your gizmos have to keep
people out. Here you’re protecting against someone stealing your
laptop, opening it up, and realizing they can sell or use your files for
their advantage.
Consider enabling “two factor authentication” if you use Google apps like
gmail. When you go to log in, Google will text you a passcode that you
have to enter before you can actually use the service.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords
           Make the passwords hard to guess




Tuesday, 30 August 2011

You wouldn’t use a plasticine padlock; don’t use a weak password.
Use a different password on each service.
Use a system for your passwords (e.g., three random words and the
name of the service, separated by punctuation).
Consider using 1Password if all these passwords are too hard to
remember. It’s an app for your iPhone (or laptop or other smartphone) to
keep your passwords encrypted, revealing them as you need them
(assuming you can provide The Master Password).
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords
           Make the passwords hard to guess
           Encrypt your files




Tuesday, 30 August 2011

If I steal your computer, I can take the hard drive out, put a cable on it,
and look at the files from my computer. Encrypt that sucker. Modern
operating systems come with this, use it.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords
           Make the passwords hard to guess
           Encrypt your files
           Prevent shoulder-surfing




Tuesday, 30 August 2011

Treat your password like a PIN: look around to see who’s watching.
Shoulder surfing is the fine art of looking at people as they type in
passwords. Just as you’re supposed to shield your hand as you type in
your PIN at the supermarket (but who does), you should be aware of
your surroundings every time you unlock your phone or computer.
Similarly, don’t read work stuff on the plane. I *am* that guy who
always tries to read the stuff you’re looking at.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords
           Make the passwords hard to guess
           Encrypt your files
           Prevent shoulder-surfing
           Encrypt your Internet traffic




Tuesday, 30 August 2011

If you’re going to work outside the office, get a VPN (Virtual Private
Network). This makes sure that I can’t watch your Internet messages zip
past and pull out the passwords.
Reasonable Precautions
           Firewall, antivirus, automatic updates, and (secure)
           backups
           Use locks and passwords
           Make the passwords hard to guess
           Encrypt your files
           Prevent shoulder-surfing
           Encrypt your Internet traffic
           Train employees


Tuesday, 30 August 2011

It does you no good to be paranoid if your secretary lets the black hat
in. Educate everyone about the perils of shoulder surfing and social
engineering for physical or online access. Establish procedures for
controlling access, and enforce them (no “look, it’s someone you don’t
know, but I have a great sob story that means you should bend the
rules ....”).
Thank you
                          nathan@torkington.com




Tuesday, 30 August 2011

Más contenido relacionado

Más de gnat

Open Innovation
Open InnovationOpen Innovation
Open Innovationgnat
 
Technology Time Out
Technology Time OutTechnology Time Out
Technology Time Outgnat
 
Open Data, ALGIM 2010
Open Data, ALGIM 2010Open Data, ALGIM 2010
Open Data, ALGIM 2010gnat
 
2010 ALGIM Gov 2.0
2010 ALGIM Gov 2.02010 ALGIM Gov 2.0
2010 ALGIM Gov 2.0gnat
 
National Digital Library
National Digital LibraryNational Digital Library
National Digital Librarygnat
 
ALGIM 2009: Gov 2.0
ALGIM 2009: Gov 2.0ALGIM 2009: Gov 2.0
ALGIM 2009: Gov 2.0gnat
 
A Play in Three Acts
A Play in Three ActsA Play in Three Acts
A Play in Three Actsgnat
 
Better, Stronger, Faster Failures
Better, Stronger, Faster FailuresBetter, Stronger, Faster Failures
Better, Stronger, Faster Failuresgnat
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloudgnat
 

Más de gnat (9)

Open Innovation
Open InnovationOpen Innovation
Open Innovation
 
Technology Time Out
Technology Time OutTechnology Time Out
Technology Time Out
 
Open Data, ALGIM 2010
Open Data, ALGIM 2010Open Data, ALGIM 2010
Open Data, ALGIM 2010
 
2010 ALGIM Gov 2.0
2010 ALGIM Gov 2.02010 ALGIM Gov 2.0
2010 ALGIM Gov 2.0
 
National Digital Library
National Digital LibraryNational Digital Library
National Digital Library
 
ALGIM 2009: Gov 2.0
ALGIM 2009: Gov 2.0ALGIM 2009: Gov 2.0
ALGIM 2009: Gov 2.0
 
A Play in Three Acts
A Play in Three ActsA Play in Three Acts
A Play in Three Acts
 
Better, Stronger, Faster Failures
Better, Stronger, Faster FailuresBetter, Stronger, Faster Failures
Better, Stronger, Faster Failures
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloud
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

