Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
234 views71 pages

IT Security for Students

This document outlines security measures for application, data, and host security, including securing the host through physical protection, operating system security, and anti-malware software. It discusses securing applications and data through administrative controls like policies and procedures, as well as technical controls implemented on devices. The document provides examples of security controls at different stages including deterrent, preventive, detective, compensating, and corrective controls.

Uploaded by

marya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
234 views71 pages

IT Security for Students

This document outlines security measures for application, data, and host security, including securing the host through physical protection, operating system security, and anti-malware software. It discusses securing applications and data through administrative controls like policies and procedures, as well as technical controls implemented on devices. The document provides examples of security controls at different stages including deterrent, preventive, detective, compensating, and corrective controls.

Uploaded by

marya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 71

ITIS412: Information Security

Chapter 4: Application, Data


and Host Security
Instructor: Dr. Dalal Alarayed
Email: [email protected]
Objectives
 List the steps for securing a host computer
 Define application security
 Explain how to secure data

2 ITIS 412
Application, Data, and Host Security
 Basic security starts with protecting host, applications,
and data
 Host, which can be either a server or a client on a
network, runs applications that process, save, or
transport data
 Securing the host involves:
 Protecting the physical device itself
 Securing the operating system (OS)
 Using anti-malware software

3 ITIS 412
Securing Devices
 Security control - Any device or process used to
reduce risk
 Two levels of security controls:
 Administrative controls - Processes for developing and
ensuring that policies and procedures are carried out
 Technical controls – Processes carried out or managed by
devices

4 ITIS 412
Activity Phase Controls
 Deterrent control - Attempts to discourage security
violations before they occur
 Preventive controls - Works to prevent the threat from
coming into contact with the vulnerability
 Detective controls - Designed to identify any threat that
has reached the system
 Compensating controls - Controls that provide
alternative to normal controls that for some reason cannot
be used
 Corrective controls - Controls intended to mitigate or
lessen the damage caused by the incident

5 ITIS 412
Activity Phase Controls

6 ITIS 412
External Perimeter Defenses
 External perimeter defenses are designed to restrict
access to areas equipment is located
 Examples:
 Barriers
 Guards
 Motion detection devices

7 ITIS 412
Barriers
 Different types of passive barriers can be used to restrict
unwanted individuals or vehicles from entering secure
area
 Fencing - Tall, permanent structure to keep out
individuals for maintaining security
 Sign - Explains the area is restricted
 Lighting - Area can be viewed after dark
 Modern perimeter security consists of fence equipped with
other deterrents

8 ITIS 412
Fencing Deterrents

9 ITIS 412
Barricade
 Barricade - Generally designed to block passage of traffic
 Most often used for directing large crowds or restricting
vehicular traffic and are generally not designed to keep
out individuals
 Barricades are usually not as tall as fences and can more
easily be circumvented by climbing over them
 Temporary vehicular traffic barricades are frequently used
in construction areas

10 ITIS 412
Guards
 Guards - Active security elements
 Unlike passive devices, guard can differentiate between an
intruder and non-intruder
 Can also make split-second decisions about when
necessary to take appropriate action

11 ITIS 412
Closed Circuit Television (CCTV)
 Some guards responsible for monitoring activity
captured by video camera
 Video surveillance - Uses video cameras to transmit a
signal
 Closed circuit television (CCTV) – Video signal to a
specific and limited set of receivers
 CCTV options:
 Fixed in single position (pointed at door or hallway)
 Moveable in 360 degrees for a full panoramic view
 Motion-tracking

12 ITIS 412
Motion Detection
 Motion detection - Determining object’s change in
position in relation to surroundings
 Movement usually generates an audible alarm to warn
guard of an intruder

13 ITIS 412
Motion Detection Methods

14 ITIS 412
Internal Physical Access Security
 External perimeter defenses designed to keep intruder
from entering area
 Yet if intruder successful then must face internal
physical access security (focused on interior)
 Examples:
 Hardware locks
 Proximity readers
 Access lists
 Mantraps
 Protected distribution systems for cabling

15 ITIS 412
Hardware Locks
 Door locks in commercial buildings different from
residential door locks
 Deadbolt lock - Extends solid metal bar into door
frame for extra security
 Much more difficult to defeat than keyed entry locks:
 Cannot be broken from the outside like a preset lock
 Extension of bar prevents credit card from being
inserted to “jimmy” it open
 Requires key be used to both open and lock door

