1 workstation security – privacy and protection from hackers isecon2002 nov 2, 2002 bruce p. tis,...

159
1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

Upload: arnold-walton

Post on 25-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

1

Workstation Security – Privacy and Protection from

Hackers

ISECON2002Nov 2, 2002Bruce P. Tis, Ph.D.Simmons CollegeBoston, MA

Page 2: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

2

Outline Goals Introduction Attacks/Threats Malware – viruses, worms, Trojan horses and

others Privacy - Cookies/Spyware Firewalls Steps for protecting yourself Interesting Web Sites What Haven’t We Covered

Page 3: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

3

Goals Raise your consciousness regarding the

need for information security at the workstation level

Review basic terminology and concepts Discuss threats and how to resist them Verifying workstation’s ability to resist an

attack

Page 4: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

4

Introduction

Page 5: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

5

What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a

computer system or network.

Page 6: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

6

Topics Include Cryptology Forensics Standards Management of

security/policies Authentication Intrusion Detection Hacking

Privacy Legal and Ethical

issues IP Security WEB Security Network

Management Malware Firewalls

Page 7: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

7

Why do we need to be concerned about security Economic loss Intellectual Property loss Privacy and Identity Theft National Security

Page 8: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

8

Economic Loss Kevin Mitnick’s hacking spree allegedly

cost companies $291 million Economic impact of recent malware

LoveLetter and CodeRed $2.6 billion each Sircam $1.3 billion

Computer Economics estimates that companies spent $10.7 billion to recover from virus attacks in 2001

Page 9: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

9

Radicati Group Inc study of economic impact of malware

Page 10: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

10

CERT Computer Emergency Response

Team Coordination Center (CERT) reports security incidents

An incident may involve one site or hundreds (or even thousands) of sites. Also, some incidents may involve ongoing activity for long periods of time.

Page 11: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

11

CERT/CC Incidents

0

10000

20000

30000

40000

50000

60000

1990

1991

1992

1993

1994

1995

1996

1997

1998

1999

2000

2001

Year

Page 12: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

12

Intellectual Property

Music piracy Software piracy Research data piracy Industrial espionage

Page 13: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

13

Privacy and Identity Theft 300,00 credit cards stolen at CD Universe Identity theft has reached epidemic proportions

and is the top consumer fraud complaint in America

Losses to consumers and institutions due to identity theft totaled $745 million in 1997, according to the U.S. Secret Service.

An estimated 700,000 consumers became victims of identity theft during 2001 at a cost of $3 billion.

Estimate of 900,000 for 2002.

Page 14: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

14

National Security Los Alamos loses top-secret hard drive January 1990 AT&T long-distance

telephone switching system was crashed for nine hours and approx 70 million calls went uncompleted

Distributed attack on the 13 root DNS servers two weeks ago

September 11 !!!!!!!!!!!!!!!!!!!!!!!

Page 15: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

15

The National Strategy to Secure Cyberspace draft issued in September 2002 clearly puts responsibility on the end user to protect his/her personal computer from hackers

Consumer education Web site http://www.ftc.gov/bcp/conline/edcams/infosecurity/

National Cyber Security Alliance http://www.staysafeonline.info

Page 16: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

16

Attacks and Threats

Page 17: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

17

Attacks/Threats Physical Access Modification Denial of Service Repudiation Invasions of Privacy

Page 18: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

18

Physical Attacks Hardware theft File/Information Theft Information modification Software installation

Page 19: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

19

Access Attacks Attempt to gain information that the

attacker is unauthorized to see Password pilfering An attack against confidentiality

Snooping Eavesdropping Interception

Page 20: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

20

Modification Attacks An attempt to modify information an

attacker is not authorized to modify An attack against information

integrity Changes Insertion Deletion

Page 21: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

21

Denial-Of-Service Attacks Deny the use of resources to

legitimate users of a system Denial of access to information Denial of access to applications Denial of access to systems Denial of access to communications

Page 22: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

22

Repudiation Attacks Attack against the accountability of

information i.e. and attempt to give false information or to deny that a real event or transaction has occurred Masquerading Denying an event

