telecom technology center it 基準安全防護介紹 報告人:楊詔同 評估師...

148
Telecom Technology Center Telecom Technology Center IT 基基基基基基基基 基基基 基基基 基基基 基基基基基基基基基基 95 基 9 基 19 基

Upload: tobias-marsh

Post on 16-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

Telecom Technology CenterTelecom Technology Center

IT 基準安全防護介紹

報告人:楊詔同 評估師

財團法人電信技術中心

95 年 9 月 19 日

Page 2: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 2 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Contents

IntroductionIT Security ProcessIT Structure AnalysisIT Baseline Protection ModelingBrief Outline of Existing Modules

Page 3: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 3 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Introduction

Page 4: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 4 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Introduction

The IT Baseline Protection Manual contains standard security safeguards, implementation advice and aids for numerous IT configurations which are typically found in IT systems today. This information is intended to assist with the rapid solution of common security problems, support endeavors aimed at raising the security level of IT systems and simplify the creation of IT security policies. The standard security safeguards collected together in the IT Baseline Protection Manual are aimed at a protection requirement which applies to most IT systems.

Page 5: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 5 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Security Process

Page 6: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 6 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Security Process

Develop an IT security policySelect and establish an appropriate

organizational structure for IT security management

Creation of an IT security conceptImplement the IT security safeguardsTraining and security awarenessMaintain IT security in ongoing

operations

Page 7: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 7 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Structure Analysis

Page 8: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 8 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Structure Analysis

The existing infrastructureThe underlying organizational and

personnel situation which forms a background to the use of the IT assets

The IT systems used, both networked and non-networked

The communication links between the IT systems and with the outside world

The IT applications run on the IT assets

Page 9: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 9 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Structure Analysis — Sub-task

Preparing a network planReducing complexity by identifying

groups of similar assetsCollecting information about the IT

systemsCapturing information about the IT

applications and related information

Page 10: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 10 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Analysis of A Network Plan

IT system, i.e. clients and server computers, active network components (such as hubs, switches, routers), network printers etc.

Network connections between these systems, i.e. LAN connections (e.g. ethernet, token ring), backbone technologies (e.g. FDDI, ATM), etc.

Connections between the are under consideration and the outside world, i.e. dial-in access over ISDN or modem, Internet connections using ISDN, modem or routers, radio links or leased lines to remote buildings or sites.

Page 11: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 11 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Objects Represented for Each IT System

A unique name (for example the full host name or an identification number)

Type and function (for example, database server for application X)

The underlying platform (i.e. hardware platform and operation system)

Location (e.g. building and room number)Name of the responsible administratorType of network connection and network

address

Page 12: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 12 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Network Connections Information

Type of cabling (e.g. fiber optic cable)The maximum data transmission rate

(e.g. 10 Mbps)The network protocols used on the lower

layers (e.g. ethernet, TCP/IP)For external connections, details of the

external network (e.g. Internet, name of provider)

Page 13: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 13 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Baseline Protection Modeling

Page 14: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 14 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Modules

IT baseline protection of generic components

InfrastructureNon-network systemsNetworked systemsData transmission systemsTelecommunicationsOther IT components

Page 15: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 15 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Threat Catalogues

Force majeureOrganizational shortcomingsHuman failureTechnical failureDeliberate Acts

Page 16: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 16 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Safeguards Catalogues

Infrastructural safeguardsOrganizational safeguardsPersonnel safeguardsSafeguards relating to hardware and

softwareSafeguards in communicationsContingency planning

Page 17: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 17 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Force Majeure

Organizational shortcomings Human Failure

Technical Failure

Deliberate Acts

ITBPM Philosophy

IT Baseline Protection of Generic Components

Infrastructure

Non-Networked Systems

Networked Systems

Data Transmission Systems Telecommunications

Other IT Components

Infrastructural safeguards

Organiza

tional s

afeguard

s Personnel safeguards

Safeguards relating to hardware and software

Safeg

uards

in C

omm

unicat

ions

Contingency Planning

Page 18: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 18 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

IT Baseline Protection of Generic Components

Page 19: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 19 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Baseline Protection of Generic Components

IT Security ManagementOrganizationPersonnelContingency Planning ConceptData Backup PolicyComputer Virus Protection ConceptCrypto-ConceptHandling of Security IncidentsHardware and Software ManagementOutsourcing

Page 20: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 20 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Security Management

This module uses a systematic approach to establishing functional IT security management and adapting it over time in line with developments in business operations.

Page 21: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 21 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Security Management

Threat Scenario — exampleOrganizational shortcomings

• T 2.66Lack of, or inadequate, IT security management

– Lack of personal responsibility– Inadequate support from management– Inadequate strategic and conceptual requirements– Insufficient or misdirected investment– Impracticability of safeguard concepts– Failure to update the IT security process

Page 22: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 22 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

IT Security Management

Recommended countermeasures — exampleOrganization

• S 2.191 Establishment of the IT security process

– Drawing up of an Information Security Policy

– Selection and establishment of an appropriate organizational structure for IT security

– Drawing up a schedule of existing IT systems

– Definition of the procedure for drawing up the IT security concept

– Implementation of IT security measures

– IT security in ongoing operations

– Maintaining secure operations

Page 23: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 23 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Organization

This module lists the organizational procedures that are basically required for IT security. Examples are the determination of responsibilities, data media administration and procedures regarding the use of passwords. They apply to every IT system.

Page 24: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 24 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Organization

Threat Scenario — exampleOrganizational shortcomings

• T 2.1 Lack of, or insufficient, rules

– Poor resource management could seriously impair scheduled operations in a computer centre e.g. simply because an order for printer paper has been forgotten.

– Hand-held fire extinguishers once purchased need to be maintained systematically so that they are ready for operation in case of fire.

