Defensive Strategies
|
Risk Analysis
Risk Expectation = Possible Extent of Loss X Probability of loss
Or Accept consequences (self insure) where Attack Tree Analysis reveals low likelihood of attack or low payoff for attackers DocumentationA Policy is a high-level statement of beliefs, goals, and objectives, with a summary of the general means for attaining them.A Procedure defines the tasks and the sequence of steps of how policies are implemented. A Standard defines the basis for determining measurements of what is acceptable and what is excellence. A Guideline is a general statement of recommendations on how to achieve objectives. It provides a framework to implement procedures. Computer Security and Privacy Course by Dick Kemmerer of UCSB. Security and Privacy of Information Systems by Richard Baskerville of Georgia State. |
Security Levels
F6 - high integrity systems (eg financial)
|
1 - Security Policy European Information Technology Security Evaluation Criteria (ITSEC) document — developed by several European countries in 1991 and rewritten in 1999 as British Standard 7799 — defines specific controls such as the use of security policies and physical security measures to ensure confidentiality of data. The NSA and NIST joint Trust Technology Assessment Program (TTAP) defined Evaluation Assurance Levels (EAL) from 1 to 7 (the most secure). Microsoft Windows NT 4.0 C2 Configuration Checklist lets you customize your own list by selecting items.
|
Countermeasures to Minimize Vulnerabilities |
Reveal as little information about the system as possible. |
Microsoft's Windows 2000 Technologies Home: Security Services A Security Checklist for Internet Service Providers (ISPs) Book: “Securing Windows NT/2000 Servers for the INternet" by Stefan Norberg Bulgarian security consultant Georgi Guninski, author of Hack Proofing Your Network: Internet Tradecraft.
|
Limit access
|
The Computer Security Handbook: Third Edition by Arthur Hutt, Seymour Bosworth, Douglas Hoyt (John Wiley 1995) CERT (Computer Emergency Response Team) Practice Guides Robert Graham's FAQ on Network Intrusion Detection Systems FBI's National Infrastructure Protection Center, setup mid 1998, published CyberNotes
Information Security Policies Made Easy (Version 7) by Charles Cressen Wood provides 900 pages of proven samples. How much time do you need to save before justifying the $795 price?
Book: Writing Information Security Policies by Scott Barman of Wash. DC govt sites
Book: Information Warfare: How to Survive Cyber Attacks
PCWorld.com's Security utilities
Cyberangels.org recruits computer hackers to work with software products and Internet services to prevent cybercrimes.
|
Disable unnecessary services on all computersPhysical access:
Use strong authentication to access internal servicesEducate users and management
|
netsvc \\COMPx /list
Use the Service Controller tool to list process types and status for each service:
Unregister server service filespy:
Two-factor authenticationFortezza (Italian for “fortress") PCMCIA Crypto cards developed by the NSA for two-factor authentication are supported by IIS5.
Tools to check configuration settings: |
Auditing and Monitoring
Continually monitor and fine-tune the security infrastructure.Plan (and test) responses to attackHoneypots(using NFR's Back Officer Friendly) to piss off hackers. (In my opinion, this is not a good idea.)Set alarmsForensics |
Anti-Virus ProductsCertified by ICSA Labs
|
Action Analogies: Physical & Electronic Countermeasures
|
Roles for Security Policy
User management manages user access to the VPN. User Management tasks include authentication, authorization, and accounting. Device management is the setup, configuration, and management of hardware and software devices. Powerpoint presentations from the Spring 2000 VPNCon
“Secure Computing” by Rita C. Summers (McGraw Hill)
“Security in Computing” by Charles Pfleeger (Prentice-Hall, 1997)
“The CERT Guide to System and Network Security Practices” by Julia H. Allen (Addison-Wesley, 2001)
Book: Secrets & Lies by
BS7799 Auditor
|
Articles on Security at IBM DeveloperWorks Book: Designing Secure Web-Based Applications for Microsoft Windows 2000 by Michael Howard Microsoft Press © 2000 , 504 pages ISBN: 0735609950 |
HTTPS on the Client
Here's an example of the HTML coding presented to the client browser (Microsoft® Internet Explorer 3.0 or later):
When a browser sends a "https://" URL, it tells IIS to open an SSL-encrypted session. SSL creates an intermediate layer between the upper-level HTTP and the lower-level TCP/IP. Web browsers and Web servers make calls and requests directly to the SSL, which manages the task of setting up a secure communications channel and passing or receiving information from TCP/IP. SGCServer Gated Cryptography extends SSL to bring browsers operating at 40-bit encryption to 128 bit.