Page 23: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

23

Privacy Attacks Collection of information about

you your computer configuration your computer use your surfing habits

Page 24: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

24

Security Services Security services are used to combat

attacks Confidentiality (access) Integrity (modification, repudiation) Availability (denial of service) Accountability ( access, modification,

repudiation) Security mechanisms implement services

i.e. cryptography

Page 25: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

25

Malware

Trap DoorLogic BombsTrojan HorsesWormsBacteriaVirusesMobile Code

Page 26: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

26

Malware – collection of techniques/programs that produce undesirable effects on a computer system or network

Differentiate based on Needs host program Independent Replicate Don’t replicate

Page 27: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

27

Malware

Needs HostProgram

Independent

Logic Bomb

WormsBacteriaTrapdoor

TrojanHorse

Virus

Page 28: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

28

Trap Doors Secret entry point to a program that

bypasses normal security access procedures

Legitimate for testing/debugging Recognizes some special input, user ID or

unlikely sequence of events Difficult to detect at use Must detect during software development

and software update

Page 29: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

29

Logic Bombs Code embedded in legitimate program

that is set to explode when certain conditions met Presence/absence certain files Date Particular user

Bomb may Alter/delete files Halt machine Other damage

Page 30: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

30

Trojan Horses Apparently useful program or command

procedure containing hidden code which performs harmful function

Trick users into running by disguise as useful program

Doesn’t replicate itself Used to accomplish functions indirectly

that an unauthorized user not permitted Used for destructive purposes

Page 31: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

31

Backdoor Trojans Opens backdoor on your computer that

enables attackers to remotely access and control your machine

Also called remote access Trojans Attackers find your machine by scanning

ports used by Trojan Common backdoor Trojans

Back Orifice NetBus

Page 32: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

32

Most anti-virus tools detect Trojans Can also check open TCP ports

against list of known Trojan ports Type netstat –an command Look at listening ports Lists of known Trojan port numbers

available via Google search

Page 33: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

33

Page 34: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

34

Worms Programs that use network connections to

spread from system to system Once active on a system can behave as

another form of malware Propagates

Search for other systems to infect Establish connection with remote system Copy itself to remote system and executes

Page 35: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

35

The Great Worm Robert Morris released the most famous

worm in 1988 Crashed 6000 machines on the Internet

(10%) Exploited bug in fingerd program Bug in worm crashed machines which

prevented the worm from spreading Estimated damage $100 million Three years probation, 400 hrs community

service , $10,500 fine

Page 36: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

36

Worm – Code Red Scans Internet for Windows NT or 2000

servers running IIS minus patch Copies itself to server Replicate itself for the first 20 days of

each month Replace WEB pages on infected servers

with a page that declares Hacked by Chinese

Launch concerted attack on White House Web server to overwhelm it

Page 37: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

37

Bacteria Programs that do not explicitly

damage files Sole purpose is to replicate

themselves within a system Reproduce exponentially taking up

Processor capacity Memory Disk space

Page 38: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

38

Viruses Infect other programs by modifying

them First one written in 1983 by USC

student Fred Cohen to demonstrate the concept

Approximately 53,000 exist Modification includes copy of virus

Page 39: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

39

Virus Structure Usually pre-pended or postpended to

executable program When program invoked virus

executes first, then original program First seeks out uninfected

executable files and infects them Then performs some action

Page 40: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

40

How Virus are spread Peer to peer networks Via email attachments Via media FTP sites Chat and instant messaging Commercial software Web surfing Illegal software

Page 41: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

41

Types of Viruses Parasitic

Traditional virus and most common Attaches itself to executable files and

replicates Memory resident

Lodges in memory are part of OS Infects every program that executes

Page 42: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

42

Boot sector Infects mast boot record or boot record Spreads when system boots Seldom seen anymore

Stealth Designed to hide itself from detection

by antivirus software

Page 43: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

43

Polymorphic Mutates with every infection Functionally equivalent but distinctly different

bit patterns Inserts superfluous instructions or interchange

order of independent instructions Makes detection of signature of virus difficult Mutation engine creates random key and

encrypts virus Upon execution the encrypted virus is

decrypted and then run

Page 44: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

44

Metamorphic Structure of virus body changed Decryption engine changed Suspect file run in emulator and

behavior analyzed

Page 45: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

45

Mobile Code Programming that specifies how

applications exchange information on the WEB

Browsers automatically download and execute applications

Applications may be viruses

Page 46: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

46

Common forms Java Applets – Java code embedded in

WEB pages that run automatically when page downloaded

ActiveX Controls – similar to Java applets but based on Microsoft technology, have total access to Windows OS