Page 25: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 25 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Organization Recommended countermeasures — example

Organization• S 2.1

Specification of responsibilities and of requirements documents for IT uses– Advisable to lay down regulations on:

» Data backup» Keeping data archives» Transport of data media» Data transmission» Destruction of data media» Documentation on IT procedures, software, IT configuration» Use of passwords» Physical access permissions» Access authorizations» Access rights» Resources management» Purchase and leasing of hardware and software» Maintenance and repair work» Software: acceptance and approval» Software: application development» Privacy protection» Protection against computer viruses» Auditing» Emergency precautions» Practices in case of infringement of the security policy

Page 26: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 26 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Personnel

The "Personnel" module describes staff-related safeguards to be observed for the achievement of IT security. Examples are arrangements during staff absences, training activities, and systematic procedures regarding the termination of employment. They apply regardless of the type of IT system employed.

Page 27: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 27 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Personnel

Threat Scenario — exampleForce Majeure

• T 1.1Loss of personnel

– Due to prolonged illness, the Network Administrator was away from work

– While the Administrator was on holiday

Page 28: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 28 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

PersonnelRecommended countermeasures — example

Personnel• S 3.3

Deputizing arrangements– For assumption of tasks by substitutes, sufficient

documentation must be provided on the current status of the relevant procedures and on the respective project

– As a rule, designation of a substitute will not suffice; consideration must be given to the training required by substitutes so that they will be qualified to assume the specific tasks. If it comes to light that there are persons who, on account of their specialist knowledge, cannot be replaced at short notice, their unavailability constitutes a serious threat to normal operations. In such cases, training of a substitute is of crucial importance

– Designated substitutes may be granted the necessary entry and access rights only when they actually have to act as deputies

Page 29: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 29 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Contingency Planning Concept

This module presents a procedure for drawing up a contingency planning concept and is especially important for larger IT systems.

Page 30: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 30 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Contingency Planning Concept

Threat Scenario — exampleForce Majeure

• T 1.2– Due to voltage spikes in the power supply, the power

supply unit for an important IT system is destroyed– A power failure in an internet service provider’s storage

system resulted in this being shut down– Firmware is loaded onto an IT system for which it is

unsuited

Page 31: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 31 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Contingency Planning Concept

Recommended countermeasures — exampleContingency Planning

• S 6.9Contingency plans for selected incidents

– Contingency plans will have to be established to provide against the following incidents:

» Fire

» Water ingress

» Power failure,

» Failure of the air-conditioning system

» Explosion

» Breakdown of data transmission

» Sabotage.

Page 32: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 32 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Data Backup Policy

This module shows how a sound data backup policy can be systematically developed. It is especially intended for larger IT systems or IT systems on which a large amount of data is stored.

Page 33: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 33 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Data Backup PolicyThreat Scenario — example

Technical Failures• T 4.13

Loss of stored data– Demagnetization of magnetic data media due to ageing or

unsuitable environmental conditions (temperature, air moisture)

– Exposure of magnetic data media to external magnetic fields– Destruction of data media by force majeure, e.g. fire or water– Inadvertent deletion or overwriting of files– Intentional or accidental setting of deletion flags in archive

systems– Technical failure of external storage (headcrash)– Faulty data media– Uncontrolled changes in stored data (loss of integrity)– Deliberate destruction of data through computer-viruses etc

Page 34: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 34 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Data Backup PolicyRecommended countermeasures — example

Contingency Planning• S 6.36

Stipulating a minimal data backup policy– Minimal data backup policy :

» SoftwareAll software, whether purchased or created personally, is to be protected once by means of a full backup.

» System dataSystem data are to be backed up with at least one generation per month.

» Application dataAll application data are to be protected by means of a full backup at least once a month

» Protocol dataAll protocol data are to be protected by means of a full backup at least once a month

Page 35: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 35 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Virus Protection Concept

The aim of the computer virus protection concept is to create a suitable package of safeguards which will enable penetration of an organization's IT systems by computer viruses to be prevented or detected as early as possible so that countermeasures can be taken and possible damage can be minimized.

Page 36: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 36 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Virus Protection Concept

Threat Scenario — exampleDeliberate Acts

• T 5.23Computer viruses

– W32.Bacalid

Page 37: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 37 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Virus Protection Concept

Recommended countermeasures — exampleHardware and Software

• S 4.33Use of a virus scanning program when exchanging of data media and data transmission

– Awareness raising» Dependence of the institution on the use of IT» Description of the hazard potential» Damage scenarios» IT systems potentially affected

– Necessary protective measures» Computer virus protection strategy» Updating computer virus scanning programs

– Procedures» Regulations on protection against computer viruses» Regulation of responsibilities

Page 38: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 38 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2006 年上半年前 20 大資安威脅

資料來源:趨勢科技, 2006/9

Page 39: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 39 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2006 年上半年資安威脅行動裝置安全威脅將成最大隱憂

行動裝置惡意程式的數量快速攀升,依據上半年累積總數與一月對照成長了 12.4 倍;相較於一月,六月的行動裝置威脅亦已是年初的 4 倍!其中去年 9 月份首次出現,在三月份已被發現到這隻能造成桌上型電腦與行動裝置交叉感染的第 17 個變種- SYMBOS_CARDTRP.R ,顯見該類病毒活躍速度之快。 Gartner 在 2005 年第二季預測 3G行動電話將在年底突破 1 億美元大關、智慧型手機將在 2008 年達到 2 億美元的規模,相信在用戶數量激增的催化下,行動裝置安全威脅恐將急速壯大。

資料來源:趨勢科技, 2006/9

Page 40: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 40 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2006 年上半年資安威脅灰色軟體成長倍數

