Chapter 1
Chapter 1
Management
m m m m m
m m m m m 1 2 3 4 5
1 2 3 4 5 m m m m m
1 2 3 4 5
hypervisor
hypervisor
hypervisor
hw
m m m m m
hw hw
1 2 3 4 5
m m m m m
1 2 3 4 5
hypervisor
hypervisor
hw m m m m m
m m m m m 1 2 3 4 5 hw
1 2 3 4 5
m m m m m hypervisor
1 2 3 4 5 hypervisor
hw
hypervisor hw
hw
Typical Server Virtualization Deployment
Win 2003 Win 2008 Redhat Ubuntu
A A A A A A A A A A A A
p p p p p p p p p p p p
p p p p p p p p p p p p
A A A A A A A A A A A A
M
p p p p p p p p p p p p
a
p p p p p p p p p p p p
n
a
g
e
m OS OS OS OS
e
n
t
Hypervisor
Hardware
Typical VDI Deployment
desktop desktop desktop desktop desktop desktop
Dom0
OS OS OS OS OS OS
Enterprise Hypervisor
Hardware
Thin client
Thin client
10
Cloud Computing: who should use it?
• Cloud computing definitely makes sense if your own security is weak,
missing features, or below average.
• Ultimately, if
• the cloud provider’s security people are “better” than yours (and
leveraged at least as efficiently),
• the web-services interfaces don’t introduce too many new
vulnerabilities, and
• the cloud provider aims at least as high as you do, at security
goals,
then cloud computing has better security.
12
3 Cloud Service Models
• Cloud Software as a Service (SaaS)
• Use provider’s applications over a network
• Cloud Platform as a Service (PaaS)
• Deploy customer-created applications to a cloud
• Cloud Infrastructure as a Service (IaaS)
• Rent processing, storage, network capacity, and other
fundamental computing resources
13
Service Model Architectures
Cloud Infrastructure Cloud Infrastructure Cloud Infrastructure
IaaS Software as a Service
PaaS PaaS (SaaS)
SaaS SaaS SaaS Architectures
Cloud Infrastructure
IaaS Infrastructure as a Service (IaaS)
Architectures
14
Cloud Models
• Delivery Models
• SaaS
• PaaS
• IaaS
• Deployment Models
• Private cloud
• Community cloud
• Public cloud
• Hybrid cloud
• We propose one more Model: Management Models (trust and tenancy
issues)
• Self-managed
• 3rd party managed (e.g. public clouds and VPC)
From [1] NIST
Delivery Models
17
From [6] Cloud Security and Privacy by Mather and Kumaraswamy
4 Cloud Deployment Models
• Private cloud
• enterprise owned or leased
• Community cloud
• shared infrastructure for specific community
• Public cloud
• Sold to the public, mega-scale infrastructure
• Hybrid cloud
• composition of two or more clouds
18
Four Deployment Models
Four Deployment Models
Four Deployment Models
Four Deployment Models
Common Cloud Characteristics
• Cloud computing often leverages:
• Massive scale
• Homogeneity
• Virtualization
• Resilient computing
• Low cost software
• Geographic distribution
• Service orientation
• Advanced security technologies
23
Overview of Cloud Security
• Some key issues:
• trust, multi-tenancy, encryption, compliance
• Clouds are massively complex systems can be reduced to simple
primitives that are replicated thousands of times and common
functional units
• Cloud security is a tractable problem
• There are both advantages and challenges
26
Is Cloud Computing Secure?
• Companies ready to adopt cloud services are right to place security at the top of
their agendas.
• the consequences of getting your cloud security strategy wrong could not be more
serious.
• As many unwary businesses have found to their cost in recent high-profile cases, a
single cloud-related security breach can result in an organization severely
damaging its reputation – or, worse, the entire business being put at risk.
27
Is Cloud Computing Secure?
• Those further along their cloud path are finding that, like all forms of
information security, the question boils down to effective risk management.
we outlined the different layers in the cloud services stack:
• Infrastructure-as-a-Service (IaaS)
• Platform-as-a-Service (PaaS)
• Software-as-a-Service (SaaS)
• Business Process-as-a-Service (BPaaS).