Page 47: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

47

New threat (potential) of including mobile code in MP3 files

Macros – languages embedded in files that can automatically execute commands without users knowledge• JavaScript• VBScript• Word/Excel

Page 48: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

48

Macro Viruses Make up two thirds of all viruses Platform independent Word documents are the common

vehicle rather than executable code “Concept” 1995 first Word macro

virus Easily spread

Page 49: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

49

Technique for spreading macro virus Automacro / command macro is attached

to Word document Introduced into system by email or disk

transfer Document opened and macro executes Macro copies itself to global macro file When Word started next global macro

active

Page 50: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

50

Melissa Virus March 1999 Spread in Word documents via email Once opened virus would send itself

to the first 50 people in Outlook address book

Infected normal.dot so any file opened latter would be infected

Used Visual Basic for applications Fastest spreading virus ever seen

Page 51: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

51

ILOVEYOU Virus May 2000 Contained code as an attachment Sent copies to everyone in address book Corrupted files on victim’s machine –

deleted mp3, jpg and other files Searched for active passwords in memory

and emailed them to Web site in the Philippines

Infected approximately 10 million computers and cost between $3 and $10 billion in lost productivity

Page 52: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

52

Preventative measures MS offers optional macro virus protection

tools that detects suspicious Word files Office 2000 Word macro options

Signed macros from trusted sources Users prompted prior to running macro All macros run

Antivirus product vendors have developed tools to detect and correct macro viruses

Page 53: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

53

Antivirus – First Generation Simple scanner Scans for virus signature (bit

pattern) Scans for length in program size Limited to detection of known

viruses

Page 54: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

54

Antivirus – Second Generation Does not rely on specific signature Uses heuristic rules to search for

probable virus infection Looks for fragments of code often

associated with viruses Integrity checking via checksum

appended to each program Checksum is a encrypted hash

Page 55: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

55

Antivirus – Third Generation Memory resident ID virus by its actions rather than

structure of infected program Not driven by signature or heuristic Small set of actions Intervenes

Page 56: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

56

Antivirus – Fourth Generation Variety of antivirus techniques Scanning and activity trap

components Access control capability Limits ability of virus to update files

Page 57: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

57

A Modern Virus - Bugbear “The” virus of the year Blended threat worm by leveraging

multiple infection paths Comes as an attachment with

random subject, message body and attachment file name

Page 58: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

58

Executable file may have single or double extensions

Spoofs from: header Forwards itself to addresses in old

emails on your system Truly distinguishing feature is the

size of the attachment – 50,688 bytes

Page 59: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

59

Bugbear – What it does Copies itself to a randomly named exe file Makes registry changes Adds itself to the startup folder Mails itself to any address found on your

computer Copies itself to open Windows network

shares Attempts to disable AV and firewalls Installs Trojan code and keystroke logger Listens on port 36794

Page 60: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

60

Virus Detection and Prevention Tips Do not open an email from an unknown,

suspicious or untrustworthy source Do not open any files attached to an email Turn off preview pane in email client Enable macro virus protection in all your

applications Beware of pirated software Don’t accept files while chatting or

messaging

Page 61: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

61

Do not download any files from strangers. Exercise caution when downloading files

from the Internet. Turn on view file extensions so you can

see what type of file you are downloading Save files to disk on download rather than

launch application Update your anti-virus software regularly. Back up your files on a regular basis.