|
E-Commerce Security: Weak Links, Best Defenses (New York: John Wiley & Sons, 1998)
by
Web Security, A Step-by-Step Reference Guide (Addison Wesley, 1998) by
Electronic Commerce: Security, Risk Management and Control (Boston: McGraw Hill, 2000) by M. Greenstein, T. Feinman Web Security Sourcebook (John Wiley & Sons, 1997) by Aviel Rubin, Daniel Geer, and Marcus Ranum. Web Security and Commerce (O'Reilly Publishing, 1997) by Simson Garfinkel and Gene Spafford. Intrusion Techniques and Countermeasures [Online document] (Sedona, AZ, 1999) by R. Farrow. Security Management for the World Wide Web [Online document] by L. L. McGhie, P. Q. Maier, Chapter 2-3-1, Section 2-3, Internet Security, Handbook of Information Security Management: Communications Security, 1996-1999 EarthWeb, Inc. [cited 1999 September 28], Meinel, "Guide to (mostly) Harmless Hacking: Beginners' Series #1"> [Online document] 1997 [cited 1999 October 4], Available "Understanding IP Addressing: Everything You Ever Wanted to Know" [Online document] by C. Semeria, [cited 10/10/00] Tiwana, Web Security, Massachusetts: Digital Press (Butterworth-Heinemann), 1999. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network (Indianapolis: Sams Publishing, 1998) Check Point Software Technologies, Ltd., “Top 10 Challenges to Securing Your Network," PN 39400000400, March 1999. Innovative Security Products, “Security White Paper Series: Microcomputer Security," [Online document], 1998 [cited 1999 August 6], Available International Data Corporation, "eSecurity : The Essential eBusiness Enabler". 1999. “Techniques Adopted by 'System Crackers' When Attempting to Break Into Corporate or Sensitive Private Networks," [Online document] 1998 December, Network Security Solutions Ltd. Front-line Information Security Team [cited 1999 December 6]. “Understanding Concepts in Enterprise Network Security and Risk Management" [Online document], 1998 January, Network Security Solutions, Ltd., Front-line Information Security Team (FIST) [cited 1999 December 8]. |
WinInet API For Windows CE |
From Microsoft on
How to Make SSL Requests Using WinInet (Article 168151)
When using WinInet (Win32 Internet Functions) APIs:
|
Activewin's excellent Step-by-Step Guide to Setting up a Certificate Authority |
Setting Up HTTPS SSL on IIS
Secure Sockets Layer (SSL) Options (Article Q172023) To enable SSL on IIS:
From the Internet Services Manager (ISM), use the IIS Key Manager to build the key pair information files you use
to apply for a digital certificate.
Mark J. Edwards offers this list of fields in the dialog box:
Use the IIS Key Manager to install the certificate to bind the certificate to the Web site.
Activate SSL on IIS by configuring the Directories properties using the Internet Service Manager. Key-length (128 or 40) can be set in the Secure Communications dialog box. If you select the Require Secure Channel when accessing this resource option,
|
Accessing Security Protocols |
Alternatives to HTTPS
Using SSL (Secure Socket Layer) with the HTTPS: protocol makes it more difficult to read private messages intercepted over the wire. It's appropriate to use whenever one or both parties do not want information shared with others. Examples include information possibly used to establish authentication, such as Social Security number, date of birth, mother's maiden name, credit card numbers, or even phone numbers and addresses. SSL protects messages by encrypting it for transmission. SSL is NOT appropriate where information is already offered freely, such as RFC documents intended for open dissemination or documents which the authors can't get to enough people. Why would someone go through the trouble of intercepting messages when it's easily available? SSL is often not appropriate because there is computing overhead with SSL connections. This means a more expensive system that's more difficult to maintain for the provider and a slower application for the user. One compromise some developers use (especially for Intranet applications) is to employ SSL connections for logon and password change functionality, then drop down to regular HTTP exchanges for all other transactions. Alternatives are:
Non-Microsoft SSL implementations on Java
|
Firewalls and Proxies
Configure Packet FilteringPacket Filter routers selectively deny or allow the routing of packets between trusted and untrusted networks based on a site's security policy stored in Access Control Lists (ACL). Screening is based on source and destination address and ports in IP (not UDP) Headers.To get Windows 2000 to filter incoming (not outgoing) TCP, IP, and UDP packets, use the “Advanced TCP/IP Settings” GUI “Options” tab. To get Windows 2000 to filter incoming ICMP packets, use the “Routing and Remote Access” MMC.
