Chapter 4
Chapter 4
Security Layers
Security Layers represent a hierarchical approach to securing a network
Mapping of the network equipment and facility groupings to Security Layers
Determining how the network elements in upper layers can rely on protection that the
lower layers provide.
2
Threat Model
1Threat
- Destruction (an attack on availability):
(simplified)
–Models:
Destruction of information and/or network resources X
2 - Corruption (an attack on integrity):
– Unauthorized tampering with an asset
Communication links
Basic IP transport
IP support services (e.g., AAA(American automobile
association), DNS(Domain Name System), DHCP(Dynamic
Host Configuration Protocol))
The web browser application generates a request to have the Web site name
resolved to an IP address.
The browser then attempts to establish communications with that Web site.
Creates a preamble and a frame header, which contains the source and
destination MAC addresses
Once it arrives, and trailer information, called a checksum that contains the count
of the number of bits in a transmission so that the receiver can ensure the packet
did not get damaged in transit.
The Internet layer protocols strip the IP header from the packet and pass the
payload to the Transport layer.
The Transport layer protocol strips the TCP or UDP header and passes the payload
to
the Application layer.
The application that is specified to manage that data receives the data.
9
TCP /IP Layers
andVulnerabilities
Identifying Possible Application Layer Attacks
Some of the most difficult to protect against because they take advantage of
vulnerabilities in applications and lack of end-user knowledge of computer security.
Some of the ways the Application layer can be exploited to compromise the CIA
triad
include the following:
E-mail application exploits:
Attachments
The application that is requesting the service determines what protocol will be
used.
Some of the ways the Transport layer can be exploited to compromise the C-I-A
triad include the following:
Manipulation of the UDP or TCP ports.
DoS
Session hijacking
This attack occurs after a source and destination computer have established a
communications link.
A third computer disables the ability of one the computers to communicate, and
11
then imitates that computer.
Cont.…
Identifying Possible Internet Layer Attacks
IP datagrams are formed
If the IP header fields and lengths are known, the IP address in the IP datagram
can be easily discovered and spoofed. Any security mechanism based on the
source IP address is vulnerable to this attack
Man-in-the-middle attacks
A hacker places himself between the source and destination computer in
such a way that neither notices his or her existence.
12
Meanwhile, the attacker can modify packets or simply view their
Cont.…
DoS
Corrupting packets
If the packet is intercepted, the information in the header can be modified,
corrupting the IP datagram.
It could change the protocols and payload information in the datagram
At the Network Interface layer, the packet of information that is placed on
the
wire is known as a frame.
14
Program Security
Security:When is it software
problem
We can distinguish security problems by the mechanisms requiring changes to
eliminate the vulnerability:
1. Network Problem:
The patch techniques were largely useless, because they frequently introduced
18 new faults.
Cont.…
B. Tiger Team: would be convened to test a system’s security by attempting
to cause it to fail.
If the system withstood the attacks, it was considered secured.
20
Cont.…
Program Security Flaws by Genesis:
Unintentional human errors(Inadvertent)
Domain Errors
21 Non-Malicious errors
Cont.…
Program Security Flaws by Time:
During development
Requirement/specification/design
Source code
Object code
During maintenance
During operation
The security of the data depends on physical security, OS security and DBMS
security.
Databases are a favorite target for attackers because of the data they are containing
and
also because of their volume. Data warehouse is the ultimate goal.
Efforts to ensure database security are considerably higher than for the other types of data.
It is easier to implement an access list for a great number of files than an access list
The first option, for a secure database is represented by its optimal protection.
Ensuring database security must be done from outside to inside, this involving
ensuring security starting from the physical level and ending with the data level
(physical, network, host, applications and data).
The focus of attacks on the company’s databases are motivated by the following
factors:
Databases are the mass of information which the company works with;
Loss of confidentiality/privacy;
25 Loss of privacy, integrity and
availability.
Cont.…
To ensure a minimum security of the databases the following requirements must be satisfied:
Access control;
User identification;
Availability
The physical and logical integrity of databases will require the focus of efforts for
The integrity of each element forming the database requires the value of each field
26 be written or changed only by authorized users and only if there are correct
may
values.
Cont.…
The access control is being done taking into consideration the restrictions of
DBMS will apply the security policy of the database administrator (DBA).
Server security: involves limiting access to data stored on the server. It’s the
most
important option that has to be taken in consideration & planned carefully.
checking that each connection corresponds to a single user who has access to
data.
Access control table: The access control table is the most common form of
securing a database. An appropriate use of the table access control involves a close
collaboration between the administrator and the base developer.
Cont.…
Secure IP addresses: Some servers may be configured to receive only queries from
hosts that are in a list. Oracle servers allow blocking queries that are not related to
the database.
guessing the password is tried after a predefined number of attempts (usually 3).
Special tools: Special programs such as Real Secure by ISS which will alert in case
User identification will allow at any time to be known who does anything in the
system. All the operations performed by users will be stored and will form a
history of access. Checking the history of all hits is sometimes hard and requires a
Cont.…
Attacks specific to the databases:
Two situations which leads to the disclosure of secret data from public data:
Data association problem arises whenever two values taken together are
classified at a
higher level than the one of each value.
A first step in countering these types of attacks is the protection of sensitive data- data
that must not be made public.
Cont.…
When an attacker applies one or more methods of attack, and in combination
Bound data: an attacker can determine the range of values which the searched
30 Negative data: After some seemingly innocent queries sensitive data can be
Probable data: Their existence is highlighted by complex
Cont.…
An attacker, after he passed all levels of protection and reached the database, he will
Direct attacks are obvious attacks and are successful only if the database does not
implement any protection mechanism. The displayed results will be the ones
required and expected. If this attack fails then the attacker moves to the next.
Indirect attacks are attacks that are executed when it is desired the extraction of
other data than those that are displayed. Combinations of queries are used some of
them having the purpose to cheat the security mechanisms.
suppression mechanism for the claims that have dominant results.This type of
attack is used against databases that have short answers to queries.
31
Cont.…
The options that can be chosen for a mechanism that will not permit
database elements that have as result displaying sensitive results are rejected
without any response.
that the attacker will not be able to determine the exact values.
Limiting the results of a request that reveals sensitive data:
Combining results: Combining the results from several request will create even a
Administrative control elements: From this category we have: Security policy and
emergency situations plan, Staff control, Placing the equipment in safe conditions,
32
Escrow agreements, Maintenance agreements and the physical control of
Thank You!
48