cybersecurity and privacy lecture

60
1 Cybersecurity: Technologies and their Impact on Privacy Eran Toch The Minerva Center for Human Rights, The Hebrew University, June 2013

Upload: eran-toch

Post on 06-May-2015

495 views

Category:

Technology


1 download

DESCRIPTION

What is cybersecurity (or computer security)? The lecture describes the field and tries to answer two questions: How people's privacy can be threaten by computer threats? How can it be threaten by the security mechanisms that help organizations and nations fight cyber security?

TRANSCRIPT

Page 1: Cybersecurity and Privacy Lecture

1

Cybersecurity: Technologies and their Impact on Privacy

Eran TochThe Minerva Center for Human Rights, The Hebrew University, June 2013

Page 2: Cybersecurity and Privacy Lecture

2

Eran Toch

Department of Industrial Engineering

Tel Aviv University, Israel

http://toch.tau.ac.il/

[email protected]

Page 3: Cybersecurity and Privacy Lecture

My Work

3

Managing Location Privacy

Temporal Aspects of Privacy

Generating Automatic Defaults

http://toch.tau.ac.il/

Page 4: Cybersecurity and Privacy Lecture

Cyber-Security and Privacy

4

Cyber Attacks

Cyber Security

Page 5: Cybersecurity and Privacy Lecture

Agenda

1. The Context Of Cyber Attacks

2. The Attack Model

3. The Cyber-security Response

5

Page 6: Cybersecurity and Privacy Lecture

1. The Context Of Cyber Attacks

6

Page 7: Cybersecurity and Privacy Lecture

Cyber Attacks

7

Actions to penetrate the computers or networks of a nation, organization or a person for the purposes of causing damage, disruption or to violate privacy.

http://www.flickr.com/photos/75468116@N04/8569854011

Page 8: Cybersecurity and Privacy Lecture

Three Questions

‣Who are the attackers?

‣What are the targets?

‣ How the attacks are carried out?

8

Page 9: Cybersecurity and Privacy Lecture

Who Are the Bad Guys?

9

Page 10: Cybersecurity and Privacy Lecture

10

“Off-the-shelf” Hackers

Sophisticated Hackers

Motivations:‣ Cyber Crime‣ Vandalism ‣Hactivism

Motivations:‣ Cyber Crime‣ Cyber Espionage ‣ Cyberwar

Page 12: Cybersecurity and Privacy Lecture

Threats for Electronic Services‣Disrupting, sabotaging or exploiting electronic

services.

12http://www.nytimes.com/2012/01/17/world/middleeast/cyber-attacks-temporarily-cripple-2-israeli-web-sites.htmlhttp://www.nytimes.com/2013/03/28/technology/attacks-on-spamhaus-used-internet-against-itself.html?pagewanted=all

Page 13: Cybersecurity and Privacy Lecture

For Example, The Attack on ATMs

13http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?pagewanted=all

Page 14: Cybersecurity and Privacy Lecture

Threats for the Computer Network‣ Disrupting the Internet network itself,

preventing the flow of communication.

14

Page 15: Cybersecurity and Privacy Lecture

Disrupting the Infrastructure‣ Electricity, water,

fuel and nuclear energy.

‣ Air control, traffic, building infrastructure.

15

Page 16: Cybersecurity and Privacy Lecture

But, Apart from Stuxnet...‣ Not many examples

of successful cyberattacks on infrastructure.

‣ However, physical infrastructure is getting increasingly connected.

16

The Stuxnet Attack, July 2012

Page 17: Cybersecurity and Privacy Lecture

Threats for Privacy‣ Accessing private information on servers and

personal devices.

17

Page 18: Cybersecurity and Privacy Lecture

1. The attack model

18

Page 19: Cybersecurity and Privacy Lecture

Attack Models

19

‣ The Internet Architecture

‣ Attacks

‣ Denial-of-service

‣ Trojan horse

‣ Phishing

‣ Man-in-the-middle

‣ Social Network attacks

‣ Insiders

Page 20: Cybersecurity and Privacy Lecture

The Internet Protocol

Client

Routers

Server

20

IP Packet

132.66.237.203

64.233.160.0

209.85.128.0

IP Address

Page 21: Cybersecurity and Privacy Lecture

Global IP Network

21

Page 22: Cybersecurity and Privacy Lecture

Properties of the Internet Network

‣ Multi channels of communication.‣ Anonymity and trustfulness.

22

Page 24: Cybersecurity and Privacy Lecture

Denial-of-Service Attacks‣ Distributed denial-of-

service attack (DDoS attack)

‣ An attempt to make a machine or network resource unavailable to its intended users.

‣ Attackers hide themselves by employing “zombies”.

24

Page 25: Cybersecurity and Privacy Lecture

Example: The Attack on Spamhaus

25http://www.nytimes.com/interactive/2013/03/30/technology/how-the-cyberattack-on-spamhaus-unfolded.html

Page 26: Cybersecurity and Privacy Lecture

Second Attack

26http://www.flickr.com/photos/lars_in_japan/6129526077

Trojan Horses!

Page 27: Cybersecurity and Privacy Lecture

Trojan Horses Attack‣ A Trojan horse is a

malware that appears to perform a desirable function but instead drops a malicious payload

‣ Often including a backdoor allowing unauthorized access to the target's computer.

27

Page 28: Cybersecurity and Privacy Lecture

Example: The Zeus Trojan Malware

28

1. Zeus Trojan sells for $3,000 to $4,000 in the black market

2. Victims download and install the trojan malware

3. When victims surf to a select bank website, it displays a fake site

4. The malware steals account numbers, Social Security number, usernames and passwords

Page 31: Cybersecurity and Privacy Lecture

Phishing Attacks‣ In Phishing attacks, the victim receives an email, a text message or

another communication. The link or reference will take the victim to a dummy site.

31http://www.gartner.com/newsroom/id/565125

Page 32: Cybersecurity and Privacy Lecture

The Cost‣ Gartner estimates that

3.6 million U.S. million adults lost money in phishing attacks in 2007.

‣ $3.2 billion was lost to these attacks.

32

Page 33: Cybersecurity and Privacy Lecture

Fourth Attack

33http://www.flickr.com/photos/lars_in_japan/6129526077

Man in the Middle in Mobile

Page 34: Cybersecurity and Privacy Lecture

Attacks on Mobile Devices‣ Mobile devices generate

and store very sensitive information:

‣ Our location

‣ Voice and video

‣ Contacts and communications

‣ Applications

‣ Various sensor data34

Page 35: Cybersecurity and Privacy Lecture

Man-in-the-middle Attack

35

Malicious Router

Sensitive Website

Page 36: Cybersecurity and Privacy Lecture

Man-in-the-Middle + Trojan

36

Malicious Router

Page 38: Cybersecurity and Privacy Lecture

Facebook Botnets‣ How would you

respond to this Facebook friend request?

‣ The cyber attack: to become your friend.

‣ Social engineering can be used to get close to targeted people.

38

Page 39: Cybersecurity and Privacy Lecture

Social Network Attacks

39

The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al, In Proceedings of ACSAC'11, 2011.

Boshmaf et al. engineered a botnet server, and measured the rate in which people will fall for the attack.

Page 41: Cybersecurity and Privacy Lecture

Insiders‣ Cybersecurity is turning its eyes to insiders

such as employees and subcontractors.

41http://www.haaretz.co.il/news/law/1.1831775

Page 42: Cybersecurity and Privacy Lecture

The Risk‣ External threats count

for only 47.1% of perceived risks by IT managers.

‣ The majority of risk is from insiders and from management limitations.

42AlgoSec 2012 Report

Page 43: Cybersecurity and Privacy Lecture

2. The cyber-security Response

43

Page 44: Cybersecurity and Privacy Lecture

Cybersecurity Responses

44

‣ Organizations and governments respond to cyber attacks by:

‣ Developing technologies

‣ Regulating organizations

‣ Educating users and service providers

‣ Applying different levels of monitoring

http://www.flickr.com/photos/6892190693

Page 45: Cybersecurity and Privacy Lecture

Israel National Cyber Bureau‣ The Israel National Cyber Bureau

can be seen as a test case for government cybersecurity response.

‣ The Bureau activities include:

‣ Response formulation.

‣ Regulation roadmap.

‣ Research and development.

45

Page 46: Cybersecurity and Privacy Lecture

Levels of Response

Technology, Research and Education

CitizenEducation

Small Service ProvidersRegulation

Civil OrganizationsPolicy and Enforcement

Government Internal Procedures

Page 47: Cybersecurity and Privacy Lecture

All Front‣ Unlike traditional warfare, there is no clear

front.

‣ The question of how to regulate civic organizations and individuals is still open.

47

Page 48: Cybersecurity and Privacy Lecture

Cybersecurity Technologies

48

‣ Network Monitoring

‣ Syntactic monitoring

‣ Semantic monitoring

‣ Identification systems

‣ Monitoring systems

Page 49: Cybersecurity and Privacy Lecture

Syntactic Monitoring‣ Tracking the network

communication by:

‣ Firewalls

‣ Proxies

‣ Radius servers

‣ Monitoring is based on IP characteristics, such as destination, origin etc.

49

Page 50: Cybersecurity and Privacy Lecture

Syntactic Monitoring and Privacy

‣ Sites users visit.

‣ Applications used by the user:

‣ Bitorrent.

‣ http / https.

‣ VOIP.

‣ Geographical origins and destinations.

50

Page 51: Cybersecurity and Privacy Lecture

Semantic Monitoring ‣ Application firewalls

look at the content of network communication.

‣ It operates by monitoring and potentially blocking the input, output, and system service calls.

51

Page 52: Cybersecurity and Privacy Lecture

What can it Block?

52

The most comprehensive Web Application threat mitigation • SQL injection• Cross-site scripting• Parameter tampering• Hidden field manipulation• Session manipulation• Cookie poisoning• Stealth commanding• Backdoor and debug options• Geolocation-based blocking• Application buffer overflow attacks• Brute force attacks• Data encoding• Unauthorized navigation• Gateway circumvention• Web server reconnaissance• SOAP and Web services manipulation• Parameters pollution

Imperva

Radware

Citrix

Page 53: Cybersecurity and Privacy Lecture

State-Wide Monitoring‣ Direct connection to

the network infrastructure and to service providers.

‣ Big-Data: Reading everything, detecting by Machine Learning.

53

Page 54: Cybersecurity and Privacy Lecture

Insiders‣ To battle insiders

from accessing the data, organizations:

‣ Design procedures for data access.

‣ Track end-user devices.

‣ Track communications and traces.

54

Page 55: Cybersecurity and Privacy Lecture

Deep Device Monitoring ‣ For example,

Trusteer, an Israeli Startup, provides technology that monitors end-user devices.

‣ Every application is scanned for key-logging etc.

55

Page 56: Cybersecurity and Privacy Lecture

Summary

56

Page 57: Cybersecurity and Privacy Lecture

Cyber-Security and Privacy

57

Cyber Attacks

Cyber Security

Page 58: Cybersecurity and Privacy Lecture

Cyber Attacks‣ Easier to carry out

‣ But not necessarily easier to succeed.

‣ Increasing threat to privacy.

‣ We are all the victims of the Agron 2006 attack.

‣ Increasing use of social engineering, personal devices, human vulnerabilities.

58

Page 59: Cybersecurity and Privacy Lecture

Cyber-Security ‣ Deeper and wider monitoring

‣ With a chilling effect on privacy.

‣ The front is increasingly ubiquitous

‣ Government, organizations, companies, services.

59

Where should be the line between security and privacy?

Page 60: Cybersecurity and Privacy Lecture

60

Eran TochDepartment of Industrial Engineering Tel Aviv University, Israel

http://toch.tau.ac.il/

[email protected]