Internet Infrastructure Security
Internet Infrastructure Security
Introduction
ITU/APNIC/MICT IPv6 Security
Workshop
23rd – 27th May 2016
Bangkok
2
Why Security
Why do we need security on the
Internet?
3
Why Security?
p The Internet was initially designed for
connectivity
n Trust is assumed, no security
n Security protocols added on top of the TCP/IP
p Fundamental aspects of information must be
protected
n Confidential data
n Employee information
n Business models
n Protect identity and resources
p The Internet has become fundamental to our
daily activities (business, work, and personal)
Internet Evolution
5
ACRONYM/TERM OVERLOAD
p CIA p Risk
n Confidentiality p Threat
n Integrity p Vulnerability
n Availability
p Impact
p Access Control
n Authentication
n Authorisation
n Accountability
6
Goals of Information Security
SECURITY
Confidentiality Integrity Availability
RFID cards
eToken
Smart Cards
Fingerprint scanner
Authentication - Trusted Network
p Standard defensive-oriented technologies
n Firewall – first line of defense
n Intrusion Detection – second line of defense
p Build TRUST on top of the TCP/IP
infrastructure
n Strong authentication
p Two-factor authentication
p something you have + something you know
n Public Key Infrastructure (PKI)
Strong Authentication
p An absolute requirement
p Two-factor authentication
n Passwords (something you know)
n Tokens (something you have)
p Examples:
n Passwords
n Tokens
n Tickets
n Restricted access
n PINs
n Biometrics
n Certificates
Two-factor Authentication
p Requires a user to provide at least two
authentication ‘factors’ to prove his identity
n something you know
p Username/userID and password
n something you have
p Token using a one-time password (OTP)
Service
Authentication
Mechanism Authorisation
Mechanism
Client
p Protocol error
n No one gets it right the first time
p Software bugs
n Is it a bug or feature ?
p Active attack
n Target control/management plane
n Target data plane
n More probable than you think !
p Configuration mistakes
n Most common form of problem
Why Worry About Security?
p How much you worry depends on risk
assessment analysis
n Risk analysis: the process of identifying
security risks, determining their impact, and
identifying areas requiring protection
p Must compare need to protect asset with
implementation costs
p Define an effective security policy with
incident handling procedures
Characteristics of a Good Policy
p Can it be implemented technically?
p Are you able to implement it
organizationally?
p Can you enforce it with security tools and/
or sanctions?
p Does it clearly define areas of
responsibility for the users,
administrators, and management?
p Is it flexible and adaptable to changing
environments?
RFC 2916 - h+p://www.ie3.org/rfc/rfc2196.txt
What Are You Protecting?
p Identify Critical Assets
n Hardware, software, data, people,
documentation
p Place a Value on the Asset
n Intangible asset – importance or criticality
n Tangible asset – replacement value, training
costs and/or immediate impact of the loss
p Determine Likelihood of Security Breaches
n What are threats and vulnerabilities ?
Impact and Consequences
p Data compromise
n Stolen data
n can be catastrophic for a financial institution
p Loss of data integrity
n Negative press or loss or reputation (bank,
public trust)
p Unavailability of resources
n The average amount of downtime following a
DDoS attack is 54 minutes
n The average cost of one minute of downtime
due to DDoS attack is $22,000*
* Based on a Ponemon InsDtute study (2012)
Risk Mitigation vs Cost
Risk mi'ga'on: the process of Will I Go Bankrupt ?
selecDng appropriate controls to
reduce risk to an acceptable level.
DDoS attacks
“stealth”/advanced scanning techniques
increase in worms
widespread attacks using NNTP to distribute attack
Attack Sophistication
sophisticated command
& control
widespread attacks on DNS infrastructure
Advanced
Opportunistic
hacks Persistent
Threats
Degree of Focus
Attack Sources
p Active attack involves writing data to the network.
It is common to disguise one’s address and
conceal the identity of the traffic sender.
p Passive attack involves only reading data on the
network. Its purpose is breach of confidentiality.
Infiltration Exfiltration
https://www.stateoftheinternet.com/trends-visualizations-security-real-
time-global-ddos-attack-sources-types-and-targets.html
5
Internet Security
Introduction
ITU/APNIC/MICT IPv6 Security
Workshop
23rd – 27th May 2016
Bangkok