16 ITIS 412
Deadbolt Lock

17 ITIS 412
Key Management
 Inspect all locks on regular basis to identify physical
damage or signs of tampering
 Receive approval of supervisor or other appropriate
person before issuing keys
 Keep track of keys issued, to whom, and date
 Require users to sign name when receiving keys
 Master keys not have any marks identifying them as
masters
 Secure unused keys in locked safe
 Establish procedure to monitor use locks and keys

18 ITIS 412
Key Management: Duplicates
 When making duplicates master keys:
 Mark “Do Not Duplicate”
 Wipe out manufacturer’s serial numbers to keep
duplicates from being ordered

19 ITIS 412
Cipher Lock
 Cipher lock more sophisticated
alternative to key lock
 Combination sequence necessary to
open door
 Can be programmed to allow
individual’s code to give access at
only certain days or times
 Records when door is opened and by
which code
 Can be vulnerable to shoulder
surfing
20 ITIS 412
ID Badge
 Instead of using key or entering a code to open door
user can use an object (physical token) for
identification
 ID badge - Originally contained photograph of bearer
and were visually screened by security guards
 Later ID badges were magnetic stripe cards that were
“swiped” or contained barcode identifier “scanned” to
identify user

21 ITIS 412
Proximity Readers
 New technologies not require ID badge be visually
exposed
 Badge emits signal identifying owner to then be
detected
 Proximity reader – Device that receives the badge
signal
 Sometimes even unnecessary for bearer to remove
badge from pocket or purse

22 ITIS 412
Radio Frequency Identification (RFID)
 ID badges detected by proximity reader often fitted
with tiny radio frequency identification (RFID) tags
 RFID tags easily be affixed to inside of ID badge
 Can be read by an RFID proximity reader as user
walks through turnstile with badge in pocket

23 ITIS 412
RFID Tag

24 ITIS 412
Access List & Mantraps
 Access list - Record of individuals who have
permission to enter secure area
 Records time they entered and left
 Mantrap - Separates a secured from a nonsecured
area
 Device monitors and controls two interlocking doors
so only one door may open at any time

25 ITIS 412
Mantrap

26 ITIS 412
Protected Distribution Systems (PDS)
 Cable conduits made up of hollow tubes that carry
copper wire or fiber-optic cables
 Protected distribution system (PDS) - System of
cable conduits used to protect classified information
being transmitted between two secure areas
 PDS is a standard created by U.S. Department of
Defense (DOD)

27 ITIS 412
Cable Conduits

28 ITIS 412
Hardened Carrier PDS
 Hardened carrier PDS - Data cables installed in
conduit constructed of special electrical metallic
tubing or similar material
 All of connections between the different segments are
permanently sealed with welds or special sealants
 If hardened carrier PDS buried underground the
carrier containing cables must be encased in concrete
and manhole covers that give access must be locked
down
 Must be visually inspected on a regular basis

29 ITIS 412
Alarmed Carrier PDS
 Alarmed carrier PDS - Carrier system deployed with
specialized optical fibers in the conduit
 Can sense acoustic vibrations and trigger alarm when
intruder attempts to gain access
 Advantages:
 Provides continuous monitoring
 Eliminates need for periodic visual inspections
 Allows carrier to be hidden above ceiling or below floor
 Eliminates need for welding or sealing connections

30 ITIS 412
Hardware Security
 Hardware security - Physical security protecting host
system hardware
 Portable devices have steel bracket security slot
 Cable lock inserted into slot and secured to device
 Laptops may be placed in safe or locking cabinets
 Can be prewired for power and network connections
to allow devices to charge while stored

31 ITIS 412
Cable Lock

32 ITIS 412
Chapter 4-Group Exercise
 How secure are computers at your school and work?
Perform an analysis of the physical security to protect
these devices. Make note of any hardware locks,
proximity readers, video surveillance, fencing, etc. Then
look at the hardware security around the hosts themselves.
What are the strengths and weaknesses? what
recommendation for improvement would you give?

 Prepare a PPT presentation of your findings. Post on BB


and prepare to discuss in class.