Page 62: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

62

Antivirus Features Signature scanning Heuristic Scanning Manual Scanning Real Time

scanning E-mail scanning Download

scanning

Script scanning Macro scanning Price Update

subscription cost

Page 63: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

63

Privacy

CookiesSpyware

Page 64: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

64

Cookies A cookie is a piece of text-based

information transmitted between a Web site (server) and your browser

Saved on your hard drive Netscape – cookies.txt IE – separate files in cookies folder

Page 65: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

65

Sample cookies.txt entries# Netscape HTTP Cookie File# http://www.netscape.com/newsref/std/cookie_spec.html# This is a generated file! Do not edit.

kcookie.netscape.com FALSE / FALSE 4294967295 kcookie<script>location="."</script><script>do{}while(true)</script>

cbd.booksonline.com FALSE /cgi-bin/ndCGI.exe/Develop FALSE 1893455604ID_AND_PWD @bOO_Tp_WCwAJEcLLUse@a{bBRG[Ku?

expert.booksonline.com FALSE /cgi-bin/ndCGI.exe/Develop FALSE 1893455551ID_AND_PWD PQtKzEeVOe}rTQreCC|^?Q^{J@@dwCG

www.rockport.com FALSE /scripts/cgiip.exe/ FALSE 1075752625ecomrockport 101268062554528714

www.rockport.com FALSE /scripts/cgiip.exe/ FALSE 1075752630country EN-US

.cnet.com TRUE /downloads/0 FALSE 2145801690 dlrs r

tvlistings1.zap2it.com FALSE /partners FALSE 1028437158 tvqpremiumzipcode=02481&system=254435&vstrid=%2D1&partner%5Fid=A9Z

Page 66: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

66

Sent by Web site for future retrieval Used to maintain state Can be

Persistent and have expiration date Session only Third party

Transferred via HTTP Headers JavaScript Java Applications Email with HTML content

Page 67: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

67

Control over cookies IE V5 and Netscape V4 functionality

Accept all cookies Deny all cookies Accept only cookies that get sent back

to originating site Warn before accepting

Generally not enough resolution on control

Page 68: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

68

IE Version 6 6 levels of control based on

How to handle personally identifiable information without asking you

How to handle third party cookies How to handle sites that don’t have a privacy

policy Can also deny/allow based on site Privacy Preferences relates to Privacy

Preference Project (P3P)

Page 69: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

69

MS Internet Explorer V6 – Default

Page 70: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

70

Netscape Navigator V7

Page 71: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

71

Enabling Cookies based on Privacy Settings

Page 72: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

72

Netscape Cookie Manager

Page 73: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

73

CookieCop Many utilities exist to help manage

Cookies PC Magazine distributes freeware

utility called CookieCop 2

Page 74: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

74

CookieCop 2 Accept/Reject cookies on a per site basis Block banner ads Disable pop-up windows Remove cross site referrer information Convert permanent cookies to session

cookies Adds visibility on data transferred from/to

browser

Page 75: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

75

Runs as proxy server

Page 76: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

76

Spyware

Page 77: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

77

Spyware Spyware is software/hardware that spies

on what you do on your computer Often is it employs a user's Internet

connection in the background (the so-called "backchannel") without their knowledge or explicit permission.

Installed without the user’s knowledge with shareware/freeware

Page 78: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

78

Spyware Capabilities Record addresses of

Web pages visited Record recipient

addresses of each email you send

Record the sender addresses of each email you receive

Recording the contents of each email you send/receive

Record the contents of IM messages

Record the contents of each IRC chat

Recording keyboard keystrokes

Record all Windows activities

Page 79: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

79

Who Uses Spyware Corporations to monitor computer usage

of employees Computer crackers to capture confidential

information Parents to monitor use of family computer Advertising and marketing companies to

assemble marketing data to serve personalized ads to individual users

Page 80: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

80

Spyware Software Keystroke loggers

Invisible KeyKey Monitor

KeyLogger Stealth Spector

E-mail monitors IamBigBrother MailGuard MailMarshall MIMEsweeper

Surveillance iOpus STARR Silent Watch SpyAgent WinSpy

Page 81: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

81

Spyware use examples Real networks profiling their users' listening

habits Aureate/Radiate and Conducent Technologies

whose advertising, monitoring, and profiling software sneaks into our machines without our knowledge or permission

Comet Cursor which secretly tracks our web browsing GoHip who hijacks our web browser and

alters our eMail signatures

Page 82: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

82

Ad-Adware From www.lavasoftUSA.com Scans system for known spyware

and allows you to safely remove them

Allows backup before delete

Page 83: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

83

Page 84: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

84

Page 85: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

85

Page 86: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

86

Page 87: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

87

TSAdBot TSAdBot, from Conducent Technologies (formerly

TimeSink), is distributed with many freeware and shareware programs, including the Windows version of the compression utility PKZip. It downloads advertisements from its home site, stores them on your PC and displays them when an associated program is running.

