Security for Home Computing Topics to Cover

Transcription

Security for Home Computing Topics to Cover
Security for Home Computing
Topics to Cover
The best way(s) to connect one or more
home computers to the Internet
Wired vs. Wireless networking
The types of threats that exist today and
how to reduce your vulnerability
1
Connecting to the Internet
Today’s most common options
–
Dial-up
Analog or Digital
–
–
–
–
DSL
Cable
Satellite
Wireless
Dial-up Connections
Analog - POTS
Digital - ISDN
Circuit Switched Technologies
Connection As Needed Only
Dial-up Connection Is Most Economical to
Provide Access for Infrequent Use
2
Analog - POTS
Plain Old Telephone System
Refers to the Analog Phone System We’ve Used
for Years
Analog Connection through POTS Supported by
Use of Modems at Each End
Modems
Stands for MOdulator / DEModulator
Modulation Is the Conversion of Digital
Information Into an Analog Signal
Demodulation Is the Conversion of the
Analog Signal Back Into Digital
Information
3
Standards for Modems
Some of the ITU (formerly CCITT) Modem Standards :
standard
V.21
V.22
V.22 bis
V.23
V.26
V.26 bis
V.26 ter
V.27
V.27 bis
V.27 ter
V.29
V.32
V.32 bis
V.32 ter
V.34 (V.fast)
V.34 modified
V.90
Encoding
V.92
FDM
EC
date
ratified
1964
1980
1984
1964
1968
1972
1984
1972
1976
1976
1976
1984
1991
1992
1994
1996
1998
speed
in bps
200
1200
2400
1200
2400
2400
2400
4800
4800
4800
9600
9600
14400
19200
28800
33600
56000
HDX/FDX
FDX(FDM)
FDX(FDM)
FDX(FDM)
HDX
HDX
HDX
FDX(EC)
HDX
HDX
HDX
HDX
FDX(EC)
PSTN/
private
PSTN
PSTN
PSTN
PSTN
Private
PSTN
PSTN
Private
Private
PSTN
Private
PSTN
modulation
FSK
PSK
QAM
FSK
PSK
PSK
PSK
PSK
PSK
PSK
QAM
QAM
TCM
TCM
TCM
TCM
Digital
2000
56000
(moves upload from 33.6 to 48, adds Internet call waiting)
means Frequency Division Multiplexing
means Echo Canceling
Analog Connectivity
Does Not Scale
Limited to 53.3 kbps in USA
Suitable for Text and E-mail
Slow for Graphic Intensive Downloads
Most Inexpensive Connection Solution
Slowest Connection Solution
Suitable Only for Home or Small Office
4
Digital - ISDN
Developed for Digital Transmission of
Integrated Voice and Data Over Existing
Telephone Lines
Sets up Call Faster Than Analog Telephone
Service
Much More Common in Europe
Usually not Cost Effective in USA
DSL
Multiple Variations (xDSL) Available
–
ADSL, SDSL, HDSL, RADSL, and VDSL
Becoming Very Popular
Many Believe It Will Replace Dial Up Soon
Supports Voice & Data Over Existing Phone
Wiring
FCC Ruling Recently May Soon Change
Available Choices
5
Digital Subscriber Line (DSL)
DSL Can Be a Pair of Boxes on Each End of a Copper
Wire Pair
DSL Converts Ordinary Phone Lines Into High-speed Data
Conduits
Like Dial, Cable, Wireless, and T1, DSL by Itself Is a
Transmission Technology
Service Is Limited to Certain Geographical Areas
Central
Office
End User
DSL
Ethernet
DSL
“Modem”
Copper Loop
DSL
“Modem”
Server
ADSL Service
An Always-On Service Commonly Sold to
Consumers for Home Internet Access
Utilizes Existing Phone Wiring
Carries Both Voice Phone Service and Data
Usually Billed Monthly Flat-Rate
Rates Vary Greatly by Region and Speed of
Service
Requires Box in the Home to Split Out Data and
Voice
6
ADSL Service
Local Phone Service Must Support Service
–
–
DSLAM Splits Out Voice and Data on Carrier Side
DSLAM Usually Located in CO
Typical Home Offering is 1.5 Mbps Download
and 640 Kbps upload
–
Maximum Range for This Speed Is 18000 Feet
DSL Box
DATA
Splitter
VOICE
DATA
DSLAM
Router