強勢推銷的廣告軟體、間諜程式等灰色軟體在上半年引發了高達 2 百萬件左右的通報案例。相較於一月,追蹤軟體成長了 7.8 倍、廣告程式 7.2倍、 BHO 6 倍,皆顯示了驚人的成長幅度。

資料來源:趨勢科技, 2006/9

Page 41: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 41 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2006 年上半年資安威脅犯罪程式推陳出新

使用 VoIP 語音網路釣魚詐騙手法 (Voice Phishing) 。於今年 6 月時,詐騙集團藉由電子郵件加網路電話語音手法,騙取加州聖塔巴巴拉信託銀行存款客戶的金融資料。這次是網釣新招,結合網路語音電話( VOIP ),佈局出一個更新的仿冒詐騙陷阱。利用網路語音電話中回錯相容或容錯編碼的不良程式,誘騙受害人致電一個地方區碼的電話號碼,比如洛杉磯,用戶撥通後會聽到一段電話錄音,表示客戶存款帳戶因安全問題遭到凍結,需要進行特定手續才能回復運作,要用戶輸入帳戶號碼,而這群歹徒可能隱身世界任何角落。此案至今未破,銀行已通知客戶要提高警覺以防遭詐。

資料來源:趨勢科技, 2006/9

Page 42: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 42 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2006 年上半年資安威脅網路釣魚網址由 81% 下滑至 4% ;網址列覆蓋法由 13% 飆升至 96% 。 網路釣魚詐騙技巧出現逆轉,網路釣魚技巧中,原本高佔 81% 比例的網路釣魚網址下滑僅剩 4% ,而網址列覆蓋法則是變成最主要手法,強占 96%的比例,較上年度綜合報告中 13% 的比例有大幅成長。

資料來源:趨勢科技, 2006/9

Page 43: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 43 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Crypto-Concept

This module describes a procedure whereby in a heterogeneous environment both the data stored locally and the data to be transmitted can be protected effectively through cryptographic procedures and techniques.

Page 44: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 44 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Crypto-Concept

Threat Scenario — exampleDeliberate Acts

• T 5.71Loss of confidentiality of classified information

– Reading out data– Copying data– Reading of data backups– Monitoring data transmission lines– Viewing data on a screen

Page 45: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 45 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Crypto-Concept

Recommended countermeasures — exampleOrganization

• S 2.161Development of a cryptographic concept

– An example of a crypto concept is shown in the following table of contents

» Definitions» Threat scenario as motivational background» Specifying the organization’s internal security policy» Influencing factors» Determining the use of the concept» Key management

Page 46: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 46 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Handling of Security Incidents

To maintain IT security in ongoing operations, it is necessary to have developed and practice a policy for the handling of security incidents. A security incident is an event whose impact could cause significant loss or damage. To prevent or contain any loss or damage, security incidents should be dealt with swiftly and efficiently.

Page 47: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 47 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Handling of Security Incidents

Threat Scenario — exampleOrganizational Shortcomings

• T 2.62Inappropriate handling of security incidents

– New computer viruses containing damaging functionality at first occur on a sporadic basis but afterwards they are found on a wide scale

– Inconsistencies are found in the log files of a firewall– New security weaknesses in the used IT systems

become known

Page 48: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 48 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Handling of Security Incidents Recommended countermeasures — example

Contingency Planning• S 6.58

Establishment of a management system for handling security incidents

– Establish a management system handling security incidents.» Inclusion in the security guidelines» Specification of responsibilities» Procedural rules and reporting channel for handling security

incidents» Escalation strategy for security incidents» Setting priorities» Methodology for investigating and assessing security incidents» Implementation of measures for taking remedial action in

connection with security incidents» Notification of parties affected» Evaluation of a security incident» Use of detection measures for security incidents» Effectiveness testing

Page 49: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 49 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Hardware and Software Management

The aim of the “Hardware and Software Management” module is to ensure that IT operations are managed and organised properly. To this end the main focus in the module is on recommendations for procedures and sequences which refer specifically to IT hardware or software components.

Page 50: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 50 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Hardware and Software Management

Threat Scenario — exampleTechnical Failures

• T 4.43Undocumented functions

– In a number of IT systems backdoors that were inserted and then forgotten about by the developers but were originally intended to facilitate maintenance have been found, which, however, also made it possible to obtain administrator rights with a trivial password

Page 51: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 51 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Hardware and Software Management

Recommended countermeasures — exampleHardware and Software

• S 4.65Testing of new hardware and software

– The testing systems in use should always be isolated from the actual production environment

– The used of isolated testing systems is also required to check self-extracting files, such as those received via e-mail, for damaging functions

Page 52: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 52 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Outsourcing

The Outsourcing module describes IT security safeguards which should be followed where work or business processes of an organization are outsourced either partially or wholly to external service providers. Outsourcing can entail both the use and operation of hardware and software, and also services.

Page 53: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 53 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Outsourcing

Threat Scenario — exampleOrganizational Shortcomings

• T 2.84Unsatisfactory contractual arrangements with an external service provider

– Outsourced data or systems are inadequately protected because the outsourcing service provider is not aware of their protection requirement

Page 54: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 54 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Outsourcing

Recommended countermeasures — exampleOrganization

• S 2.250Determining an outsourcing strategy

– Expertise– Employees– IT systems and applications

Page 55: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 55 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Infrastructure

Page 56: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 56 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Infrastructure

BuildingsCablingRooms

OfficeServer RoomData Media ArchivesTechnical Infrastructure Room

Protective CabinetsWorking place at home (telecommuting)Computer Centers

Page 57: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 57 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Building

This module specifies the safeguards which must be observed in every building in which data is processed. These include safeguards relating to the power supply, fire protection and building protection, as well as organizational safeguards such as key management.