• These layers – and their associated standards, requirements and solutions –
are all at different levels of maturity.
28
Is Cloud Computing Secure?
• The world of business is becoming more uncertain, as with new system
architectures come new cyber threats. No longer can the mechanisms
deployed in the past be relied on for protection”
--Nick Gaines, Group IS Director, Volkswagen UK
• But while many of the security risks of cloud overlap with those of outsourcing and offshoring, there
are also differences that organizations need to understand and manage.
39
Cloud Security Simplified
• As with all coherent security strategies, cloud security can seem dauntingly complex, involving many different
• CIOs and their teams need to plot effective management strategies as well as understand the implications for
• Management
• Operation
40
• Technology
Cloud Security Simplified
• Management
1. Updated security policy
2. Cloud security strategy
3. Cloud security governance
4. Cloud security processes
5. Security roles & responsibilities
6. Cloud security guidelines
7. Cloud security assessment
8. Service integration
9. IT & procurement security requirements
10. Cloud security management
41
Cloud Security Simplified
• Operation
1. Awareness & training
2. Incident management
3. Configuration management
4. Contingency planning
5. Maintenance
6. Media protection
7. Environmental protection
8. System integrity
9. Information integrity
10. Personnel security
42
Cloud Security Simplified
• Technology
1. Access control
2. System protection
3. Identification
4. Authentication
5. Cloud security audits
6. Identity & key management
7. Physical security protection
8. Backup, recovery & archive
9. Core infrastructure protection
10. Network protection
43
General Security Advantages
44
Cloud Security Advantages
45
Cloud Security Advantages
46
General Security Challenges
• Trusting vendor’s security model
• Customer inability to respond to audit findings
• Obtaining support for investigations
• Indirect administrator accountability
• Proprietary implementations can’t be examined
• Loss of physical control
47
Cloud Security Challenges
50
Provisioning Service
• Advantages
• Rapid reconstitution of services
• Enables availability
• Provision in multiple data centers / multiple instances
• Advanced honey net capabilities
• Challenges
• Impact of compromising the provisioning service
51
Data Storage Services
• Advantages
• Data fragmentation and dispersal
• Automated replication
• Provision of data zones (e.g., by country)
• Encryption at rest and in transit
• Automated data retention
• Challenges
• Isolation management / data multi-tenancy
• Storage controller
• Single point of failure / compromise?
• Exposure of data to foreign governments
53
Cloud Processing Infrastructure
• Advantages
• Ability to secure masters and push out secure images
• Challenges
• Application multi-tenancy
• Reliance on hypervisors
• Process isolation / Application sandboxes
64
Cloud Support Services
• Advantages
• On demand security controls (e.g., authentication, logging, firewalls…)
• Challenges
• Additional risk when integrated with customer applications
• Needs certification and accreditation as a separate application
• Code updates
65
Cloud Network and Perimeter Security
• Advantages
• Distributed denial of service protection
• VLAN capabilities
• Perimeter security (IDS, firewall, authentication)
• Challenges
• Virtual zoning with application mobility
66
Causes of Problems Associated
with Cloud Computing
• Most security problems stem from:
• Loss of control
• Lack of trust (mechanisms)
• Multi-tenancy
• These problems exist mainly in 3rd party management models
• Self-managed clouds still have security issues, but not related to above
Loss of Control in the Cloud
• Consumer’s loss of control
• Data, applications, resources are located with provider
• User identity management is handled by the cloud
• User access control rules, security policies and enforcement are managed by
the cloud provider
• Consumer relies on provider to ensure
• Data security and privacy
• Resource availability
• Monitoring and repairing of services/resources
Lack of Trust in the Cloud
• A brief deviation from the talk
• (But still related)
• Trusting a third party requires taking risks
• Defining trust and risk
• Opposite sides of the same coin (J. Camp)
• People only trust when it pays (Economist’s view)
• Need for trust arises only in risky situations
• Defunct third party management schemes
• Hard to balance trust and risk
• e.g. Key Escrow (Clipper chip)
• Is the cloud headed toward the same path?
Multi-tenancy Issues in the Cloud
• Conflict between tenants’ opposing goals
• Tenants share a pool of resources and have opposing goals
• How does multi-tenancy deal with conflict of interest?
