|
ObjectivesGoals of InfoSec (The CIA Triad)
|
5 Security Servicesin the ISO 7498-2 Security Architecture:
|
Phases1. Planning2. Prevention 3. Detection 4. Response and Follow-up |
|
To reduce extent of loss: | To reduce probability of loss: |
---|---|
| |
| |
|
Or Accept consequences (self insure) where Attack Tree Analysis reveals low likelihood of attack or low payoff for attackers
A Procedure defines the tasks and the sequence of steps of how policies are implemented.
A Standard defines the basis for determining measurements of what is acceptable and what is excellence.
A Guideline is a general statement of recommendations on how to achieve objectives. It provides a framework to implement procedures.
Computer Security and Privacy Course by Dick Kemmerer of UCSB.
Security and Privacy of Information Systems by Richard Baskerville of Georgia State.
|
ITSEC/TCSEC Classification | Security Features of the Target Of Evaluation (TOE) | Actual Ratings |
---|---|---|
D - Minimal Protection | None | MS-DOS |
Discretionary Protection: F1/C1 - Minimal Protection F2/C2 - Controlled Access Protection |
| MS-Windows = C1, MS-Windows NT/2000 = C2 |
Mandatory Protection: F3/B1 - Labeled Security F4/B2 - Structured Protection F5/B3 - Security Domains |
| B1 => IBM MVS/ESA/RACF, AT&T UNIX SysV/MLS, Secureware CMW+ v1 |
Verified Protection: A1 - Verified Design |
| Honeywell SCOMP STOP Release 2.1 |
F6 - high integrity systems (eg financial)
F7 - high availability/mission critical systems
F8 - high integrity data communications systems
F9 - high confidentiality data communications systems
F10 - high confidentiality and integrity networks
1 - Security Policy
2 - Industrial Security
3 - Information System Security
4 - Protective Security
5 - Personnel Security
6 - Project Security
7 - Facility Security (Security Design and Contruction Guidelines)
European Information Technology Security Evaluation Criteria (ITSEC) document — developed by several European countries in 1991 and rewritten in 1999 as British Standard 7799 — defines specific controls such as the use of security policies and physical security measures to ensure confidentiality of data.
The NSA and NIST joint Trust Technology Assessment Program (TTAP) defined Evaluation Assurance Levels (EAL) from 1 to 7 (the most secure).
Microsoft Windows NT 4.0 C2 Configuration Checklist lets you customize your own list by selecting items.
| ![]() | ![]() ![]() ![]() |
![]() Reveal as little information about the system as possible. | ![]()
Book: “Securing Windows NT/2000 Servers for the INternet" by Stefan Norberg
| ![]() ![]() |
Limit access
| ![]() ![]()
Information Security Policies Made Easy (Version 7) by Charles Cressen Wood provides 900 pages of proven samples. How much time do you need to save before justifying the $795 price?
Book: Writing Information Security Policies by Scott Barman of Wash. DC govt sites
Book: Information Warfare: How to Survive Cyber Attacks
| ![]() |
Disable unnecessary services on all computersPhysical access:![]()
Use strong authentication to access internal servicesEducate users and management
|
![]() ![]()
Use the Service Controller tool to list process types and status for each service:
Unregister server service filespy:
Two-factor authenticationFortezza (Italian for “fortress") PCMCIA Crypto cards developed by the NSA for two-factor authentication are supported by IIS5.
| ![]() ![]() ![]() |
|
Certified by
ICSA Labs
| ![]() ![]() ![]() |
|
Category | Physical controls | Electronic counterpart |
---|---|---|
Advertisement | Company name, phone number is listed in the public phone book | DNS name and IP address populated in Whois database of DNS entries |
Company lists POBox | Network Address Translation | |
Company Operator does not give out employee direct extensions | Contact info hidden from public Whois queries | |
Authentication | Guard asks visitors to sign in at front door | Visitors asked to register before viewing website |
Guest shows guard a printed invitation to the party | Presentation of Credentials | |
Guard checks ID's at doors | Verification of Credentials | |
Guard verifies who's on the guest list | Certificate Authority and Credentials store | |
Guard does not stop those he recognizes | Single Sign On | |
Guard rejects vagrants and ex-employees | Inbound firewall | |
Badges are dated | Time To Live | |
Badges are color codes (Group Coding) | Group and role based permissions | |
Authorization | Visitor badge issued by Guard | User ID with limited permissions |
Visitor gets bathroom key from Guard | Security tokens for Security Associations | |
Executive gets keys to the Executive Bathroom | Elevated Priviledge granted | |
Access | Doors are locked | Passwords are applied |
Content | Guard inspects packages coming in | Inbound content monitoring/filtering |
Shipments are sealed | Encryption | |
Guard collects an authorization form for packages leaving the building | FTP Log | |
Intrusion Detection | Guard looks at monitors from cameras | logging |
Audit | Scan video tapes | log analysis |
Employee Exit | Log closeout analysis |
| ![]()
Book: Designing Secure Web-Based Applications for Microsoft Windows 2000 by Michael Howard Microsoft Press © 2000 , 504 pages ISBN: 0735609950 | ![]() ![]() ![]() |
| ![]()
Check Point Software Technologies, Ltd., “Top 10 Challenges to Securing Your Network," PN 39400000400, March 1999.
International Data Corporation, "eSecurity : The Essential eBusiness Enabler". 1999.
| ![]() ![]() ![]() |
WinInet API For Windows CE |
![]() When using WinInet (Win32 Internet Functions) APIs:
| ![]() ![]() ![]() |
|
![]()
![]() To enable SSL on IIS:
From the Internet Services Manager (ISM), use the IIS Key Manager to build the key pair information files you use
to apply for a digital certificate.
Mark J. Edwards offers this list of fields in the dialog box:
Use the IIS Key Manager to install the certificate to bind the certificate to the Web site.
Activate SSL on IIS by configuring the Directories properties using the Internet Service Manager. Key-length (128 or 40) can be set in the Secure Communications dialog box. If you select the Require Secure Channel when accessing this resource option,
| ![]() ![]() ![]() |
|
| ![]() ![]() ![]() |
|
![]() ![]() ![]() Microsoft's replaced its Proxy Server product with the Windows 2000 Internet Security and Acceleration Server (a.k.a. ISA server) Microsoft' Routing and Remote Access Server (RRAS) can use several connections: RRAS supports two routing control protocols: ![]()
Filtering Products![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Content Filtering Software Products![]() | ![]() ![]() ![]() |
|
SSPI | SSP |
---|---|
Kerberos v5![]() NTLM Schannel Other | RPC for DCOM apps HTTP for Web-based apps Firewalls for Directory-Enabled apps ![]() Cryptographic Service Provider Other apps |
The Windows Internet Authorization Service (IAS) is Microsoft's version of a RADIUS server, which can integrate with UNIX TACACS.
Panasonic/Iridian Technologies' $240 Authenticam system analyzes the pattern in users' irises from a foot away. This has the best CER of 0.5%. Better than retina scanners.
The Crossover Error Rate (CER) is the point when the FAR -- False Acceptance (of imposters) Rate
crosses over the FRR -- False Reject (of good guys) Rate.
BioID identifies individuals based on facial image from a $50 Samsung Anycam and voice recognition.
Identix,
Visionics,
Veridicom, and
Compaq reads fingerprints.
Hand geometry
Windows 2000 uses this order (top down):
| Secure FTP![]()
In Client for Microsoft Network Properties, Service provide name: Windows Locator does not require a Network address as with DCE Cell Directory Service.
| ![]() ![]() ![]() |
|
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
![]()
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page ![]() Thank you! |