computer security
play

Computer Security Summer Scholars 2018 Matt Vander Werf HPC System - PowerPoint PPT Presentation

Computer Security Summer Scholars 2018 Matt Vander Werf HPC System Administrator Security in HPC HPC is especially a target for hackers and malicious acts Why? Security in HPC Prestige Computing resources Financial Gain


  1. Computer Security Summer Scholars 2018 Matt Vander Werf HPC System Administrator

  2. Security in HPC • HPC is especially a target for hackers and malicious acts Why?

  3. Security in HPC • Prestige • Computing resources – Financial Gain – Break encryption – To facilitate attacks elsewhere • Academic research • DOE/NSF/NIH/DOD funded projects

  4. Common Security Goals • C.I.A. Triad: – Confidentially: keep others from having access to your data without permission – Integrity: keep others from altering your data without permission – Availability: information should be accessible and modifiable in a timely fashion by those with permission to do so

  5. Types of Security • Physical Security • Computer Security • Network Security

  6. Vulnerabilities vs. Threats/Attacks • Vulnerabilities come from inside the system • Threats come from outside the system • A threat is blocked by the removal of a vulnerability • Vulnerabilities allow attacks to take place • An attack is an action to harm the system by exploiting a vulnerability of the system

  7. 4 Basic Types of Threats/Attacks • Eavesdropping • Alteration • Denial-of-Service (DoS) • Masquerading

  8. Eavesdropping • The interception of information/data intended for someone else during its transmission • Doesn’t include modification • Examples: – Packet sniffers: monitor nearby Internet traffic – Computer surveillance

  9. Alteration • Unauthorized modification of information • Examples: – Computer viruses which modify critical system files – Man-in-the-middle (MitM) attack: information is modified and retransmitted along a network stream

  10. MitM Attack Example https://www.veracode.com/security/man-middle-attack

  11. Denial-of-Service (DoS) • The interruption or degradation of a data service or information access • Examples: - E-mail spam: to the degree that it is meant to slow down an e-mail server - Denial-of-Service (DoS) attacks • Make a machine or network resource unavailable to its intended users • Overwhelming a web server, bringing down a website • Consume memory or CPU resources of a server • https://www.digitalattackmap.com

  12. Masquerading • The fabrication of information that is purported to be from someone who is not the actual author • Examples: – E-mail spam – Phishing for information that could be used for identify theft or other digital theft – Spoofing of IP addresses, websites, official communication

  13. Phishing • Phishing is a very common occurrence • Over 1.2 million unique e-mail campaigns in 2016, a 65% increase over 2015 • Annual worldwide impact as high as $5 billion (2014) • Can be used by a ransomware attack • https://www.youtube.com/watch?v=AHJzSuW cpOc

  14. Specific Examples of Threats/Attacks • Heartbleed – Vulnerability in the OpenSSL library used by majority of servers, especially web & mail servers, to secure communication & data channels – Discovered/disclosed in April 2014; vulnerability existed for around two years prior; close to 70% of web affected – Allowed hackers to be able to obtain usernames/passwords, encryption keys, and other sensitive information that was stored in the server’s memory – Affected a large majority of the CRC’s servers; All were patched shortly after disclosure – More info: https://heartbleed.com/

  15. Social Engineering • Techniques involving the use of human insiders to circumvent computer security solutions • Social engineering attacks can be powerful! • Often the biggest vulnerability can be the human being who is in charge of administrating the system

  16. Types of Social Engineering • Pretexting: creating a story that convinces an administrator or operator into revealing info • Baiting: offering a kind of “gift” to get a user or agent to perform an insecure action (i.e. free stuff if you download some virus) • Quid pro quo (“something for something”): offering an action or service and then expecting something in return

  17. Pretexting Example

  18. Social Engineering Example • “What is Your Password?”: – https://www.youtube.com/watch?v=opRMrEfAIiI • “What’s Your Password?” (v2): – https://www.youtube.com/watch?v=UzvPP6_LRH c

  19. Ransomware • Type of malicious software that blocks access to the victim's data or threatens to publish or delete it until a ransom is paid (usually in Bitcoins). • Examples: CryptoLocker, WannaCry, Petya/NotPetya • https://www.youtube.com/watch?v=d_dyi9C Wieo

  20. Well-Known Services/Ports • SSH (Secure Shell) – Port 22 over TCP – Used to administer a machine remotely – Also used by SCP (Secure Copy) and SFTP • HTTP/HTTPS (Web) – Port 80 over TCP (HTTP, Unencrypted) – Port 443 over TCP (HTTPS, Encrypted) • FTP/SFTP (File Transfer Protocol) – Port 21 over TCP (FTP, Unencrypted) – Port 115 over TCP (SFTP, Encrypted)

  21. Defending Against Attacks • Firewalls – Can help protect a network by filtering incoming or outgoing network traffic based on a predefined set of rules, called firewall policies – Policies are based on properties of the packets being transmitted, such as: • The protocol being used, such as TCP or UDP • The source and destination IP addresses and ports • The payload of the packet being transmitted

  22. Defending Against Attacks (cont.) • Use of secure, hard-to-guess passwords – Combination of upper-case, lower-case, numbers, and special characters (&, ^, !, ., *, @, etc.) – Do NOT use dictionary words or phrases! – Should be at least 10 characters in length (if not longer!) – Don’t re-use passwords for multiple services/sites – Use a password manager (LastPass, 1Password, etc.)

  23. https://xkcd.com/936/

  24. Defending Against Attacks (cont.) • Employ Access Control Lists (ACLs) – Restrict access to only those who need access • Keep systems/devices patched with the latest security updates ( Important! ) • Use secure communication channels – HTTPS à Use HTTPS Everywhere! • https://www.eff.org/HTTPS-everywhere • Use an Ad Blocker (uBlock Origin, Adblock Plus, etc.)

  25. What Does the CRC Do? • Physical security: Union Station • Firewalls: OIT Border Firewall, iptables on individual machines • Vulnerability Scanning • Secure passwords; limited “root” access • Use of Access Control Lists (ACLs) • Apply security updates & fix vulnerabilities • DenyHosts: block known bad host IPs

  26. Vulnerability Scanning • Nessus Professional Vulnerability Scanner • Scans for vulnerabilities on our systems • Find and patch vulnerabilities before they can get exploited • Weekly scans of our public network infrastructure

  27. Real Life Example • “Stuxnet: Anatomy of a Computer Virus” : – https://vimeo.com/25118844 (2011) • Zero Days (documentary): – http://www.zerodaysfilm.com/ – http://www.imdb.com/title/tt5446858/

  28. Real Life Example • “Hackers Remotely Kill a Jeep on the Highway— With Me in It”: – https://www.youtube.com/watch?v=MK0SrxBC1x s (2015) – https://blog.kaspersky.com/blackhat-jeep- cherokee-hack-explained/9493/

  29. Real Life Example • “Hacking a "Smart" Sniper Rifle | Security”: – https://www.youtube.com/watch?v=BJPCYdjrNWs (2015)

  30. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend