Computer Security Summer Scholars 2018 Matt Vander Werf HPC System - - PowerPoint PPT Presentation

computer security
SMART_READER_LITE
LIVE PREVIEW

Computer Security Summer Scholars 2018 Matt Vander Werf HPC System - - PowerPoint PPT Presentation

Computer Security Summer Scholars 2018 Matt Vander Werf HPC System Administrator Security in HPC HPC is especially a target for hackers and malicious acts Why? Security in HPC Prestige Computing resources Financial Gain


slide-1
SLIDE 1

Computer Security

Summer Scholars 2018 Matt Vander Werf HPC System Administrator

slide-2
SLIDE 2

Security in HPC

  • HPC is especially a target for hackers and

malicious acts

Why?

slide-3
SLIDE 3

Security in HPC

  • Prestige
  • Computing resources

– Financial Gain – Break encryption – To facilitate attacks elsewhere

  • Academic research
  • DOE/NSF/NIH/DOD funded projects
slide-4
SLIDE 4

Common Security Goals

  • C.I.A. Triad:

– Confidentially: keep others from having access to your data without permission – Integrity: keep others from altering your data without permission – Availability: information should be accessible and modifiable in a timely fashion by those with permission to do so

slide-5
SLIDE 5

Types of Security

  • Physical Security
  • Computer Security
  • Network Security
slide-6
SLIDE 6

Vulnerabilities vs. Threats/Attacks

  • Vulnerabilities come from inside the system
  • Threats come from outside the system
  • A threat is blocked by the removal of a vulnerability
  • Vulnerabilities allow attacks to take place
  • An attack is an action to harm the system by

exploiting a vulnerability of the system

slide-7
SLIDE 7

4 Basic Types of Threats/Attacks

  • Eavesdropping
  • Alteration
  • Denial-of-Service (DoS)
  • Masquerading
slide-8
SLIDE 8

Eavesdropping

  • The interception of information/data intended for

someone else during its transmission

  • Doesn’t include modification
  • Examples:

– Packet sniffers: monitor nearby Internet traffic – Computer surveillance

slide-9
SLIDE 9

Alteration

  • Unauthorized modification of information
  • Examples:

– Computer viruses which modify critical system files – Man-in-the-middle (MitM) attack: information is modified and retransmitted along a network stream

slide-10
SLIDE 10

MitM Attack Example

https://www.veracode.com/security/man-middle-attack

slide-11
SLIDE 11

Denial-of-Service (DoS)

  • The interruption or degradation of a data service or

information access

  • Examples:
  • E-mail spam: to the degree that it is meant to slow

down an e-mail server

  • Denial-of-Service (DoS) attacks
  • Make a machine or network resource

unavailable to its intended users

  • Overwhelming a web server, bringing down a

website

  • Consume memory or CPU resources of a server
  • https://www.digitalattackmap.com
slide-12
SLIDE 12

Masquerading

  • The fabrication of information that is purported to be

from someone who is not the actual author

  • Examples:

– E-mail spam – Phishing for information that could be used for identify theft or other digital theft – Spoofing of IP addresses, websites, official communication

slide-13
SLIDE 13

Phishing

  • Phishing is a very common occurrence
  • Over 1.2 million unique e-mail campaigns in

2016, a 65% increase over 2015

  • Annual worldwide impact as high as $5 billion

(2014)

  • Can be used by a ransomware attack
  • https://www.youtube.com/watch?v=AHJzSuW

cpOc

slide-14
SLIDE 14

Specific Examples of Threats/Attacks

  • Heartbleed

– Vulnerability in the OpenSSL library used by majority of servers, especially web & mail servers, to secure communication & data channels – Discovered/disclosed in April 2014; vulnerability existed for around two years prior; close to 70% of web affected – Allowed hackers to be able to obtain usernames/passwords, encryption keys, and other sensitive information that was stored in the server’s memory – Affected a large majority of the CRC’s servers; All were patched shortly after disclosure – More info: https://heartbleed.com/

slide-15
SLIDE 15

Social Engineering

  • Techniques involving the use of human

insiders to circumvent computer security solutions

  • Social engineering attacks can be powerful!
  • Often the biggest vulnerability can be the

human being who is in charge of administrating the system

slide-16
SLIDE 16

Types of Social Engineering

  • Pretexting: creating a story that convinces an

administrator or operator into revealing info

  • Baiting: offering a kind of “gift” to get a user
  • r agent to perform an insecure action (i.e.