The Nature of Security

  • 1. Understanding Security Nat Torkington Tuesday, 30 August 2011
  • 2. “secure” Tuesday, 30 August 2011 I’d like to start by looking at the word “secure”. We talk about something “being secure”, but to professionals in the area it’s not so simple.
  • 3. “secure” “lawful” Tuesday, 30 August 2011 Security is a lot like the law, in fact. Outsiders think it’s black and white, but you know that it’s an ocean of grey which requires interpretation, argument, judgement.
  • 4. “The only secure computer is one that’s unplugged, locked in a safe, and buried 20 feet under the ground in a secret location ... and I’m not even too sure about that one.” –Denis Hughes Tuesday, 30 August 2011 This quote sums up the attitude of the real computer professional. Secure from what? I could follow your car to the secret location, dig up the safe, break into it, plug it back in, and access your files!
  • 5. “secure” Tuesday, 30 August 2011 So the word “secure” just doesn’t make a lot of sense. Instead,
  • 6. “posture” Tuesday, 30 August 2011 security professionals talk about your security posture. That is, what direction are you expecting an attack to come from, what form will it take, and how are you prepared to respond? Implicit is the idea that you’re going to ignore some attacks as too improbable or too hard to defend against. Imagine a street fight: you expect punches and kicks, maybe a headbutt. A knife? Possibly. Are you safe if you know how to defend against those? What about a gun? What if there’s a sniper? What if someone drives a car into you? There are always more possibilities for attack, and part of a rational defence is figuring out what to guard against.
  • 7. “what do you have?” “how might you be attacked?” “how likely are those attacks?” “how could I defend against them?” “how much will that cost?” Tuesday, 30 August 2011 These are the kinds of questions you have to ask yourself. But, of course, to do this you need to know how you can be attacked! I’m going to take you quickly through these questions so you can get a sense of what you might need to defend against.
  • 8. What do you have of value? Tuesday, 30 August 2011
  • 9. What do you have of value? client lists Tuesday, 30 August 2011 contact details and phone numbers.
  • 10. What do you have of value? client lists your credit card and other personal details Tuesday, 30 August 2011 and of course, information about yourself. Maybe that’s useful to an identity thief, or someone who wants to go on a spree with your Platinum Amex
  • 11. What do you have of value? client lists your credit card and other personal details sensitive background documents for cases Tuesday, 30 August 2011 internal documents from clients, confidential and commercially sensitive. Full of competitive information, plans, weaknesses, and candid observations.
  • 12. What do you have of value? client lists your credit card and other personal details sensitive background documents for cases notes on how you will argue in court Tuesday, 30 August 2011 preparation for your arguments and presentations
  • 13. What do you have of value? client lists your credit card and other personal details sensitive background documents for cases notes on how you will argue in court email and private communications that could be embarrassing if released Tuesday, 30 August 2011 and, of course, your text messages and emails and whatever. You might have an affair, you might tell a partner that your client is a pain in the arse, etc.
  • 14. What could happen? Tuesday, 30 August 2011 So now let’s ask what a bad guy might do. (we call them “black hats” in the computer business, it’s a nice way of avoiding sounding like George Bush ranting against “the evil durrs”)
  • 15. What could happen? copy Tuesday, 30 August 2011 Well, obviously they might copy the information off to their own systems. You might never know. Suddenly the competition would know what your clients were up to, or your credit card was used. Telecom ran into this last year when it was revealed that a rival had access to Telecom’s customer list via a call centre application.
  • 16. What could happen? copy delete Tuesday, 30 August 2011 A malicious attacker could simply delete the information. Imagine the chaos if, just before you rock up to court, someone blew away your online notes. Or the chaos your billing would be in without your administrative information.
  • 17. What could happen? copy delete prevent your access or use Tuesday, 30 August 2011 This is like deleting the information, but instead of having to remove it from your system, they just have to prevent you from getting to it. So it might all exist on the hard drive, but the machine won’t start up. Or your accounts live on in Xero but they’ve changed your password and you can’t log in to get to it. Or they flood your Internet line with so much traffic that you can’t get to your Google mail.
  • 18. What could happen? copy delete prevent your access or use alter Tuesday, 30 August 2011 The most insidious behaviour is to subtly change your information. For example, I might quietly break in and change the settings on your email to deliver to my anonymous email address another copy of all your email. Or I might change your notes so you argue badly in court.
  • 19. Attack Actions Tuesday, 30 August 2011 Ok, so now we know what we’re afraid of happening to our business, how might it happen? Let’s look at scenarios in increasing order of deviousness.