Page 58: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 58 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Building

Threat Scenario — exampleDeliberate Acts

• T 5.3 Unauthorized entry into a building

– A nocturnal break-in into an office building

Page 59: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 59 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Building

Recommended countermeasures — exampleOrganization

• S 1.19Protection against entering and breaking

– Protecting doors or windows through which outsiders could gain entry by means of security shutters

– Special cylinder locks, additional locks and bars

– Securing of basement light shafts

– Locking of unused side-entrances

– Burglar-proof emergency exits

– Burglar-resistant doors

– Locking of goods lifts and passenger lifts outside office hours

Page 60: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 60 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Cabling

The "Cabling" module recommends safeguards which should be adopted when laying utility and communications lines in a building. Subjects covered include fire sealing of routes, selection of appropriate types of cables and documentation of cabling.

Page 61: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 61 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Cabling

Threat Scenario — exampleDeliberate Acts

• T 5.7Line tapping

– It is thus wrong to assume that messages sent by e-mail are the equivalent of letters in the classical sense. As e-mail messages can be read throughout their journey through the internet, a more appropriate comparison is with postcards

– Some manufacturers supply sniffer programs along with their operating systems for the purpose of debugging networks. However, these can be used to intercept data as well

Page 62: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 62 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Cabling

Recommended countermeasures — exampleInfrastructure

• S 1.22Physical protection of lines and distributions

– Concealed wiring of lines– Steel-armored conduits for lines– Running lines in mechanically solid and lockable ducts– Locking of distributors– Electrical monitoring of distributors and ducts

Page 63: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 63 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Office

The "Office" module covers all the safeguards to be observed in connection with the use of IT in an office. Subjects covered include closed windows and doors and supervision of visitors and contractors.

Page 64: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 64 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Office

Threat Scenario — exampleHuman Error

• T 3.6Hazards posed by cleaning staff or outside staff

– Cleaning staff may accidentally detach a plug-in connection, water may seep into equipment, documents may be mislaid or even removed with the garbage

– In one computer centre, painting work was to be carried out in the machine rooms. By mistake, the painter knocked his ladder against the central emergency switch of the power supply and triggered it

Page 65: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 65 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Office

Recommended countermeasures — exampleOrganization

• S 2.16Supervising or escorting outside staff/visitors

– Strangers (visitors, craftsmen, maintenance and cleaning staff) should not be left unattended, except in rooms specifically designed for such purposes

Page 66: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 66 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Server Rooms

This module lists the safeguards to be observed in the use of a room housing a server (for IT systems or PBXs). Subjects covered include avoiding water pipes, air conditioning, local uninterruptible power supply (UPS) and smoking bans.

Page 67: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 67 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Server Rooms

Threat Scenario — exampleTechnical Failures

• T 4.6Voltage variations / over-voltage / under-voltage

– Over-voltages can also occur outside the electric power supply system, on all the other electrically conducting networks (e.g. telephone connections, building services management system, water or gas pipes etc.)

Page 68: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 68 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Server Rooms

Recommended countermeasures — exampleInfrastructure

• S 1.28Local uninterruptible power supply [ups]

– Offline UPS– Online UPS

Page 69: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 69 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Data Media Archives

If a room is used to accommodate data media archives, certain requirements for IT security must be adhered to. These are presented in the form of safeguards for IT Baseline Protection. Subjects covered include hand-held fire extinguishers, use of safety doors and smoking bans.

Page 70: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 70 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Data Media Archives

Threat Scenario — exampleDeliberate Acts

• T 5.4 Theft

– It was not possible to determine whether any documents had been copied or tampered with

Page 71: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 71 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Data Media Archives

Recommended countermeasures — exampleInfrastructure

• S 1.15Closed windows and doors

– Windows and outward leading doors (balconies, patios) should be closed whenever a room is unoccupied

Page 72: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 72 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Technical Infrastructure Rooms

It is also necessary to take certain IT security measures in rooms where technical infrastructure is installed, for instance the PTT cable entry room, distributor room and low-voltage distribution room. These are specified in this section.

Page 73: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 73 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Technical Infrastructure Rooms

Threat Scenario — exampleTechnical Failures

• T 4.1Disruption of power supply

– All infrastructure installations nowadays are either directly or indirectly dependent on electric power, e.g. lifts, pneumatic post systems, air conditioning, alarm systems and telephone private branch exchanges. Even the water supply in high-rise buildings relies on electric power due to the use of pumps to generate pressure in the upper storeys

Page 74: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 74 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Room — Technical Infrastructure Rooms

Recommended countermeasures — exampleInfrastructure

• S 1.3 Adapted segmentation of circuits

– It is essential to review, and, where appropriate, to adjust the electric installation when rooms are to be used for different purposes and when changes and amendments are made to the technical equipment (IT, air-conditioning, lighting)

Page 75: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 75 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Protective cabinets

Secure cabinets can be used to increase protection in rooms where data media or hardware are kept (e.g. server rooms or data media archives). If necessary, a special server cabinet can be used as an alternative to a server room. The necessary procedures for obtaining, sitting and using a secure cabinet are described in this module.

Page 76: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 76 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Protective cabinets

Threat Scenario — exampleDeliberate Acts

• T 1.16Earthquake

– Earthquakes may lead to destruction of property

Page 77: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 77 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Protective cabinets

Recommended countermeasures — exampleInfrastructure

• S 1.40Appropriate sitting of protective cabinets

– Due to the generally high weight of protective cabinets, the load-bearing capacity of the floor must be tested before installation at the place of installation

Page 78: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 78 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Working place at home (telecommuting)

This module describes the measures required to set up a teleworkstation with an appropriate security standard in such a way that it can be used for official tasks.