• Can tenants get along together and ‘play nicely’ ?
• If they can’t, can we isolate them?
• How to provide separation between tenants?
71
Taxonomy of Fear (cont.)
• Availability
• Will critical systems go down at the client, if the provider is attacked in a
Denial of Service attack?
• What happens if cloud provider goes out of business?
• Would cloud scale well-enough?
• Often-voiced concern
• Although cloud providers argue their downtime compares well with cloud user’s own
data centers
72
Taxonomy of Fear (cont.)
• Privacy issues raised via massive data mining
• Cloud now stores data from a lot of clients, and can run data mining
algorithms to get large amounts of information on clients
• Increased attack surface
• Entity outside the organization now stores and computes data, and so
• Attackers can now target the communication link between cloud provider and
client
• Cloud provider employees can be phished
73
Taxonomy of Fear (cont.)
• Auditability and forensics (out of control of data)
• Difficult to audit data held outside organization in a cloud
• Forensics also made difficult since now clients don’t maintain data locally
• Legal quagmire and transitive trust issues
• Who is responsible for complying with regulations?
• e.g., SOX, HIPAA, GLBA ?
• If cloud provider subcontracts to third party clouds, will the data still be
secure?
74
Taxonomy of Fear (cont.)
Cloud Computing is a security
nightmare and it can't be handled
in traditional ways.
John Chambers
CISCO CEO
76
Threat Model
• Basic components
• Attacker modeling
• Choose what attacker to consider
• insider vs. outsider?
• single vs. collaborator?
• Attacker motivation and capabilities
• Attacker goals
• Vulnerabilities / threats
77
What is the issue?
• The core issue here is the levels of trust
• Many cloud computing providers trust their customers
• Each customer is physically commingling its data with data from anybody else
using the cloud while logically and virtually you have your own space
• The way that the cloud provider implements security is typically focused on
they fact that those outside of their cloud are evil, and those inside are good.
• But what if those inside are also evil?
78
Attacker Capability: Malicious Insiders
• At client
• Learn passwords/authentication information
• Gain control of the VMs
• At cloud provider
• Log client communication
• Can read unencrypted data
• Can possibly peek into VMs, or make copies of VMs
• Can monitor network communication, application patterns
• Why?
• Gain information about client data
• Gain information on client behavior
• Sell the information or use itself
79
Attacker Capability: Outside attacker
• What?
• Listen to network traffic (passive)
• Insert malicious traffic (active)
• Probe cloud structure (active)
• Launch DoS
• Goal?
• Intrusion
• Network analysis
• Man in the middle
• Cartography
From [5] www.cs.jhu.edu/~ragib/sp10/cs412
80
Challenges for the attacker
• How to find out where the target is located?
• How to be co-located with the target in the same
(physical) machine?
• How to gather information about the target?
81
Infrastructure Security
• Network Level
• Host Level
• Application Level
82
The Network Level
• Ensuring confidentiality and integrity of your organization’s data-in-
transit to and from your public cloud provider
• Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources you are using at your public cloud
provider
• Ensuring availability of the Internet-facing resources in a public cloud
that are being used by your organization, or have been assigned to
your organization by your public cloud providers
• Replacing the established model of network zones and tiers with
domains From [6] Cloud Security and Privacy by Mather and Kumaraswamy
83
The Network Level - Mitigation
• Note that network-level risks exist regardless of what aspects of
“cloud computing” services are being used
• The primary determination of risk level is therefore not which *aaS is
being used,
• But rather whether your organization intends to use or is using a
public, private, or hybrid cloud.
84
The Host Level
• SaaS/PaaS
• Both the PaaS and SaaS platforms abstract and hide the host OS from end
users
• Host security responsibilities are transferred to the CSP (Cloud Service
Provider)
• You do not have to worry about protecting hosts
• However, as a customer, you still own the risk of managing information hosted
in the cloud services.
85
Local Host Security
• Are local host machines part of the cloud infrastructure?