free stuff if you download some virus)

  • Quid pro quo (“something for something”):
  • ffering an action or service and then

expecting something in return

slide-17
SLIDE 17

Pretexting Example

slide-18
SLIDE 18

Social Engineering Example

  • “What is Your Password?”:

– https://www.youtube.com/watch?v=opRMrEfAIiI

  • “What’s Your Password?” (v2):

– https://www.youtube.com/watch?v=UzvPP6_LRH c

slide-19
SLIDE 19

Ransomware

  • Type of malicious software that blocks access

to the victim's data or threatens to publish or delete it until a ransom is paid (usually in Bitcoins).

  • Examples: CryptoLocker, WannaCry,

Petya/NotPetya

  • https://www.youtube.com/watch?v=d_dyi9C

Wieo

slide-20
SLIDE 20

Well-Known Services/Ports

  • SSH (Secure Shell)

– Port 22 over TCP – Used to administer a machine remotely – Also used by SCP (Secure Copy) and SFTP

  • HTTP/HTTPS (Web)

– Port 80 over TCP (HTTP, Unencrypted) – Port 443 over TCP (HTTPS, Encrypted)

  • FTP/SFTP (File Transfer Protocol)

– Port 21 over TCP (FTP, Unencrypted) – Port 115 over TCP (SFTP, Encrypted)

slide-21
SLIDE 21

Defending Against Attacks

  • Firewalls

– Can help protect a network by filtering incoming

  • r outgoing network traffic based on a predefined

set of rules, called firewall policies – Policies are based on properties of the packets being transmitted, such as:

  • The protocol being used, such as TCP or UDP
  • The source and destination IP addresses and ports
  • The payload of the packet being transmitted
slide-22
SLIDE 22

Defending Against Attacks (cont.)

  • Use of secure, hard-to-guess passwords

– Combination of upper-case, lower-case, numbers, and special characters (&, ^, !, ., *, @, etc.) – Do NOT use dictionary words or phrases! – Should be at least 10 characters in length (if not longer!) – Don’t re-use passwords for multiple services/sites – Use a password manager (LastPass, 1Password, etc.)

slide-23
SLIDE 23

https://xkcd.com/936/

slide-24
SLIDE 24

Defending Against Attacks (cont.)

  • Employ Access Control Lists (ACLs)

– Restrict access to only those who need access

  • Keep systems/devices patched with the latest

security updates (Important!)

  • Use secure communication channels

– HTTPS à Use HTTPS Everywhere!

  • https://www.eff.org/HTTPS-everywhere
  • Use an Ad Blocker (uBlock Origin, Adblock

Plus, etc.)

slide-25
SLIDE 25

What Does the CRC Do?

  • Physical security: Union Station
  • Firewalls: OIT Border Firewall, iptables on

individual machines

  • Vulnerability Scanning
  • Secure passwords; limited “root” access
  • Use of Access Control Lists (ACLs)
  • Apply security updates & fix vulnerabilities
  • DenyHosts: block known bad host IPs
slide-26
SLIDE 26

Vulnerability Scanning

  • Nessus Professional Vulnerability Scanner
  • Scans for vulnerabilities on our systems
  • Find and patch vulnerabilities before they can

get exploited

  • Weekly scans of our public network

infrastructure

slide-27
SLIDE 27

Real Life Example

  • “Stuxnet: Anatomy of a Computer Virus”:

– https://vimeo.com/25118844 (2011)

  • Zero Days (documentary):

– http://www.zerodaysfilm.com/ – http://www.imdb.com/title/tt5446858/

slide-28
SLIDE 28

Real Life Example

  • “Hackers Remotely Kill a Jeep on the Highway—

With Me in It”: – https://www.youtube.com/watch?v=MK0SrxBC1x s (2015) – https://blog.kaspersky.com/blackhat-jeep- cherokee-hack-explained/9493/

slide-29
SLIDE 29

Real Life Example

  • “Hacking a "Smart" Sniper Rifle | Security”:

– https://www.youtube.com/watch?v=BJPCYdjrNWs (2015)

slide-30
SLIDE 30

Questions?