Page 79: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 79 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Working place at home (telecommuting)

Threat Scenario — exampleOrganizational Shortcomings

• T 2.48Inadequate disposal of data media and documents at the home work place

– The consequential damage depends on the value of the information extracted

Page 80: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 80 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Working place at home (telecommuting)

Recommended countermeasures — exampleInfrastructure

• S 1.44 Suitable configuration of a home workplace

– Sufficient space for furniture and the desktop monitor– Visual shielding of the monitor if it could be observed

through a window

Page 81: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 81 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Centers

A computer centre comprises the facilities and premises necessary to operate a large data processing system installed centrally for a number of offices. This module contains recommendations as to security measures for a computer centre whose security requirements lie between those of a server room and those of a high-security computer centre.

Page 82: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 82 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Centers

Threat Scenario — exampleTechnical Failures

• T 4.1Disruption of power supply

– Power failures are actually a regular occurrence

Page 83: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 83 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Computer Centers

Recommended countermeasures — exampleInfrastructure

• S 1.56Secondary power supply

– Emergency Power Supply – UPS

Page 84: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 84 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Non-Networked Systems

Page 85: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 85 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Non-Networked Systems

DOS PC (single user)UNIX SystemsLaptop PCsPCs with a Non-Constant User PopulationPC under Windows NTPC with Windows 95Windows 2000 ClientInternet PCStand-Alone IT systems

Page 86: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 86 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

DOS PC (Single User)

This module specifies the safeguards which must be adhered to when using a normal PC that is routinely used by several users. Subjects covered include PC security products, password protection, use of a virus detection program, regular backups.

Page 87: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 87 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

DOS PC (Single User)

Threat Scenario — exampleHuman Error

• T 3.8Improper use of the IT system

– The terminal is not locked during temporary absence

Page 88: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 88 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

DOS PC (Single User)

Recommended countermeasures — exampleHardware and Software

• S 4.2Screen Lock

– It should be possible for the user to activate the screen lock manually

– The screen lock should be automatically initiated after a predefined period of inactivity

Page 89: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 89 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

UNIX Systems

This module considers IT systems which run under the UNIX or Linux operating systems and are operated either on a stand-alone basis or as a client in a network. Terminals or PCs which are run as terminals can be connected. Both organizational and UNIX-specific safeguards are listed.

Page 90: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 90 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

UNIX Systems

Threat Scenario — exampleDeliberate Acts

• T 5.19Abuse of Administrator rights

– Misuse of user rights entails the deliberate exploitation of opportunities acquired either rightfully or illicitly to harm a system or its users

Page 91: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 91 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

UNIX Systems

Recommended countermeasures — examplePersonnel

• S 3.10Selection of a trustworthy administrator and his substitute

– Administrators and their deputies can access, and possibly alter, all stored data and allocate rights in a way that allows serious potential misuse

Page 92: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 92 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Laptop PCs

Compared with a normal PC, a portable PC (laptop) requires additional IT security safeguards because it is exposed to other threats due to its mobile nature. Examples of additional safeguards which apply to laptop PCs are suitable safe-keeping during mobile use and use of an encryption product.

Page 93: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 93 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Laptop PCs

Threat Scenario — exampleDeliberate Acts

• T 5.4 Theft

– Theft of IT equipment, accessories, software or data results not only in the expense of having to replace the equipment or to restore it to working order, but also in losses resulting from lack of availability. Loss of confidentiality and the results of this can also be damaging

Page 94: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 94 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Laptop PCs

Recommended countermeasures — exampleHardware and Software

• S 4.29Use of an encryption production for laptop PCs

– In order to prevent sensitive data being read from a laptop PC which, despite all precaution, has been stolen, an encryption program should be used

Page 95: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 95 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

歷年來國際重大資料遺失案件列表發生時間 當事人 遺失途徑 事件嚴重性

2000 年 3月

英國國家安全局幹員 筆記型電腦於倫敦火車站被竊

遺失北愛爾蘭的機密資料

2001 年 4月

英國國防部軍官 將筆記型電腦遺忘在計程車後座

國防機密丟失

2005 年 3月

加州柏克萊大學研究所入學許可辦公室

筆記型電腦於辦公室內被竊

9.8 萬人姓名、出生日、住址、和社會安全號碼外洩

2006 年 2月

美國會計師事務所Ernst & Young員工

放在汽車中的筆記型電腦隨著汽車一起失竊

會計公司客戶 Hotel.com 的24.3 萬名顧客資料,計有姓名、地址、和信用卡號

2006 年 4月

美國退伍軍人事務部員工

工作用筆記型電腦於家中失竊

全美 2,600 萬名退伍軍人,與其配偶的個人資料全部外洩

2006 年 5月

美國學生貸款公司Texas Guaranteed Student Loan 的 IT顧問

遺失存有重要資料的硬碟

130 萬名顧客身份會有遭盜用的可能

資料來源: DIGITIME企業 IT整理, 2006/8

Page 96: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 96 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

筆記型電腦安全機制

智慧卡應用 (HP提供 )

手掌靜脈辨識 (毛履兆攝影 )

TPM (台灣聯想提供 )

Page 97: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 97 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

安全防護等級建議配備

Security Level

Security Chip

Enabled

System Password

Set

Hard Drive Password

Set

Secure Windows

Login

Fingerprint Available

Outstanding

Yes Yes Yes Yes Yes

Superior Yes No Yes Yes Yes

Good No No Yes Yes Yes

Normal No No No Yes Yes

資料來源: Wave System網站、

DIGITIME企業 IT整理, 2006/8

Page 98: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 98 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Networked Systems

Page 99: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 99 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Networked Systems

Server-Supported NetworkUNIX ServersPeer-to-Peer ServicesWindows NT NetworkNovell Netware 3.xNovel Netware 4.xHeterogeneous networksNetwork and System ManagementWindows 2000 ServerS/390 and zSeries Mainframes

Page 100: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 100 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Server-Supported Network

The necessary safeguards that must be taken into account when operating a server-supported network are explained in this module. These considerations are independent of the server and client operating systems.