• Outside the security perimeter
• While cloud consumers worry about the security on the cloud provider’s site, they may easily
forget to harden their own machines
• The lack of security of local devices can
• Provide a way for malicious services on the cloud to attack local networks through these
terminal devices
• Compromise the cloud and its resources for other users
Local Host Security (Cont.)
• With mobile devices, the threat may be even stronger
• Users misplace or have the device stolen from them
• Security mechanisms on handheld gadgets are often times insufficient compared to say, a
desktop computer
• Provides a potential attacker an easy avenue into a cloud system.
• If a user relies mainly on a mobile device to access cloud data, the threat to availability is also
increased as mobile devices malfunction or are lost
• Devices that access the cloud should have
• Strong authentication mechanisms
• Tamper-resistant mechanisms
• Strong isolation between applications
• Methods to trust the OS
• Cryptographic functionality when traffic confidentiality is required
87
The Application Level
• DoS
• EDoS(Economic Denial of Sustainability)
• An attack against the billing model that underlies the cost of providing a
service with the goal of bankrupting the service itself.
• End user security
• Who is responsible for Web application security in the cloud?
• SaaS/PaaS/IaaS application security
• Customer-deployed application security
From [6] Cloud Security and Privacy by Mather and Kumaraswamy
88
Data Security and Storage
• Several aspects of data security, including:
• Data-in-transit
• Confidentiality + integrity using secured protocol
• Confidentiality with non-secured protocol and encryption
• Data-at-rest
• Generally, not encrypted , since data is commingled with other users’ data
• Encryption if it is not associated with applications?
• But how about indexing and searching?
• Then homomorphic encryption vs. predicate encryption?
• Processing of data, including multitenancy
• For any application to process data, not encrypted
107
Minimize Lack of Trust:
Policy Language
• Consumers have specific security needs but don’t have a say-so in
how they are handled
• What the heck is the provider doing for me?
• Currently consumers cannot dictate their requirements to the provider (SLAs
are one-sided)
• Standard language to convey one’s policies and expectations
• Agreed upon and upheld by both parties
• Standard language for representing SLAs
• Can be used in a intra-cloud environment to realize overarching security
posture
Minimize Lack of Trust:
Policy Language (Cont.)
• Create policy language with the following characteristics:
• Machine-understandable (or at least processable),
• Easy to combine/merge and compare
• Examples of policy statements are, “requires isolation between VMs”,
“requires geographical isolation between VMs”, “requires physical separation
between other communities/tenants that are in the same industry,” etc.
• Need a validation tool to check that the policy created in the standard language
correctly reflects the policy creator’s intentions (i.e. that the policy language is
semantically equivalent to the user’s intentions).
109
Minimize Lack of Trust: Certification
• Certification
• Some form of reputable, independent, comparable assessment and description
of security features and assurance
• Sarbanes-Oxley, DIACAP, DISTCAP, etc (are they sufficient for a cloud
environment?)
• Risk assessment
• Performed by certified third parties
• Provides consumers with additional assurance
Minimize Loss of Control:
Monitoring
• Cloud consumer needs situational awareness for
critical applications
• When underlying components fail, what is the effect of the
failure to the mission logic
• What recovery measures can be taken (by provider and
consumer)
• Requires an application-specific run-time monitoring
and management tool for the consumer
• The cloud consumer and cloud provider have different
views of the system
• Enable both the provider and tenants to monitor the
components in the cloud that are under their control
Minimize Loss of Control:
Monitoring (Cont.)
– Provide mechanisms that enable the provider to
act on attacks he can handle.
• infrastructure remapping (create new or move
existing fault domains)
• shutting down offending components or targets
(and assisting tenants with porting if necessary
• Repairs
– Provide mechanisms that enable the consumer to
act on attacks that he can handle (application-level
monitoring).
• RAdAC (Risk-adaptable Access Control)
• VM porting with remote attestation of target
physical host
• Provide ability to move the user’s application to
another cloud
112
Minimize Loss of Control:
Utilize Different Clouds
• The concept of ‘Don’t put all your eggs in one basket’
• Consumer may use services from different clouds through an intra-cloud or multi-cloud
architecture
• Propose a multi-cloud or intra-cloud architecture in which consumers
• Spread the risk
• Increase redundancy (per-task or per-application)
• Increase chance of mission completion for critical applications
• Possible issues to consider:
• Policy incompatibility (combined, what is the overarching policy?)