VOICE
Phone Switch
Your Home
Provider CO
Cable “Modem” Service
Utilizes One 6Mhz Cable Channel
Can Support Up to 30 or 40 Mbps of Data
–
Upload and Download Rates May Be Restricted by
Cable Provider
Bandwidth is Shared
–
–
All Devices Connected to
Same Cable Head-End
Up to 2000 Typically
7
Cable Standards
DVB/DAVIC
–
Based on Fixed Cells Like ATM
MCNS/DOCSIS
–
–
–
De Facto US “Standard”
European Version Becoming Popular
Not Accepted by Any Standards Body
IEEE 802.14
–
Not Yet Widely Supported by Cable Companies or
Equipment Manufacturers
aDSL vs. Cable
aDSL Uses Separate
Circuit for Each Service
Max 8 or 9 Mbps
Download Speed (Usually
Limited to 1.5 Mbps for
Residential)
Deregulation Allows
Multiple Vendors
Uses Existing Telephone
Distribution System with
Distance Limitation
Cable Service is Shared
within a Neighborhood
Max 30 Mbps Download
Speed (Usually Limited
for Residential)
Current Regulations Mean
Single Vendor
Uses Existing Cable TV
Distribution System
8
Satellite Connection
Usually Most Expensive Solution
Often “Last Resort” When DSL and Cable
Are Not Available
Available Anywhere – No Limitations
Wireless Metro Area Network
IEEE 802.16a Standard Approved January
2003
Also Known as Wi-Max
Range Up to 20 Km (~12.4 Miles)
May Require Licensed Provider
Not Yet Widely Available
Pricing Should Be Competitive
9
Multiple Home PCs
“Windows Home Networking” Allows
Multiple Networked Home PCs to Share
One Dial-up Connection
Home “Routers” Allow Multiple Home
PCs to Share One Cable or DSL Connection
–
–
These Boxes Provide Many Other Useful
Functions (Firewall, NAT, Switch, etc.)
Strongly Recommended For All Cable or DSL
Wired vs. Wireless
Home Wiring Often
Very Complex
Very Inexpensive
Standard 10/100/1000
Mb Connections
Good Security by
Default
Home Wireless Easy
to Install
Low Cost Standard
11/54 Mb, Proprietary
108 Mb Connections
Fair Security by
Default, Requires
More User Setup
10
Wiring Your Home
Materials Cost About $5-10 per Room
Labor Is the Major Problem
Can Take Shortcuts
–
–
–
–
No IDFs
No Patch Panel
Just Run Cables
No Jacks
Wireless In Your Home
Standards – 802.11a, 802.11b, 802.11g
Security Never On By Default
New Standards (June 2004) Support Good
Security
Older Wireless May Be Upgradeable
11
Home Routers
Strongly Recommended
Wired Only or Wireless Support
Newest Versions Include “Stateful” or
“Second Generation” Firewalls
Functions In Home Routers
Four Port 10/100 Mb Ethernet Switch
May Also Have Wireless Support
Network Address Translation (NAT)
Router
Firewall
12
What Are the Threats?
Malware
–
–
–
–
–
Spyware
Virus, Worm, Trojan Horse
Unauthorized Access or Intercepted Transmission
Denial of Service, Distributed DoS
Buffer Overflow, CGI Exploit
Impersonation
Social Engineering
Lack of User Support
What is Malware?
Malicious Software
Software that installs or runs on your computer
without your knowledge or your permission.
Software that degrades or disrupts the
performance of your network without your
knowledge or permission
Software that captures your data transmissions
without your knowledge or permission
13
Malware Problems
Microsoft Says Malware Caused More Than a
Third of All Windows XP Crashes In Early 2004
80% of All Consumer PCs Have Some Malware
Installed (source: IDC and TruSecure)
No One Anti-Malware Program Available Today
Can Detect/Stop All Types of Malware
Some Vendors Offer Product “Suites” or
Collections of the Various Programs Needed
What is Spyware?