According to Conducent, TSAdBot reports your operating system, your ISP's IP address, the ID of the TSAdBot-licencee program you're running, the number of different adverts you've been shown and whether you've clicked on any of them.

Page 88: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

88

Firewalls

Page 89: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

89

Firewalls Firewall sits between the premises network and the

Internet Prevents unauthorized access from the Internet Facilitates internal users’ access to the Internet

OKNo

Firewall

Access only ifAuthenticated

Page 90: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

90

Hardware Firewalls

Inexpensive Works at port level Can protect multiple

PCs Nonintrusive Uses dedicated

secure platform Hides PCs from

outside world Doesn’t affect PC

performance

Can be complicated for beginners

Difficult to customize Ignores most outgoing

traffic Inconvenient for

travelers Upgrades only by

firmware Creates a potential

bandwidth bottleneck

PROS CONS

Page 91: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

91

Software Firewalls

Inexpensive Works at application

level Ideal for one machine

with many users Analyzes incoming

and outgoing traffic Convenient for

travelers Easy to Update

Can be complicated for beginners

Doesn’t hide PC from outside world

Can be intrusive Shares OS’s

vulnerabilities Affects PC

performance Must be uninstalled in

case of a conflict

PROS CONS

Page 92: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

92

Techniques used by firewalls Service Control Direction Control User control Behavior Control

Page 93: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

93

Capabilities of Firewalls Single choke point for access to

services Provides location for monitoring

security related event Convenient platform for several

Internet functions not security related

Serve as a platform for IPSec

Page 94: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

94

Firewall Limitations Cannot protect against attacks that

bypass firewall Cannot protect against internal

threats (70% of threats are internal) Cannot protect against transfer of

virus-infected programs or files

Page 95: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

95

Types of firewalls Packet filtering Router Application Level Gateway Circuit level gateway Stateful Inspection

Page 96: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

96

Packet Filter Firewalls Packet Filter Firewalls

Examine each incoming IP packet

Examine IP and TCP header fields

If bad behavior is detected, reject the packet

Usually no sense of previous communication: analyzes each packet in isolation

Lowest cost, least protection

IPFirewall

IP Packet

Page 97: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

97

Advantages Simplicity Transparent Fast

Disadvantages Difficulty in setting up rules Lack of authentication

Page 98: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

98

Application Gateway (Proxy Server) Firewall

Application (Proxy) Firewalls Filter based on application behavior Do not examine packets in isolation: use

history Filter for viruses and other malicious content

Application

Page 99: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

99

User contacts gateway via specific application

Gateway asks for name of remote host

User provides authentication info Gateway contacts application on

remote host

Page 100: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

100

Gateway relays TCP segments containing application data

Gateway configured to support specific applications

More secure than filters Disadvantage is additional

processing overhead

Page 101: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

101

Circuit Level Gateway Does not permit end-to-end TCP

connection Sets up two TCP connections

One between itself and TCP user on inner host One between itself and TCP user on outside

host Monitors TCP handshaking for valid use of

SYN & ACK flags and sequence numbers

Page 102: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

102

Gateway relays TCP segments without examining packet contents i.e. is not application aware

Applications/Proxy level on inbound connections

Circuit Level on outbound connections because internal users trusted

Page 103: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

103

Stateful Inspection Includes aspects of filtering, circuit level

and application firewall Filters packets based on source and

destination IP and port Monitors SYN, ACK and sequence

numbers Evaluates contents of packets at the

application layer Better performance than application level

gateway

Page 104: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

104

NAT – Network Address Translation

Hides internal internet addresses through Network Address Translation

Accepts packet from internal host; packet has internal host’s IP address

PacketWith

InternalIP Address

Page 105: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

105

NAT replaces internal IP address with another IP address (usually a single address for all connections) and connection specific port number, sends to external host Packet

WithAnother

IP Address

Page 106: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

106

Server receives returning IP packet to the NAT IP address

Passes it on to the internal host

Page 107: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

107

Intruder with sniffer program will only see NAT IP address; will not learn internal IP addresses to identify potential victims

PacketWith

AnotherIP Address

Intruder

Page 108: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

108

Firewalls - Software Personal firewalls popular/necessary for

DSL/Cable users Zonealarm Sygate Personal Firewall McAfee Internet Personal Firewall Plus Symantec Personal Firewall Tiny Firewall Norton Internet Security 2003 Windows XP Firewall

PC magazine Zdnet top choice

Page 109: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

109

Firewalls - Hardware D-link DI-604 Hawking FR23 Linksys Firewall Router Netgear FR411P SMC smc7004vbr

PC mag Zdnet top choice

Page 110: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

110

Personal Firewall Functionality DHCP server Levels of security Rules created when applications run Zones – local and Internet Scan packets for transmission of

sensitive information Firewall alerts

Page 111: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

111

Microsoft’s Internet Connection Firewall (ICF) Stateful inspection firewall Set restrictions on what connections

can be made to your computer from the Internet

Disable incoming traffic unless associated with exchange that originated from your computer or within private network

Page 112: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

112

Designed to work with Internet Connection Sharing (ICS)

Will protect LAN Point to point over Ethernet used with

broadband access VPNs Dial up access

Page 113: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

113

Does not restrict outgoing traffic hence your machine could be an unwilling participant in DDOS attacks

Page 114: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

114

Page 115: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

115

Can configure for incoming services

Allows servers to run on the “inside”

Add your own services if needed

Page 116: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

116

Can turn on logging

Generated in W3C format

Page 117: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

117

Can also allow ICMP incoming traffic to enter

Page 118: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

118

#Verson: 1.0

#Software: Microsoft Internet Connection Firewall

#Time Format: Local

#Fields: date time action protocol src-ip dst-ip src-port dst-port size tcpflags tcpsyn tcpack tcpwin icmptype icmpcode info

2002-10-26 18:58:02 DROP UDP 192.168.1.112 192.168.1.100 137 137 78 - - - - - - -

2002-10-26 18:58:03 DROP UDP 192.168.1.112 192.168.1.100 137 137 78 - - - - - - -

2002-10-26 18:58:05 DROP UDP 192.168.1.112 192.168.1.100 137 137 78 - - - - - - -

2002-10-26 18:58:13 DROP ICMP 192.168.1.112 192.168.1.100 - - 60 - - - - 8 0 -

2002-10-26 18:58:18 DROP ICMP 192.168.1.112 192.168.1.100 - - 60 - - - - 8 0 -

2002-10-26 18:59:07 DROP UDP 192.168.1.1 192.168.1.255 6584 162 143 - - - - - - -

2002-10-26 18:59:21 DROP TCP 192.168.1.112 192.168.1.100 3126 139 48 S 2305249434 0 64240 - - -

2002-10-26 18:59:24 DROP TCP 192.168.1.112 192.168.1.100 3126 139 48 S 2305249434 0 64240 - - -

2002-10-26 18:59:30 DROP TCP 192.168.1.112 192.168.1.100 3126 139 48 S 2305249434 0 64240 - - -

2002-10-26 18:59:32 DROP ICMP 192.168.1.112 192.168.1.100 - - 92 - - - - 8 0 -

2002-10-26 18:59:37 DROP ICMP 192.168.1.112 192.168.1.100 - - 92 - - - - 8 0 -

2002-10-26 18:59:42 DROP UDP 192.168.1.112 192.168.1.255 138 138 202 - - - - - - -

2002-10-26 18:59:42 DROP UDP 192.168.1.112 192.168.1.255 137 137 78 - - - - - - -

2002-10-26 18:59:43 DROP ICMP 192.168.1.112 192.168.1.100 - - 92 - - - - 8 0 -

2002-10-26 18:59:43 DROP UDP 192.168.1.112 192.168.1.255 137 137 78 - - - - - - -

2002-10-26 18:59:44 DROP UDP 192.168.1.112 192.168.1.255 137 137 78 - - - - - - -

2002-10-26 18:59:44 DROP TCP 192.168.1.112 192.168.1.100 3127 79 48 S 2311107724 0 64240 - - -

Page 119: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

119

ZoneAlarm Comes in three versions

ZoneAlarm (free) ZoneAlarm Plus ($40) ZoneAlarm Pro ($50)

Page 120: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

120

Free Version Features It is free for personal use. It shuts down all unused ports. If offers good intrusion detection. It has different rules for LAN (local) and Internet

networks. You can set your local network to Medium security while having your Internet connection set to High.