• Data dependency between clouds
• Differing data semantics across clouds
• Knowing when to utilize the redundancy feature (monitoring technology)
• Is it worth it to spread your sensitive data across multiple clouds?
• Redundancy could increase risk of exposure
Minimize Loss of Control:
Access Control
• Many possible layers of access control
• E.g. access to the cloud, access to servers, access to services, access to
databases (direct and queries via web services), access to VMs, and
access to objects within a VM
• Depending on the deployment model used, some of these will be
controlled by the provider and others by the consumer
• Regardless of deployment model, provider needs to
manage the user authentication and access control
procedures (to the cloud)
• Federated Identity Management: access control management burden
still lies with the provider
• Requires user to place a large amount of trust on the provider in terms
of security, management, and maintenance of access control policies.
This can be burdensome when numerous users from different
organizations with different access control policies, are involved
Minimize Loss of Control:
Access Control (Cont.)
• Consumer-managed access control
– Consumer retains decision-making process to retain
some control, requiring less trust of the provider
(i.e. PDP is in consumer’s domain)
– Requires the client and provider to have a pre-
existing trust relationship, as well as a pre-
negotiated standard way of describing resources,
users, and access decisions between the cloud
provider and consumer. It also needs to be able to
guarantee that the provider will uphold the
consumer-side’s access decisions.
– Should be at least as secure as the traditional
access control model.
– Facebook and Google Apps do this to some degree,
but not enough control
– Applicability to privacy of patient health records
115
Minimize Loss of Control: IDM
Present IDMs
• IDM in traditional application-centric IDM model
• Each application keeps track of identifying information of its users.
• Existing IDM Systems
• Microsoft Windows CardSpace [W. A. Alrodhan]
• OpenID [http://openid.net]
• PRIME [S. F. Hubner]
If Trusted Third Party is compromised, all the identifying information of the users
is also compromised
[Latest: AT&T iPad leak]
Minimize Loss of Control: IDM
Issues in Cloud Computing
• Cloud introduces several issues to IDM
• Users have multiple accounts associated with multiple service
providers.
• Lack of trust
• Use of Trusted Third Party is not an option
• Cloud hosts are untrusted
• Loss of control
• Collusion between Cloud Services
• Sharing sensitive identity information between
services can lead to undesirable mapping of the
identities to the user.
L!
I
FA
Solution 2
• Alice sends the key at some time prior to sending Bob the encrypted
message
L!
I
FA
Solution 3 – Use public key crypto
• Diffie Hellman Key Exchange
• All users share common modulus, p, and element g
• g ≠ 0, g ≠ 1, and g ≠ p-1
• Alice chooses her private key, kA
• Computes KA = gkA mod p and sends it to Bob in the clear
• Bob chooses his private key, kB
• Computes KB = gkB mod p and sends it to Alice in the clear
• When Alice and Bob want to agree on a shared key, they compute a shared secret
S
• SA,B = KBkA mod p
• SB,A = KAkB mod p
Why does DH work?
• SA,B = SB,A
• (gkA) kB mod p = (gkB) kA mod p
• Eve knows
• g and p
• KA and KB
• Why can’t Eve compute the secret?