Page 101: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 101 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Server-Supported Network

Threat Scenario — exampleDeliberate Acts

• T 5.21Trojan horses

– TROJ_Generic

Page 102: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 102 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Server-Supported Network

Recommended countermeasures — exampleOrganization

• S 2.204Prevention of insecure network access

– Every communication to the internal network must without exception be effected over a secure channel

Page 103: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 103 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Peer-to-Peer Services

This section describes how a peer-to-peer service can be securely operated for IT Baseline Protection. Topics include the design of such a network from the point of view of security, administrative options and functional limitations.

Page 104: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 104 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Peer-to-Peer Services

Threat Scenario — exampleOrganization Shortcoming

• T 2.25Reduction of transmission or execution speed caused by Peer-to-Peer functions

– BT– emule– Kazza– edonkey– ezPeer

Page 105: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 105 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Peer-to-Peer Services

Recommended countermeasures — exampleOrganization

• S 2.67Defining a security strategy for peer-to-peer networks

– The service to be performed by each operating system and the scope of this service should first be defined

– In particular, it should be clarified whether the peer-to-peer functions of the operating system, i.e. shared resources such as printers or directories should be used at all.

Page 106: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 106 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Data Transmission Systems

Page 107: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 107 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Data Transmission SystemsExchange of Data MediaModemSecurity Gateway (firewall)E-mailWeb ServersRemote AccessLotus NotesInternet Information ServerApache Web ServerExchange/Outlook 2000Routers and Switches

Page 108: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 108 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Exchange of Data Media

This module describes the safeguards which should be considered when exchanging data media. Technical measures, such as encryption, are described, as well as the correct choice of delivery method. These measures are addressed particularly at situations where data media are exchanged on a regular basis.

Page 109: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 109 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Exchange of Data Media

Threat Scenario — exampleDeliberate Acts

• T 5.29Unauthorized copying of data media

– Confidential engineering results are to be transported from a development laboratory in town X to a production site in town Y. If the data media are mailed without any supervision or control, the possibility cannot be excluded that the information on them could be copied illegally and perhaps sold to a competitor, without detection of this disclosure of information

Page 110: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 110 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Exchange of Data Media

Recommended countermeasures — exampleHardware and Software

• S 4.34Using encryption, checksums or digital signatures

– Protection of confidentiality by means of encryption– Integrity protection using checksums, encryption or

digital signatures

Page 111: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 111 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

E-mail

The safeguards required for secure communication via e-mail on the part of both the mail server and the mail client are listed. The safeguards that have to be observed by the users are also presented.

Page 112: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 112 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

E-mail

Threat Scenario — exampleDeliberate Acts

• T 5.71Loss of confidentiality of classified information

– Monitoring data transmission lines

Page 113: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 113 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

E-mail

Recommended countermeasures — exampleCommunication

• S 5.63Use of GnuPG or PGP

– Encryption and digital signatures

Page 114: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 114 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web Servers

A web server is an IT system which makes files from an information database available to web clients. A web client, also called a browser, displays the information from a web server on the user's computer. The security of web usage is based on the security of the web server, the web client and the communications link between the two. The "Web Servers" module describes the safeguards required for secure use of the web.

Page 115: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 115 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web Servers

Threat Scenario — exampleTechnical Failures

• T 4.39Software design errors

– XSS

Page 116: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 116 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web Servers

Recommended countermeasures — exampleOrganization

• S 2.173Determining a web security strategy

– The requirements specified in the web security strategy can then be used as the basis for regular checking of whether the measures taken are in fact adequate

Page 117: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 117 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web 2.0

WEB2.0 是由美國出版媒體公司 O'REILLY在一場會議上所提出,其中最大的一項革命性變化是從 1.0 時代的民主化,進階轉型到互動、參與和共享精神。這類似軟體業界開放程式碼的概念,讓使用者自由發揮,開發出不同的應用。部落格 (BLOG) 、影音共享的YOUTUBE 、網路相簿 FLICKR以及維基百科全書 (WIKIPEDIA) 等,都是在 WEB2.0 時代中最熱門的網站。

Page 118: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 118 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web 2.0 Security Issue

Ajax 是一系列用來使網頁更具互動性的技術的總稱。運用這些技術,網頁與服務器可自動交換少量數據,以刷新部分網頁(如不斷變化的股價或比分),讓網頁「活」起來。

同時造就了 XSS漏洞更活耀的舞台。

Page 119: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 119 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Web 2.0 Security Event 利用 XSS漏洞的最著名事件,是 2005 年 10 月份 MySpace 網站遭到的

相對良性攻擊。 19歲的洛杉磯軟體開發員「 Samy」編寫了一段蠕蟲程序,令他獲得了

逾 100 萬網上「好友」,直至MySpace 使該程序失效。他在自己的MySpace簡介裡,置入一段 JavaScript代碼,這樣每個查看簡介的人會在不知不覺中執行這段代碼。這段代碼把他列為該用戶的好友之一,而在通常情況下,列為好友需要得到該用戶的同意,但他寫的蠕蟲使用Ajax 技術,使之在後台批准他的請求。

接著,該蠕蟲會打開該用戶自己的簡介,把惡意代碼復制進去,並把Samy添加到那裡的任何英雄列表中,還附上一句話:「 Samy 是我最敬佩的英雄」。同樣,任何查看該用戶簡介的人也會被感染,這樣Samy 的名聲和「人氣」迅速擴大到 100 萬 MySpace 會員。

此時,該網站的管理員才發覺大量活動,被迫將 MySpace 關閉數小時,以清除該蠕蟲病毒。

資料來源:英國金融時報整理, 2006/8

Page 120: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 120 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Telecommunications

Page 121: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 121 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Telecommunications

Telecommunications System (Private Branch Exchange, PBX)

Fax MachineAnswering MachineLan Connection of an IT system via ISDNFax ServersMobile PhonesPDAs

Page 122: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 122 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phones

This section presents a set of security safeguards for the components mobile phone.