  • 20. Attack Actions physically destroy Tuesday, 30 August 2011 Well, I might smash your laptop or computer. I’m not going to be able to accomplish every goal this way, but I can certainly deny you access to your files in this way. All I have to do is burn your office building. Backups obviously help here, whether to the cloud or just to a DVD that’s kept somewhere else.
  • 21. Attack Actions physically destroy physically remove Tuesday, 30 August 2011 What I can’t achieve by destroying the machine, I might be able to achieve by taking it away from you--steal your laptop, break in and whisk away your server. These are some of the prime scenarios why people encrypt their hard drives. You might have my physical computer but you’ll never get the information off it, sonny!
  • 22. Attack Actions physically destroy physically remove physically copy Tuesday, 30 August 2011 Now we get more devious. You might never know I’ve been in and out if I’ve physically copied the information but otherwise left things as they were. It’s like photocopying paper files. Even better, if you’ve encrypted documents and I copy the document, I can then (on my own site, in my own time) throw all the computing resources I have at breaking that encryption. Brute force (trying zillions of plausible passwords) works almost all the time.
  • 23. Attack Actions physically destroy physically remove physically copy overhear Tuesday, 30 August 2011 I might physically tap your outgoing broadband to read your email or watch your accounts, just as I might tap your phone to listen to your conversations. I might watch as you unlock your iPhone in line at the airport.
  • 24. Attack Actions physically destroy physically remove physically copy overhear malware Tuesday, 30 August 2011 I might put software onto your computer that you can’t see, but which works for me: it tells me what you type, it sends me the web pages you look at, it sends me every file on your computer. From afar, I could even instruct your computer to send spam, attack another computer, or destroy the hard drive. Collectively this bad software is called “malware”, and it encompasses specialist terms like “trojan”, “virus”, and so on.
  • 25. Attack Vectors Tuesday, 30 August 2011 Ok, so if I were a black hat hoping to do some of those bad things to you, what am I going to do?
  • 26. Attack Vectors B&E Tuesday, 30 August 2011 Possibly the easiest to break into your office and steal the computer. Those of you in small practices are particularly vulnerable to bricks through the window. Before the security company arrives, I’ll have hoofed it with your computer. If I don’t want you to know that I have your stuff, I’ll sweep a couple of folders off the desk but also sneak in and put a keylogger between your keyboard and your computer. Then all I have to do is repeat the process two weeks later and i’ll have your passwords and
  • 27. Tuesday, 30 August 2011 This is a before and after of a keylogger installed on a computer. You wouldn’t notice, but it’s silently listening to every keystroke.
  • 28. Attack Vectors B&E Employees Tuesday, 30 August 2011 But, to be honest, B&E is too risky. It involves leaving one’s chair. The easiest way to get inside your computers is to have someone at your company give it to me. At big companies with corporate IT, it’s easy (“hi, it’s Jill here on Level 4 -- I’ve forgotten how to change my password, could you do it for me?”). At a smaller company, I could just call and pretend to be Microsoft support. Well, I could until the newspapers got ahold of it. But the basic idea is sound: pretend to be someone I’m not, get you to give me the passwords, and I’m in. This is called “social engineering”, and is the digital equivalent of pretending to be the pizza delivery man or cleaners to get physical access.
  • 29. Attack Vectors B&E Employees Passwords Tuesday, 30 August 2011 I might not even have to call you. If your computer systems are connected to the Internet (or live in the cloud), I might just be able to try every one of thousands of passwords until I find the one that lets me in. Most people aren’t imaginative about their passwords: hands up everyone who has a password that includes a person’s name. A place name. A date. Once I have your password, the computer thinks I’m you. I can read your files, log in remotely, and copy and change whatever I like. Best of all, most people reuse passwords. Maybe I throw all my resources against the silly Internet forum you use to read funny cat pictures, then once I’ve found that password I’ll use it to silently and invisibly log into your work computer.
  • 30. Attack Vectors B&E Employees Passwords Phishing Tuesday, 30 August 2011 Another way for me to get you to hurt your security is to try “phishing”. That’s where I send you mail that looks like it’s from Xero, it says “as part of our regular security audit, we detected that you have a vulnerable password. Please log in here and change it.” Of course, the link in the email isn’t to Xero’s web site, it’s to a blackhat website that looks like it’s Xero. Bingo, you’ve just told me your Xero password. Or perhaps I don’t want you to go to Xero, I want you to open this attachment. But the attachment is deceptive and malicious: it’s a spreadsheet but it loads something that installs malware on your hard drive. Even if you think you’re onto my game and you won’t open attachments from strangers or click links that purport to be from trusted sites, I might still be able to get you. I’ll focus in on you, and forge an email that looks like it’s specifically from someone you know and aimed at you. This is called “spear phishing”. RSA, a security company whose secure tokens are password replacements that are heavily used in the American defense industry, was targeted by Chinese hackers in just this fashion. Employees who weren’t high-profile got mail with the subject line “2011 Recruitment Plan” and a spreadsheet, which had malware in it. From there, attackers got the keys to the encryption in RSA’s magic password system, and opened the doors to Lockheed and other defence contractors.