• Given:
• Multiplicative group G
• Element a in G
• Output b
• Find:
• Unique solution to ax = b in G
• x is loga b
Eve Bob
Alice
• Example: (10) = 4
• 1, 3, 7, 9
• Example: (7) = 6
• 1, 2, 3, 4, 5, 6
• If n is prime, (n) = n-1
RSA keys
• Choose 2 large primes, p and q
• N = pq
• (N) = (p-1)(q-1)
• Choose e < N such that gcd(e, (N))=1
• d such that ed = 1 mod (N)
c = me mod N m = cd mod N
Bob
Alice
Toy example
• p=7, q=11
• N=77
• (N) = (6)(10) = 60
• Bob chooses e=17
• Uses extended Euclidean algorithm to find inverse of e mod 60
• Finds d=53
197
Data Security and Storage (Application-Level Security)
App App
s s
OS OS
Hypervisor
servers
Physical Hardware
208
NoHype*
• NoHype removes the hypervisor
• There’s nothing to attack
• Complete systems solution
• Still retains the needs of a virtualized cloud infrastructure
App App
s s
OS OS
No hypervisor
Physical Hardware
209
Capability
List
1 2 3 4 5 6
Which one is better
• ACLs:
• Can have large numbers of objects
• Easy to grant access to many objects at once
• Require expensive operation on every access
• Capabilities
• Hard to manage huge number of capabilities
• They have to come from somewhere
• They are fast to use (just pointer dereferences)
• Most systems use both
• ACLs for opening an object (e.g. fopen())
• Capabilities for performing operations (e.g. read())
Protection Domain Concept
• A protection domain is the set of objects and permissions on those objects that executing code may
access
• e.g. a process
• memory
• files
• sockets
• also: a device driver, a user, a single procedure
• Capabilities:
• protection domain defined by what is in the capability list
• ACLs
• protection domain defined by the complete set of objects code could access
How does this get implemented?
• Originally:
• every application had its own security checking code,
• Separate set of users
• Separate set of objects
• Separate kinds of ACLs, capabilities
• This makes the trusted computing base) huge!!!
• You have to trust all applications do to this correctly!
• Now: Reference monitor
• Manages identity
• Performs all access checks
• Small, well-tested piece of code
Modern security problems
• Confinement
• How do I run code that I don’t trust?
• E.g. RealPlayer, Flash
• How do I restrict the data it can communicate?
• What if trusted code has bugs?
• E.g. Internet Explorer
• Concepts:
• Least Privilege: programs should only run with the minimal amount of privilege necessary
• Solutions:
• Restricted contexts - let the user divide their identity
• ActiveX – make code writer identify self
• Java – use a virtual machine that intercepts all calls
• Binary rewriting - modify the program to force it to be safe
Key Distribution
• Have network with n entities
• Add one more
• Must generate n new keys
• Each other entity must securely get its new key
• Big headache managing n2 keys!
• One solution: use a central keyserver
• Needs n secret keys between entities and keyserver
• Generates session keys as needed
• Downsides
• Only scales to single organization level
• Single point of failure
235
Symmetric Key Distribution
• How does Andrew do this?
236
Key Distribution Center (KDC)
• Alice, Bob need shared symmetric key.
• KDC: server shares different secret key with each registered
user (many users)
• Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for
communicating with KDC.
KDC
KA-KDC KP-KDC
KX-KDC
KP-KDC KB-KDC
KY-KDC
KZ-KDC
KA-KDC KB-KDC
237
Key Distribution Center (KDC)
Q: How does KDC allow Bob, Alice to determine shared
symmetric secret key to communicate with each other?
KDC
generates
KA-KDC(A,B)
R1
239
Asymmetric Key: Confidentiality
Bob’s public
KB key
Bob’s private
KB-1 key
240
Asymmetric Key: Sign & Verify
• If we are given a message M, and a value S such
that KB(S) = M, what can we conclude?
• The message must be from Bob, because it must be the case that
S = KB-1(M), and only Bob has KB-1 !
241
Asymmetric Key: Integrity & Authentication
S = Sign(M) Message M
Integrity:
Receiver must only check Verify(M, S)
Nonce
Authentication:
S = Sign(Nonce)
Verify(Nonce, S)
242
Multi-factor What
Authentication (MFA)
is Multi-Factor Authentication??
• Use the Duo Mobile app to create a pass code or send a notification to
cell
• YubiKey authentication
Multi-factor Authentication Options
Demonstrations
How do I set this stuff up?!?
• Select the Call my phone work (or whatever you named it)
• You will receive a call from ‘Toll Free Call’
“Welcome to Duo. If you are not expecting this call, please hangup. Otherwise, press any key on
your phone to login.”
Scan the QR code at the bottom of the screen and the Duke University account will load on your
phone. Click Continue on the webpage when complete.
271
User Awareness
273
Viruses
A virus attaches itself to a program, file,
or disk. Program
When the program is executed, the A
virus activates and replicates itself. Extra Code
The virus may be benign or malignant
but executes its payload at some point
(often upon contact).
infects
Viruses can cause computer crashes and loss
of data.