EncapsulationThe concept of encapsulation makes use of a fundamental principle of the TCP/IP protocol. On the sending end, each layer in the ISO model adds a header to the "payload" it receives. On the receiving end, headers at each level are stripped away to obtain content from the sending peer level.The processor at each layer does not examine the contents of packets it receives. This allows VPN packets to be *encapsulated* (or encased) within any other packets of data. This is why, when you install VPN as a Communications component on Windows 98 (from Add/Remove Programs), you select “Microsoft VPN Adapter" as the connection device. This device, in turn, accesses the modem. This is also why Windows 95 is upgraded for VPN with the “Dial-up Networking 1.3" upgrade downloadable from Microsoft. This technique is not new. NetBIOS and IPX packets are also encapsulated for transmission over IP networks. Only one IPX network ID is used by all VPN clients. Encapsulation make use of a *tunneling* protocol. The first tunneling protocol was based on the most widely used protocol for remote access to the Internet: the Point-to-Point Protocol (PPP) [RFC 1547, 1661]. Windows NT 4 and Windows 98 use Point to Point Tunneling Protocol (PPTP) (using 128 ports) to encapsulate PPP packets using a modified version of the GRE (Generic Routing Encapsulation) protocol 47 over port 1723. So one disadvantage of VPN is that the firewall needs have this path open (providing another possible door of attack). Voluntary tunnels are configured and created through a conscious action by the user at the tunnel client computer. Compulsory tunnels are configured and created automatically for users without their knowledge or intervention To configure PPTP for inbound VPN connections, use the Routing and Remote Access MMC wizard. |
Datacom devices Routing Microsoft's replaced its Proxy Server product with the Windows 2000 Internet Security and Acceleration Server (a.k.a. ISA server) Microsoft' Routing and Remote Access Server (RRAS) can use several connections: RRAS supports two routing control protocols:
Filtering ProductsCisco PIXCheck Point Firewall-1 Netscreen 10/100 Watchguard Microsoft Internet Security and Acceleration (ISA) Server Smoothwall Tiny Personal Firewall is not supported and does not route. Kerio Firewall Content Filtering Software ProductsWebsense pass-through filtering and logging for porn, etc. |
Authentication
Authentication MechanismsThe program that presents the logon box is Winlogon (the Net Logon service) running in the Local Security Authority (LSA) process. The LSA authenticates accounts by examining credentials such as a password to a valid account. Security rules are enforced by the Security Reference Monitor running in kernel mode, where user intervention cannot occur. Single-sign-on is possible because in Windows 2000, any user or computer daemon that can initiate action is a security principal. Security principals establish a context for their actions by presenting credentials from a security authority that is trusted by the LSA on the computer where the principal intends to act.
InterfacesWindows 2000 supports several Interfaces to security providers:
NTLMNT4's NTLM v1 authenticates one-way: only the server authenticates clients.NT4 SP4's NTLMv2 and Windows 2000's Kerberos v5 are two-way: a client and a server mutually authenticates to prevent impersonation. Mechanisms Supported by IPSecThe Windows Internet Authorization Service (IAS) is Microsoft's version of a RADIUS server, which can integrate with UNIX TACACS. The Order IIS5 attempts to Authenticate
| BiometricsFailure to acquire happens when the biometric unit can't get enough information to decide.Panasonic/Iridian Technologies' $240 Authenticam system analyzes the pattern in users' irises from a foot away. This has the best CER of 0.5%. Better than retina scanners. The Crossover Error Rate (CER) is the point when the FAR -- False Acceptance (of imposters) Rate crosses over the FRR -- False Reject (of good guys) Rate. BioID identifies individuals based on facial image from a $50 Samsung Anycam and voice recognition. Identix, Visionics, Veridicom, and Compaq reads fingerprints. Hand geometry
|
Authentication ProtocolsWindows 2000 uses this order (top down):Windows 2000 uses three protocols for authenticating remote connections: EAP-RADIUS is when the Internet Authorization Service (IAS) forwards authentication to another RADIUS server as a RADIUS-formatted message.
| Secure FTPServ-U FTP server and Voyager FTP client from rhinosoft.com encrypts the authentication password that other FTP programs leave in the clear.WinSCP is a Windows version of Unix Secure Copy. SSH 2.0 has built-in file transfer capabilities. f-secure.com and Open SSH.com list GNU licensed implementations. In Client for Microsoft Network Properties, Service provide name: Windows Locator does not require a Network address as with DCE Cell Directory Service.
|
Authorization of Permissions
NTFS PermissionsWhen IIS is installed, two users are created:
Limitations by GroupA security descriptor lists the permissions a user needs to read the properties of an AD object. |
"Securing Database Servers" - 8 page whitepaper from Internet Security Systems The $379 Security Explorer utility integrates with the Windows NT 4.0 Desktop search across subdirectories for permissions. Grant, revoke, and clone permissions across subdirectories without affecting any other user's permissions. can search and modify Windows NT security on NTFS drives, the Registry, and Shares. Select 50 shares on a server and grant permissions to multiple users and groups simultaneously. Export permissions to a database for further analysis and reporting. Back up file permissions and restore them if necessary. Set ownership on files and directories. Seamless integration with the Windows NT 4.0 Desktop (right-click just about anywhere). Security Explorer makes finding security holes and filling them a snap!
|
Trusts
A shortcut trust is established directly between two domains in the same forest. |
Resources on Info Security
Security ConsultantsThese are not those who offer you their services after they hack into your system. (or other “mafia” tactic) |
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page
Thank you! |