33 ITIS 412
Securing the Operating System Software
 Two approaches to securing operating system
 Properly configure operating system after it has been
installed to “fortify” it
 Tighten security during initial design and coding of
operating system.
 Five-step process for protecting operating system
1. Develop the security policy
2. Perform host software baselining
3. Configure operating system security and settings
4. Deploy the settings
5. Implement patch management

34 ITIS 412
Securing the Operating System Software –
Steps 1 & 2
 Security policy - Document(s) that clearly define
organization’s defense mechanisms
 What must be protected
 Perform host software baselining (standard or
checklist against which systems can be evaluated)
 How will it be protected

35 ITIS 412
Securing the Operating System Software –
Step 3
 Configure operating system security and settings
 Hundreds of different security settings can be
manipulated
 Typical configuration baseline:
 Changing insecure default settings
 Eliminating unnecessary software, services, protocols
 Enabling security features such as a firewall

36 ITIS 412
Securing the Operating System Software –
Step 4
 Deploy settings through security template (collections
of security configuration settings)
 Group policy - Windows feature providing centralized
computer management
 A single configuration may be deployed to many users

37 ITIS 412
Securing the Operating System Software –
Step 5
 Operating systems have increased in size and
complexity
 New attack tools have made secure functions
vulnerable
 Security patch - General software update to cover
discovered vulnerabilities
 Hotfix - Addresses specific customer situation
 Service pack - Accumulates security updates and
additional features

38 ITIS 412
Securing the Operating System Software –
5: Updates
 Modern operating systems can perform automatic
updates
 OS interacts with vendor’s online update service to
automatically download and install patches
(depending upon configuration option chosen)
 Patches can sometimes create new problems
 Vendor should thoroughly test before deploying

39 ITIS 412
Securing the Operating System Software –
5: Automated Updates
 Automated patch update service - Manage patches
locally instead using vendor’s online update service
 Advantages:
 Administrators can approve or decline updates for client
systems, force updates to install by specific date, and
obtain reports on what updates each computer needs.
 Administrators can approve updates for "detection" only
(allows them see which computers will require update
without actually installing it)

40 ITIS 412
Securing the Operating System Software –
5: Advantages
 Downloading patches from local server instead of
using the vendor’s online update service can save
bandwidth and time because each computer does not
have to connect to an external server
 Specific types of updates that organization does not
test (hotfixes) can be automatically installed
whenever they become available
 Users cannot disable or circumvent updates as they
can if computer configured to use vendor’s online
update service

41 ITIS 412
Automated
Patch Update
Service

42 ITIS 412
Security Through Design
 Other techniques used instead of managing different
security options on an operating system that has
already been deployed
 OS hardening - Necessary to tighten security during
design and coding of OS
 Trusted OS - Operating system that has been
designed through OS hardening

43 ITIS 412
OS Hardening Techniques

44 ITIS 412
Securing With Anti-malware
 Operating system software continued to add security
protections to core set of features
 Third-party anti-malware software packages can
provide added security
 Antimalware software:
 Antivirus
 Antispam
 Popup blockers and antispyware
 Host-based firewalls

45 ITIS 412
Antivirus
 Antivirus (AV) - Software that examines computer
for infections
 Static analysis - Scan files by attempting to match
known virus patterns against potentially infected files
 Host AV software contains virus scanning engine and
database of known virus signatures
 By comparing virus signatures against potentially
infected file (string scanning) match may indicate
infected file

46 ITIS 412
Antivirus Scanning
 Wildcard scanning - Wildcard is allowed to skip bytes
or ranges of bytes instead of looking for an exact
match
 Mismatch scanning - Mismatches allow set number of
bytes in string to be any value regardless of their
position in the string
 Weakness of static analysis is AV vendor must
constantly be searching for new viruses, extracting
virus signatures, and distributing those updated
databases to all users

47 ITIS 412
Antivirus Detection
 Dynamic heuristic detection - Uses variety of
techniques to spot characteristics of virus instead of
attempting to make matches
 Code emulation - Virtual environment is created that
simulates the central processing unit (CPU) and
memory of the computer
 Any questionable program code is executed in virtual
environment (no actual virus code is executed by the
real CPU) to determine if is virus

48 ITIS 412
Antispam
 Spammers can distribute malware through email
attachments or use for social engineering attacks
 Bayesian filtering - Analyzes every word in each
email and determines how frequently a word occurs in
“spam” pile compared to “not-spam” pile
 Create lists of senders:
 Blacklist - Allow everything in unless it appears on the
list
 Whitelist - List of approved senders

49 ITIS 412
Pop-up Blocker
 Pop-up - Small window appearing over webpage
usually created by advertisers
 Pop-up blocker - Separate program as part of
antispyware package OR incorporated within
browser that allows user to limit or block most pop-
ups
 Alert can be displayed in browser and gives user
option to display pop-up

50 ITIS 412
Host-Based Application Firewall
 Firewall (packet filter) - Designed to prevent malicious
packets from entering/leaving
 May be hardware or software-based
 Host-based application firewall - Software firewall
runs on local system
 Application running on a host computer may need send
and receive transmissions that normally would be
blocked by firewall
 Opening in the firewall can be created by the user
simply by approving application
 Better than always open port.
51 ITIS 412
Securing Static Environments
 As number of devices with microprocessors grows
these are becoming targets
 Static environment - Types of devices with
microprocessors not designed to be updated
 Embedded system - Computer system with a
dedicated function within a larger electrical or
mechanical system
 OS often stripped-down versions of general-purpose
operating systems and may contain many of the same
vulnerabilities