Microsoft describes spyware as “software that
performs tasks on your computer without your
consent”
A sub-category of malware that includes:
–
–
–
–
Adware – presents ads in browsers or other applications
Trackers – logs web sites that are visited
Key Loggers – records every key stroke that is made
E-mail Harvesters – gathers e-mail addresses from an
address book or other files on the computer
14
Virus or Worm
Similar in nature
Virus relies on execution of another
program to activate it or to spread it
Worm is capable of activating itself
and spreading itself, but may use
other programs or files in the process
Either can be harmless or destructive
Trojan Horse
Either a hidden program or a hidden
function within a program
May appear to have a useful function
May accompany web downloads
May come as e-mail attachment
Effects may be obvious or subtle
15
Data Theft
Unauthorized access to systems or network
Transmitted data is intercepted or rerouted
Impersonation of a valid user
Impersonation of a valid resource or web site
May capture accounts, passwords, or data itself
Phishing and Pharming
Fastest growing security threats
Phishing baits you with e-mail to lure personal information
from you
Phishing attacks in second half of 2004
–
–
260% increase over first half of 2004*
370% increase over second half of 2003*
Pharming is successor to phishing
Pharming based on Domain Spoofing
–
–
–
Often done with DNS poisoning
Redirects your browser to fake web sites despite your best efforts
Increased use of Digital Certificates may be only recourse
*Source: Symantec Security Team
16
Recent Pharming Attacks
Early March 2005
–
–
–
At least 1,300 Internet Domains were redirected
Over 900 unique Internet addresses were redirected
Over 75,000 e-mail messages were redirected
April 1, 2005
–
–
New round of attacks on DNS .com servers
Used DNS cache poisoning
Hacker gains control of one DNS server and installs false info
Uses DNS vulnerability to pass phony info to other DNS
servers
Denial of Service
Overloading a device to prevent normal data flow
Distributed Denial of Service (DDoS)
–
simultaneous attack from multiple sources
Various types
–
–
–
–
–
–
–
SYN Flood – Lots of SYN packets, but no ACK
Ping Flood – Continuous Large Pings
Land Attack – Spoofed SYN to crash system
Smurf Attack – Spoofed Ping, unrequested replies
IP Spoofing – SYN attack with spoofed address
Ping of Death – Oversized ping request
Teardrop – False header fragment information
17
Is Your PC a Bot?
Crackers Use Trojans or Other Attacks to
Install Hidden Programs on Your PC
These Hidden Programs Allow Them to
Control Your PC Remotely
Your PC Becomes One of the Robots In
Their Army For DDoS Attacks or Simply a
Point to Confuse Forensics
System Exploits
Buffer Overflow
–
Often exploits discovered weakness in OS
Remote Procedure Call (RPC) Exploit
Common Gateway Interface (CGI) Exploit
Often used to imbed programs or
open back doors to systems
18
Social Engineering
Low-tech method of cracking
network security
Using other people to obtain what
should be secure information,
accounts, or passwords
Using false pretenses to get secure
information, accounts, or passwords from
people
Lack of User Support
Users with simple passwords
Users with passwords posted at their desk
Unattended, logged on systems
Unrestrained downloading of “free”
software
PASS
WORD
19
What Are The Defenses?
Firewalls to block attacks and Detect
Presence of Some Malware
Anti-Virus Software to Stop Incoming
Viruses and Trojans
Anti-Spyware to Detect and
Remove Spyware and Adware
Security patches & updates to
patch vulnerabilities
Firewalls
Each PC Should Run a Software Firewall
Hardware Firewall Also Strongly
Recommended for Home with Multiple PCs
20
No System Is Totally Secure
No One Product Can Do It All
Use Multiple Products
Product Suites Available from Some
Vendors
Even If You Have All Defenses In Place,
You May Still be Attacked
Backup, Backup, Backup!!!
Happy Web Surfing!
21
Web Resources
Anti-Virus, Firewalls, and Other Security Products
–
–
–
–
–
–
–
–
–
–
–
–
–
–
http://store.ca.com
http://www.centralcommand.com/
http://www.free-av.com/
http://www.grisoft.com/us/us_index.php
http://www.kaspersky.com/
http://us.mcafee.com/virusInfo/default.asp
http://www.pandasoftware.com/
http://www.sophos.com/
http://securityresponse.symantec.com/
http://www.trendmicro.com/
http://www.blackice.com
http://www.checkpoint.com/
http://www.pcviper.com
http://www.zonelabs.com/
Web Resources
Anti-Spyware, Anti-Adware Products
–
–
–
–
–
–
–
–
–
–
–
–
CA Pest Patrol
FBM ZeroSpyware
Lavasoft Ad-aware SE
McAfee AntiSpyware
Microsoft AntiSpyware
PC Tools Spyware Doctor
Spybot Search & Destroy
Sunbelt CounterSpy
Tenebril SpyCatcher
TrendMicro AntiSpyware (formerly Spy Subtract)
Webroot Spy Sweeper
XBlock X-Cleaner
22