In order to recover or prevent virus
attacks: Program
Avoid potentially unreliable websites/emails. B
System Restore.
Re-install operating system.
274
Use and maintain anti-virus software.
Worms
Independent program that replicates itself and sends copies from computer to
computer across network connections.
Upon arrival, the worm may be activated to replicate.
To Joe
To Ann
To Bob
Email List:
[email protected]
[email protected]
[email protected]
275
Logic Bombs and Trojan Horses
276
Social Engineering
Social engineering manipulates people into performing actions or divulging confidential
information. Similar to a confidence trick or simple fraud, the term applies to the use of deception
to gain information, commit fraud, or access computer systems.
Email:
ABC Bank has
Phone Call: noticed a
This is John, the problem with
System In Person: your account…
Administrator. What ethnicity
What is your are you? Your I have come
password? mother’s maiden to repair your
name? machine…
and have
some lovely
software
patches!
277
Phishing: Counterfeit Email
Phishing: A seemingly
trustworthy entity asks for
sensitive information such as
SSN, credit card numbers,
login IDs or passwords via e-
mail.
278
Pharming: Counterfeit Web Pages
Wiping over,
but not
clicking the
link may
reveal a
different
Misspelled address.
With whom?
Copyright
date is old
280
Man In The Middle Attack
281
Rootkit
283
Georgia Data Breach Notification Law
Symptoms:
Antivirus software detects a problem.
Disk space disappears unexpectedly.
Pop-ups suddenly appear, sometimes selling security software.
Files or transactions appear that should not be there.
The computer slows down to a crawl.
Unusual messages, sounds, or displays on your monitor.
Stolen laptop: 1 stolen every 53 seconds; 97% never recovered.
The mouse pointer moves by itself.
The computer spontaneously shuts down or reboots.
Often unrecognized or ignored problems.
285
Malware detection
• Spyware symptoms:
• Changes to your browser homepage/start page.
• Ending up on a strange site when conducting a search.
• System-based firewall is turned off automatically.
• Lots of network activity while not particularly active.
• Excessive pop-up windows.
• New icons, programs, favorites which you did not add.
• Frequent firewall alerts about unknown programs when trying
to access the Internet.
• Poor system performance.
286
Best Practices to avoid these threats
287
Anti-virus and Anti-spyware Software
288
Host-based Firewalls
• A firewall acts as a barrier between your computer/private network
and the internet. Hackers may use the internet to find, use, and
install applications on your computer. A firewall prevents many
hacker connections to your computer.
• Firewalls filter network packets that enter or leave your computer
289
Protect your Operating System
Microsoft regularly issues patches or updates to solve security problems in their software. If
these are not applied, it leaves your computer vulnerable to hackers.
The Windows Update feature built into Windows can be set up to automatically download and
install updates.
Avoid logging in as administrator
Apple provides regular updates to its operating system and software applications.
Apply Apple updates using the App Store application.
290
Use Strong Passwords
294
Avoid Stupid Hacker Tricks
Be sure to have a good firewall or pop-up blocker installed.
Pop-up blockers do not always block ALL pop-ups so
always close a pop-up window using the ‘X’ in the upper
corner.
Never click “yes,” “accept” or even “cancel.”
295
Secure Business Transactions
Symbol indicating
enhanced security
296
Backup Important Information
297
Cyber Incident Reporting
40
35
30
25
20
%
15
10
5
0
Tip By Accident Internal Audit Internal Controls External Audit Notified by
Police
Untrusted Untrusted
Core concepts of Zero Trust
All resources are accessed in a secure manner
regardless of location.
APPS
MCAP WAF
CHD MCAP
IPS WAF
WWW farm
User MCAP
DAM DB farm
IPS
IPS
CHD Server
MCAP farm
MGMT SIM NAV
server DAN MCAP WAN
Zero Trust network architecture is SDN- and fabric-friendly
VM
VM
VM
VMHypervisor
vSwitch
Open vSwitch vSwitch
VM
VM
VM
vSwitch
VM
vSwitch
Extend Zero Trust to the cloud
Zero Trust Is designed to stop malware propagation
and data exfil