52 ITIS 412
Consoles, Smartphones & Mainframes
 Game consoles - Many consumer game consoles
contain adaptations of general-purpose operating
systems and may contain some of same vulnerabilities
 Smartphone - Includes an operating system that
allows it to run third-party applications but operating
systems have vulnerabilities that attackers can exploit
 Mainframe - Very large computing systems that have
significant processing capabilities

53 ITIS 412
Automobile and SCADA
 In-vehicle computer systems - Automobile functions
that are controlled by microprocessors
 SCADA (supervisory control and data acquisition)
- Large-scale industrial-control systems found in
military installations, oil pipeline control systems,
manufacturing environments, and nuclear power
plants

54 ITIS 412
Static Environment Defense Methods

55 ITIS 412
Application Security
 Along with securing the operating system software on
hosts and in static environments
 Need to protect applications that run on the devices
 Application security:
 Application development security
 Application hardening and patch management

56 ITIS 412
Application Development Security
 Security for applications must be considered through
all phases of development cycle
 Application configuration baselines:
 Standard environment settings can establish a secure
baseline
 Must include system and network configurations

57 ITIS 412
Secure Coding Concepts
 Secure coding concepts
 Coding standards increase applications’ consistency,
reliability, and security
 Coding standards useful in code review process
 Wrapper functions – Used to write error-checking
routines for preexisting system functions (wrapper
function is a substitute for a regular function that is used
in testing)

58 ITIS 412
Exceptions
 Errors (exceptions) - Faults that occur while
application is running
 Response should be based on the error
 Improper handling can lead to application failure or
insecurity
 Fuzz testing (fuzzing) - Software testing technique
that deliberately provides invalid, unexpected, or
random data as inputs to computer program

59 ITIS 412
Error Handling
 Error handling practices to avoid:
 Failing to check return codes or handle exceptions or
improperly checking them
 Handling all return codes or exceptions in the same
manner
 Divulging potentially sensitive data in error information

60 ITIS 412
Input Validation
 Verify user responses to application:
 Could cause program to abort
 Necessary to check for XSS, SQL, or XML injection
attacks
 Cross-site request forgery (XSRF) - Attack uses the
user’s web browser settings to impersonate the user
 Input validation – Verifies a user’s input to an
application and is performed after data entered but
before destination is known

61 ITIS 412
Server and Client Validation
 Server-side validation - Input validation generally
uses the server to perform the validation
 Client-side validation - Client perform the validation

62 ITIS 412
SQL Alternatives
 Instead of input validation, more drastic approach to
preventing SQL injection attacks is avoid using SQL
relational databases altogether
 NoSQL - New nonrelational databases that are better
tuned for accessing large data sets
 NoSQL databases vs. SQL database – Argument
over which database technology is better

63 ITIS 412
Application Attacks
 Application hardening intended to prevent exploiting
vulnerabilities

64 ITIS 412
Application Patch Management
 Application patch management rare until recently
 Users unaware of the existence of patches or where to
acquire them
 More application patch management systems are
being developed today

65 ITIS 412
Attacks Based On Application Vulnerabilities

66 ITIS 412
Securing Data
 Work today involves electronic collaboration, so data
must flow freely but securely
 Data loss prevention (DLP) - System of security
tools used to recognize and identify critical data and
ensure it is protected
 Goal is protect data:
 Data in-use - Actions being performed by “endpoint
devices”
 Data in-transit - Actions that transmit the data across a
network
 Data at-rest - Stored on electronic media
67 ITIS 412
DLP Techniques
 Content inspection - Security analysis of transaction
and takes context into account
 DLP systems also can use index matching:
 Documents identified as needing protection, such as the
program source code for a new software application, are
analyzed by DLP system
 Complex computations are conducted based on analysis

68 ITIS 412
DLP Sensors
 DLP sensors:
 DLP network sensors - Installed on perimeter of
network to protect data in-transit by monitoring all
network traffic
 DLP storage sensors - Sensors on network storage
devices are designed to protect data at-rest
 DLP agent sensors - Sensors are installed on each host
device (desktop, laptop, tablet, etc.) and protect data in-
use

69 ITIS 412
DLP Architecture

70 ITIS 412
DLP Report

71 ITIS 412

You might also like