Computer Security Summer Scholars 2016 Ma7 Vander Werf HPC System - - PowerPoint PPT Presentation

computer security
SMART_READER_LITE
LIVE PREVIEW

Computer Security Summer Scholars 2016 Ma7 Vander Werf HPC System - - PowerPoint PPT Presentation

Computer Security Summer Scholars 2016 Ma7 Vander Werf HPC System Administrator Security in HPC HPC is especially a target for hackers and malicious acts Why? Security in HPC PresCge CompuCng resources Financial Gain Break


slide-1
SLIDE 1

Computer Security

Summer Scholars 2016 Ma7 Vander Werf HPC System Administrator

slide-2
SLIDE 2

Security in HPC

  • HPC is especially a target for hackers and

malicious acts

Why?

slide-3
SLIDE 3

Security in HPC

  • PresCge
  • CompuCng resources

– Financial Gain – Break encrypCon – To facilitate a7acks elsewhere

  • Academic research
  • DOE/NIH/DOD funded projects
slide-4
SLIDE 4

Common Security Goals

  • C.I.A. Triad:

– ConfidenCally: keep others from having access to your data without permission – Integrity: keep others from altering your data without permission – Availability: informaCon should be accessible and modifiable in a Cmely fashion by those with permission to do so

slide-5
SLIDE 5

Types of Security

  • Physical Security
  • Computer Security
  • Network Security
slide-6
SLIDE 6

VulnerabiliCes vs. Threats/A7acks

  • Vulnerabili*es come from inside the system
  • Threats come from outside the system
  • A threat is blocked by the removal of a vulnerability
  • Vulnerabili*es allow a2acks to take place
  • An a2ack is an acCon to harm the system by

exploiCng a vulnerability of the system

slide-7
SLIDE 7

4 Basic Types of Threats/A7acks

  • Eavesdropping
  • AlteraCon
  • Denial-of-Service (DoS)
  • Masquerading
slide-8
SLIDE 8

Eavesdropping

  • The intercep*on of informaCon/data intended for

someone else during its transmission

  • Doesn’t include modificaCon
  • Examples:

– Packet sniffers: monitor nearby Internet traffic – Computer surveillance

slide-9
SLIDE 9

AlteraCon

  • Unauthorized modifica*on of informaCon
  • Examples:

– Computer viruses which modify criCcal system files – Man-in-the-middle (MitM) a7ack: informaCon is modified and retransmi7ed along a network stream

slide-10
SLIDE 10

MitM A7ack Example

h7ps://www.veracode.com/security/man-middle-a7ack

slide-11
SLIDE 11

Denial-of-Service (DoS)

  • The interrupCon or degradaCon of a data service or

informaCon access

  • Examples:
  • E-mail spam: to the degree that it is meant to slow

down an e-mail server

  • Denial-of-Service (DoS) a7acks
  • Make a machine or network resource

unavailable to its intended users

  • Overwhelming a web server, bringing down a

website

  • Consume memory or CPU resources of a server
slide-12
SLIDE 12

Masquerading

  • The fabricaCon of informaCon that is purported to

be from someone who is not the actual author

  • Examples:

– E-mail spam – Phishing for informaCon that could be used for idenCfy thea or other digital thea – Spoofing of IP addresses, websites, official communicaCon

12

slide-13
SLIDE 13

Specific Examples of Threats/A7acks

  • Heartbleed

– Vulnerability in the OpenSSL library used by majority of servers, especially web & mail servers, to secure communicaCon & data channels – Discovered/disclosed in April 2014; vulnerability existed for around two years prior; close to 70% of web affected – Allowed hackers to be able to obtain usernames/passwords, encrypCon keys, and other sensiCve informaCon that was stored in the server’s memory – Affected a large majority of the CRC’s servers; All were patched shortly aaer disclosure – More info: h7ps://heartbleed.com/

slide-14
SLIDE 14

Social Engineering

  • Techniques involving the use of human

insiders to circumvent computer security soluCons

  • Social engineering a7acks can be powerful!
  • Oaen the biggest vulnerability can be the

human being who is in charge of administraCng the system

slide-15
SLIDE 15

Types of Social Engineering

  • PretexCng: creaCng a story that convinces an

administrator or operator into revealing info

  • BaiCng: offering a kind of “gia” to get a user
  • r agent to perform an insecure acCon (i.e.

free stuff if you download some virus)

  • Quid pro quo (“something for something”):
  • ffering an acCon or service and then

expecCng something in return

slide-16
SLIDE 16

PretexCng Example

slide-17
SLIDE 17

Well-Known Services/Ports

  • SSH (Secure Shell)

– Port 22 over TCP – Used to administer a machine remotely – Also used by SCP (Secure Copy) and SFTP

  • HTTP/HTTPS (Web)

– Port 80 over TCP (HTTP, Unencrypted) – Port 443 over TCP (HTTPS, Encrypted)

  • FTP/SFTP (File Transfer Protocol)

– Port 21 over TCP (FTP, Unencrypted) – Port 115 over TCP (SFTP, Encrypted)

slide-18
SLIDE 18

Defending Against A7acks

  • Firewalls

– Can help protect a network by filtering incoming

  • r outgoing network traffic based on a predefined

set of rules, called firewall policies – Policies are based on properCes of the packets being transmi7ed, such as:

  • The protocol being used, such as TCP or UDP
  • The source and desCnaCon IP addresses and ports
  • The payload of the packet being transmi7ed
slide-19
SLIDE 19

Defending Against A7acks (cont.)

  • Use of secure, hard-to-guess passwords

– CombinaCon of upper-case, lower-case, numbers, and special characters (&, ^, !, ., *, @, etc.) – Do NOT use dicConary words! – Should be at least 8 characters in length (if not longer) – Don’t re-use passwords for mulCple services/sites – Use a password manager (LastPass, 1Password, etc.)

slide-20
SLIDE 20

h7ps://xkcd.com/936/

slide-21
SLIDE 21

Defending Against A7acks (cont.)

  • Employ Access Control Lists (ACLs)

– Restrict access to only those who need access

  • Keep systems/devices patched with the latest

security updates (Important!)

  • Use secure communicaCon channels

– HTTPS à Use HTTPS Everywhere!

  • h7ps://www.eff.org/HTTPS-everywhere
slide-22
SLIDE 22

What Does the CRC Do?

  • Physical security: Union StaCon
  • Firewalls: OIT Border Firewall, iptables on

individual machines

  • Vulnerability Scanning
  • Secure passwords; limited “root” access
  • Use of Access Control Lists (ACLs)
  • Apply security updates & fix vulnerabiliCes
  • DenyHosts: block known bad host IPs
slide-23
SLIDE 23

Vulnerability Scanning

  • QualysGuard Vulnerability Management

h7ps://www.qualys.com

  • Scans for vulnerabiliCes on our machines
  • Find and patch vulnerabiliCes before they can

get exploited

  • Weekly scans of our public network

infrastructure

slide-24
SLIDE 24

Real Life Example

  • “Stuxnet: Anatomy of a Computer Virus”:

– h7ps://vimeo.com/25118844

slide-25
SLIDE 25

QuesCons?