Page 123: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 123 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phones

Threat Scenario — exampleDeliberate Acts

• T 5.2Manipulation of data or software

– There are a number of ways in which data or software can be manipulated: through incorrect data input, changes to access rights, modification of accounting data or correspondence, changes to the operating system software etc

Page 124: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 124 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phones

Recommended countermeasures — exampleHardware and Software

• S 4.114Use of the security mechanisms provided on mobile phones

– Firewall– Anti-virus– IDS– USIM Card (certified by Common Criteria)– DRM

Page 125: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 125 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phone Virus名稱 類型 平台 特性 破壞性

SymbOS.Commwarrior.A

(武士病毒 )

蠕蟲SPAM

EPOC 透過藍芽、 MMS傳輸

破壞手機系統及應用程式無法正常運作散播MMS給通訊錄中最多 256 個朋友、造成手機通訊費用增加利用社交工程手法,誘使接收著開啟MMS每月 14 日第一個小時會重新啟動裝置系統

SYMBOS-DAMPIG.A

(呆豬病毒 )

特洛伊木馬

EPOC 透過藍芽傳輸

關閉應用程式並植入許多種的食人魚變種蠕蟲破壞手機系統及應用程式無法正常運作

SYMBOS_SKULLS.E

(骷髏頭病毒 )

特洛伊木馬

EPOC 透過藍芽傳輸

會將應用程式圖示取代成骷髏頭破壞手機系統及應用程式無法正常運作使用者必須將手機重置,但通訊錄或檔案、程式將會全部消失其他變種會偽成新版的 Flash播放軟體其他變動會植入食人魚、病毒等惡意程式

SymbOS.Doomboot.A 特洛伊木馬

EPOC 會分別在手機裝置內植入惡意程式與SymbOS.Commwarrior.B 的複製檔裝置重新啟動後,惡意程式會開啟並造成手機部份功能無法運作資料來源:電子時報整理, 2005/8

Page 126: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 126 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phone Virus名稱 類型 平台 特性 破壞性

SymbOS.Cabir.M

(食人魚 )

蠕蟲 EPOC 透過藍芽傳輸

攻擊手機附近藍芽手機或裝置 ( 如藍芽印表機等 )阻斷手機藍芽的連結與傳輸頻繁使用藍芽介面,造成手機電池的消耗殆盡

SymbOS.Lasco.A 病毒蠕蟲

EPOC 透過藍芽傳輸

既是藍芽蠕蟲,也是會造成感染的病毒會出現是否要透過藍芽接收訊息的提示文字會嘗將自己傳給其他藍芽裝置

SymbOS.Fontal.A 特洛伊木馬

EPOC 手機檔共用或網際網路聊天傳輸

向手機作業系統植入惡意檔,手機重新啟動時系統將無法開啟破壞手機作業系統的程式管理器,阻止用戶下載安全新的應用程式,也阻止用戶將病毒刪除只有將手機記憶體格式化並重新安裝作業系統,但重要資料將喪失

SYMBOS_LOCKNUT 特洛伊木馬

EPOC 藍芽 會造成某些按鍵失效,甚至讓使用者的電話當機透過弱點導致 Symbian OS 7.0 裝置當機少數變動會安全食人魚蠕蟲

資料來源:電子時報整理, 2005/8

Page 127: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 127 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phone Virus名稱 類型 平台 特性 破壞性

Sms_flood 駭客程式

MMS 專門針對能夠發送短信的網站,利用其功能上的一些漏洞向用戶手機發送大量短信給中毒用戶帶來了成倍的短信開支

VBS.Timofonica 蠕蟲 Windows

Outlook 該病毒通過運營商的系統向任意用戶發送罵人短信透過 Outlook 來大量散播屬 VB描述語言蠕蟲

EPOC.Ghost.Joke 玩笑程式

EPOC 透過郵件 會在螢幕左上角出現” Everyone hates you” 等訊息窗

EPOC.Sprite.Joke 玩笑程式

EPOC 透過郵件 會不斷出現劃過螢幕的小飛機

EPOC.Nice.Joke 玩笑程式

EPOC 透過郵件 會在螢幕左上角出現不同訊息的小視窗,如” Just do it”

EPOC.Lights.Joke 玩笑程式

EPOC 透過郵件 會續不斷地閃爍手機螢幕

EPOC.FalseAlarm.Joke 玩笑程式

EPOC 透過郵件 會出現警告嗶聲

資料來源:電子時報整理, 2005/8

Page 128: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 128 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Mobile Phone Virus名稱 類型 平台 特性 破壞性

EPOC.Fake.Joke 玩笑程式

EPOC32

透過郵件 出現騙人的格式化畫面

EPOC.Disowner.Joke

(EPOC_BANDINFO.A)

玩笑程式

EPOC32

透過郵件 會修改用戶資訊改為” Some fool own this”會建新一個新目錄夾,用來儲存組態檔及原始用戶資訊

EPOC.Alone.Joke 玩笑程式

EPOC 透過郵件 會假裝正透過紅外線在下載惡意程式接著出現 WARNING-VIRUS 的訊息會鎖住手機鍵鑑,必須輸入” Leave me alone”才能恢復正常

Backdoor.Brador.A 後門程式

WinCE 透過郵件 針對 Windows Mobile 2003 或只感染Strong ARM-Based 裝置會不斷地透過 Email 將中毒裝置的 IP位置傳給攻擊駭客,同時的打開 TCP Port 2989並等待攻擊者的進一步指示駭客可遠端執行目錄內容列表、上下載檔案、顯示訊息窗或執行特定指令

資料來源:電子時報整理, 2005/8

Page 129: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 129 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

手機中毒畫面

食人魚病毒中毒畫面(賽門鐵克網站)

Sprite 病毒會在畫面上出現飛來飛去的小飛機(賽門鐵克網站)

SYMBOS_SKULLS.E骷髏頭病毒中毒畫面(賽門鐵克網站)

Page 130: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 130 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

2000 年全球第一隻手機病毒 Timofonica 的出現,起初手機上的病毒攻擊,多半仍以 PC平台為攻擊基地。隨著WAP 、 GPRS 、藍芽、 WiFi 、 3G傳輸技術、 HSDPA 及WiMAX 的接連問市,手機病毒才開始有了散播的途徑。除此之外, MMS簡訊的大行其道,更成為手機病毒藉以大量散佈的最佳管道。

Page 131: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 131 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Brief Outline of Existing Modules

Other IT Components

Page 132: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 132 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Other IT Components

Standard SoftwareDatabasesTelecommutingNovel eDirectory Archiving

Page 133: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 133 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Standard Software

A procedure is described as to how the life cycle of standard software can be structured, i.e. requirements catalogue, selection, testing, approval, installation and deinstallation. Aspects such as functionality tests and security characteristics, installation instructions and release notices are described.

Page 134: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 134 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Standard Software

Threat Scenario — exampleOrganization Shortcomings

• T 2.29Software testing with production data

– Software is tested with copies of production data in an isolated test environment

Page 135: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 135 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Standard Software

Recommended countermeasures — exampleOrganization

• S 2.83Testing standard software

– Creating test data and test cases» Standard cases» limit values» Error cases» Exceptional cases

Page 136: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 136 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Range & Type ErrorsBuffer overflow“Write-what-where” conditionStack overflowHeap overflowBuffer underwriteWrap-around error Integer overflow Integer coercion errorTruncation errorSign extension error

Page 137: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 137 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Range & Type ErrorsSigned to unsigned conversion errorUnsigned to signed conversion errorUnchecked array indexingMiscalculated null termination Improper string length checkingCovert storage channelFailure to account for default case in switchNull-pointer dereferenceUsing freed memoryDoubly freeing memory

Page 138: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 138 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Range & Type Errors Invoking untrusted mobile codeCross-site scriptingFormat string problem Injection problem (“data” used as something else)Command injectionLog injectionReflection injectionSQL injectionDeserialization of untrusted data

Page 139: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 139 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Environmental Problems Reliance on data layout Relative path library search Relying on package-level scope Insufficient entropy in PRNG Failure of TRNG Publicizing of private data when using inner classes Trust of system event data Resource exhaustion (file descriptor, disk space, sockets, ...)

Information leak through class cloning Information leak through serialization Overflow of static internal buffer

Page 140: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 140 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Synchronization & Timing Errors State synchronization errorCovert timing channelSymbolic name not mapping to correct objectTime of check, time of use race conditionComparing classes by nameRace condition in switchRace condition in signal handlerUnsafe function call from a signal handlerFailure to drop privileges when reasonableRace condition in checking for certificate revocation

Page 141: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 141 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Synchronization & Timing Errors Passing mutable objects to an untrusted methodMutable object returnedAccidental leaking of sensitive information through

error messagesAccidental leaking of sensitive information through

sent dataAccidental leaking of sensitive information through

data queriesRace condition within a threadReflection attack in an auth protocolCapture-replay

Page 142: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 142 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Protocol Errors Failure to follow chain of trust in certificate

validationKey exchange without entity authenticationFailure to validate host-specific certificate dataFailure to validate certificate expirationFailure to check for certificate revocationFailure to encrypt dataFailure to add integrity check valueFailure to check integrity check valueUse of hard-coded passwordUse of hard-coded cryptographic key

Page 143: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 143 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Protocol Errors Storing passwords in a recoverable formatTrusting self-reported IP addressTrusting self-reported DNS nameUsing referrer field for authenticationUsing a broken or risky cryptographic algorithmUsing password systemsUsing single-factor authenticationNot allowing password agingAllowing password agingReusing a nonce, key pair in encryption

Page 144: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 144 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

Protocol Errors Using a key past its expiration dateNot using a random IV with CBC modeFailure to protect stored data from

modificationFailure to provide confidentiality for stored

data

Page 145: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 145 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

General Logic Errors Ignored function return valueMissing parameterMisinterpreted function return valueUninitialized variableDuplicate key in associative list (alist)Deletion of data-structure sentinelAddition of data-structure sentinelUse of sizeof() on a pointer typeUnintentional pointer scaling Improper pointer subtraction

Page 146: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 146 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

Common Software Security Problem

General Logic Errors Assigning instead of comparing Comparing instead of assigning Incorrect block delimitation Omitted break statement Improper cleanup on thrown exception Uncaught exception Improper error handling Improper temp file opening Guessed or visible temporary file Failure to deallocate data Non-cryptographic PRNG Failure to check whether privileges were dropped successfully

Page 147: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 147 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

簡報完畢

敬請指教

Page 148: Telecom Technology Center IT 基準安全防護介紹 報告人:楊詔同 評估師 財團法人電信技術中心 95 年 9 月 19 日

- 148 -

Forward-Looking, Forward-Looking, Professional, EnergeticProfessional, Energetic

www.ttc.www.ttc.org.tworg.tw

連絡資訊

財團法人電信技術中心評估師 楊詔同

地址: 220台北縣板橋市四川路 1 段 326 號 4樓辦公室電話: 02-89535600 ext 217

傳真: 02-89535655

E-mail : [email protected]

URL : http://www.ttc.org.tw

ITBPM Consultant

ISO 15408 Evaluator

ISO 27001 Lead Auditor