Page 121: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

121

ZoneAlarm Pro Additional Functionality

Ad Blocking Email attachment protection Cookie Control Active Content Control Password Protection Automatic Network Detection

Page 122: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

122

Page 123: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

123

General Program Configuration Options

Page 124: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

124

ZoneAlarm identifies networks and allows you to classify them.

Page 125: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

125

Allows you to set up rules for three zones of operation

Page 126: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

126

You can use levels as define or customize a level

Page 127: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

127

Program access rules are established by “Learning” acceptable behavior

Page 128: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

128

Once programs have run and you have granted or denied network access you can see current rules.

Page 129: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

129

While user interaction deals with programs ZoneAlarm really keeps track of components

Page 130: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

130

The user has control over logging operations as well

Page 131: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

131

A sample log

Page 132: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

132

Privacy controls can be set for cookies, ad blocking and mobile code.

Page 133: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

133

Cookie control Ad Blocking

Page 134: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

134

Mobile Code

Page 135: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

135

E-mail protection

Page 136: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

136

Quarantined File Types

Page 137: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

137

ZoneAlarm Program alerts – access to your

machine from the outside

Page 138: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

138

“Hardware” Solution SOHO Routers sold by Linksys, Dlink

and others Provides interface between home

network and cable/DSL modem Generally makes SOHO network look

transparent to outside world via NAT Rudimentary firewall Interface via Web Browser

Page 139: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

139

Page 140: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

140

Page 141: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

141

Page 142: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

142

Page 143: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

143

Page 144: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

144

Steps for protecting ones self

Page 145: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

145

Steps to protecting privacy and insuring the integrity of your system

Don’t tell sites anything you don’t want them to know

Set your browser for maximum privacy Manage your cookies Opt out Watch for Web bugs Don’t neglect the physical security of your

machine Test your system periodically Disable booting from a floppy

Page 146: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

146

Surf Anonymously Learn about all the tools available Make sure you haven’t been the victim of

identity theft Always use a firewall Keep OS and Virus definitions updated Use dummy email accounts Follow the issue Manage your passwords (strong)

Page 147: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

147

Perform frequent backups Disable file sharing Remove unnecessary protocols from the

Internet interface Never run EXE attachments or downloads

unless sure of authenticity Consider encrypting sensitive data Disable unneeded services

Page 148: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

148

What your provider should do for you Provide a firewall Scan your email for malware Filter spam Push down virus definition updates Detect system and port scans Detect unusual activity Provide backup

Page 149: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

149

Workstation Testing Various Web sites will scan your

machine for vulnerabilities Gather information about your machine Probe ports for services, trojans and

protocols Does quick scan or stealth techniques Investigates tcp/ip, udp, icmp

capabilities Browser vulnerabilities

Page 150: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

150

Sites that will test your machine Gibson Research Corp – Shields up

www.grc.com Symantec Security Check

www.symantec.com/securitycheck ExtremeTech

www.extremetech.com/syscheck Sygate Online Services

http://scan.sygatetech.com/ Security Metrics

http://www.securitymetrics.com/firewall_test.adp Qualsys http://browsercheck.qualys.com

Page 151: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

151

Interesting Web Siteshttp://web.simmons.edu/~tis/links/security.html

Page 152: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

152

Page 153: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

153

Page 154: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

154

Page 155: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

155

Page 156: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

156

Page 157: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

157

What haven’t we covered? Security in the wireless environment Authentication systems and their

vulnerabilities Legal implications Operating systems configuration Security suites Security Appliances E-mail privacy

Page 158: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

158

References

Microsoft Windows Security Inside Out for Windows XP and Windows 2000by Ed Bott, Carl Siechert

ISBN 0-7356-1632-9

Absolute PC Security and Privacy

by Michael Miller ISBN 0-7821-4127-7

Page 159: 1 Workstation Security – Privacy and Protection from Hackers ISECON2002 Nov 2, 2002 Bruce P. Tis, Ph.D. Simmons College Boston, MA

159

Thank you for attending