  • 31. Attack Vectors B&E Employees Passwords Phishing Internet-exploitable software vulnerability Tuesday, 30 August 2011 But bugger it, if you’ve left your Windows machine plugged directly into the Internet with no firewall running then I can probably bust in. Chances are that one of the things your computer is running can’t deal with the crap I can throw at it, and I’ll be able to use it to break in.
  • 32. Are these reasonable? Tuesday, 30 August 2011 You might be asking yourself whether you actually have something to fear from any of these. It depends on your clients. Computer espionage is very common between business rivals, and is very common between nation states. As the stakes and the stature of the clients goes down, the odds of attacks you’ll attract because of them go down. Two farmers in Warkworth aren’t going to attract the same interest as, say, the barrister for Julian Assange of Wikileaks. Then again, as a computer user (regardless of your profession) on the Internet you have to watch out for attempts to trick you into divulging passwords or installing software: your credit card number and the use of your computer is enough for many out there.
  • 33. Reasonable Precautions Tuesday, 30 August 2011 So here are seven reasonable precautions that you should take.
  • 34. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Tuesday, 30 August 2011 First, these are the basics. If you don’t do these, don’t even bother with anything else. You might as well just mail your files to the Kremlin. Firewall keeps unwanted Internet connections out. It’s like bright lights around your building at night. Antivirus software is now generally anti-malware. It’ll scan your downloads and attachments and keep the bad stuff out. Automatic updates keep your computer secure. You can’t do this once and then walk away. Pay the money to the bloodsuckers at the antivirus company and get the updates: no point being 2005-secure in 2011. There’s no such thing as “2005-secure in 2011”. Backups are to keep your files safe should your computers be stolen, lost, or destroyed. Don’t keep your backups with your computers (fires). If you’re worried about information being stolen, physically secure those backups.
  • 35. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Tuesday, 30 August 2011 Lock your office doors and window. Lock your laptop too: enable passwords and swipe codes and whatever else your gizmos have to keep people out. Here you’re protecting against someone stealing your laptop, opening it up, and realizing they can sell or use your files for their advantage. Consider enabling “two factor authentication” if you use Google apps like gmail. When you go to log in, Google will text you a passcode that you have to enter before you can actually use the service.
  • 36. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Make the passwords hard to guess Tuesday, 30 August 2011 You wouldn’t use a plasticine padlock; don’t use a weak password. Use a different password on each service. Use a system for your passwords (e.g., three random words and the name of the service, separated by punctuation). Consider using 1Password if all these passwords are too hard to remember. It’s an app for your iPhone (or laptop or other smartphone) to keep your passwords encrypted, revealing them as you need them (assuming you can provide The Master Password).
  • 37. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Make the passwords hard to guess Encrypt your files Tuesday, 30 August 2011 If I steal your computer, I can take the hard drive out, put a cable on it, and look at the files from my computer. Encrypt that sucker. Modern operating systems come with this, use it.
  • 38. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Make the passwords hard to guess Encrypt your files Prevent shoulder-surfing Tuesday, 30 August 2011 Treat your password like a PIN: look around to see who’s watching. Shoulder surfing is the fine art of looking at people as they type in passwords. Just as you’re supposed to shield your hand as you type in your PIN at the supermarket (but who does), you should be aware of your surroundings every time you unlock your phone or computer. Similarly, don’t read work stuff on the plane. I *am* that guy who always tries to read the stuff you’re looking at.
  • 39. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Make the passwords hard to guess Encrypt your files Prevent shoulder-surfing Encrypt your Internet traffic Tuesday, 30 August 2011 If you’re going to work outside the office, get a VPN (Virtual Private Network). This makes sure that I can’t watch your Internet messages zip past and pull out the passwords.
  • 40. Reasonable Precautions Firewall, antivirus, automatic updates, and (secure) backups Use locks and passwords Make the passwords hard to guess Encrypt your files Prevent shoulder-surfing Encrypt your Internet traffic Train employees Tuesday, 30 August 2011 It does you no good to be paranoid if your secretary lets the black hat in. Educate everyone about the perils of shoulder surfing and social engineering for physical or online access. Establish procedures for controlling access, and enforce them (no “look, it’s someone you don’t know, but I have a great sob story that means you should bend the rules ....”).
  • 41. Thank you nathan@torkington.com Tuesday, 30 August 2011