Personal Security in the Cloud – The Basics Dr. Eugene W.P.
Transcription
Personal Security in the Cloud – The Basics Dr. Eugene W.P.
Personal Security in the Cloud – The Basics Dr. Eugene W.P. Bingue U. S. Navy [email protected] Dr. David A. Cook Stephen F. Austin State University [email protected] 1 Caveat Emptor [Latin: Let the buyer beware.] Quidquid latine dictum sit, altum sonatur. [Latin: Whatever is said in Latin sounds profound.] Questions: How can we protect our sensitive and personal information in the cloud? How much has the philosophy of commercial best practice taken over from the basics of military science and doctrine? Commercial Best Practices are aimed at cost savings – but do these practices endanger DOD-specific goals such as security? The goal of this talk is to discuss how to intelligently use best practices in the DOD. This presentation will provide with ideas, tools and methods to help protect your assets in the cloud. It might even help you 2 sleep better at night. Personal Security in the Cloud CIA Triad Personal Security in the Cloud 3 Source – Unclassified IA Insecurities, Technical Security Solution Center,Diane Strohmer, http://info.publicintelligence.net/NSA-COMSEC-SecurityIncidents.pdf Personal Security in the Cloud 4 What you DO know • Many (most?) vendors add a layer of encryption to their services. How good is it? Do you trust it? • Do you EVER use cloud services at locations that are insecure? Coffee Shops? Airports? • Are you accessing cloud services automatically and “on the fly?” • You probably need to add an additional layer to protect your most sensitive data. Personal Security in the Cloud 5 Any DOD use of the Cloud must be measured again the CIA triad! Personal Security in the Cloud 6 The Cloud is a HUGE security gap! • Cloud services are frequently transparent and automatic. • Cloud access exacerbate security – which is already problematic. Personal Security in the Cloud 7 Personal Security in the Cloud Securing Your ‘Data at Rest’ in the Cloud Personal Security in the Cloud 8 Personal Security in the Cloud 9 Personal Security in the Cloud Basic Common Sense Harris interactive poll (commissioned by Dashlane) found: We make it EASY for hackers! Majority engage in activities that place personal online information at risk • 69% reuse password more then one site • 50% of these do not regularly change password • 36% of these store Personal Information - such as credit cards or tax information - on websites for convenience • 72% of all users are worried about data compromise, yet 64% of these same people also store Personal Information online. Personal Security in the Cloud 10 Personal Security in the Cloud The Basics • • • • • • Strong and unique passwords for every site Avoid storing passwords in your browser Employ a safe password manager Do not open important accounts on open WiFi Verify that email links are to legitimate sites Be very wary of storing credit cards or personal data on websites • Have backups in case of cloud failure • Change passwords as soon as you suspect a security breach Personal Security in the Cloud 11 Personal Security in the Cloud How to Choose a Secure Password 1. Use length to your advantage 2. Form a "random" sequence of words and/or letters 3. Add numbers to the base-word to make it more secure 4. Use punctuation and symbols to "complicate" it further 5. Create complexity with upper and lowercase letters 6. Generate similar but altered passwords Example: “LiveLongAndProsper, L1veaNDPr0s#p$ ” Personal Security in the Cloud 12 Personal Security in the Cloud Unfortunately, we’re not going to change human nature. What can we do? Before we start – one critical point. Some cloud providers MOVE the data to the cloud. Some COPY it. Know which type you are using. Prepare accordingly! The Buck stops with you! Personal Security in the Cloud 13 Personal Security in the Cloud File Sharing Cloud Services File sharing tools/services are easy to use, transparent, and provide some free services. Some currently-used popular services are: • Dropbox, • Google Drive • Live Mesh, • SkyDrive • Box.net • …and the list goes on Personal Security in the Cloud 14 Personal Security in the Cloud The Basics Well, why don’t I encrypt everything on my hard drive? Encrypting a hard drive can make it much more difficult – if not impossible – to recover data if something goes wrong with the hard drive. So, if you must encrypt, make sure you are covered with multiple backups. Personal Security in the Cloud This is a “Danger, Danger Will Robinson” moment! 15 Personal Security in the Cloud File & Folder Encryption Are there some publicly available tools I can use to encrypt just the critical files and folders I use? How good are they? TrueCrypt AxCrypt AES Crypt • We are NOT selling any of these – they are simply examples of publicly available free encryption programs available. • We are NOT recommending any of these tools – we are simply using these tools to demonstrate security services available. • This is NOT an exhaustive list – just three programs we are familiar with. Personal Security in the Cloud 16 Personal Security in the Cloud TrueCrypt http://www.truecrypt.org/ Features: • Creates a virtual encrypted disk within a file and mounts it as a disk. • Encrypts an entire partition or storage device such as USB flash drive or hard drive. • Encrypts a partition or drive where OS is installed (pre-boot authentication). • Encryption is automatic, real-time (on-the-fly) and transparent. • Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. • Encryption can be hardware-accelerated on modern processors. • Provides plausible deniability, in case an adversary forces you to reveal the password. • Hidden volume (steganography) and hidden operating system. • Runs on Windows, Mac, Linux. Vaults are transferable among OS. Personal Security in the Cloud 17 Types of Encryption supported Personal Security in the Cloud 18 Personal Security in the Cloud AxCrypt http://www.axantum.com/axcrypt/ Features • Password Protect any number of files using strong encryption. • Seamlessly integrates with Windows – single and double clicks encrypt and decrypt • Self-decrypting files are also supported, removing the need to install AxCrypt to decrypt. • AES 128-bit encryption Personal Security in the Cloud 19 Personal Security in the Cloud 101 AES Crypt http://www.aescrypt.com/ Features: • AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files. • Supports: Windows, Mac, and Android (Crypt4All) • AES 256-bit Personal Security in the Cloud 20 Personal Security in the Cloud • I’ve used RSA and PGP – with 4,096 bit keys. Isn’t a 256 bit key pretty small? • NO – AES is “different” – adding a bit does not double the possible key-size, it squares it. Cracking is exponential in key size. NOTE: These are not from a product web site. This is from an article on AES key encryption. Personal Security in the Cloud 21 • Even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years). If one were to assume that a computing system existed that could recover a DES key in a second, it would still take that same machine approximately 149 trillion years to crack a 128-bit AES key. • The following snippet is a snapshot of a technical paper titled "128bit versus 256-bit AES encryption" to explain why AES is sufficient to meet future needs. Personal Security in the Cloud 22 AES – safe for the predictable future • Unless new technology comes along (quantum computing?) – Moore’s law will not overcome AES encryption for billions of years. • In the end, AES has never been cracked yet and is safe against any brute force attacks contrary to belief and arguments. Personal Security in the Cloud 23 What is needed next? • Several of the example services we have used as examples are free and open source. • Some of the examples are for encrypting LARGE datasets (as an encrypted volume). This might not be suitable unless you have lots of small volumes. And – some applications do not let the volume grow. • Are we recommending anything? NO! • What is needed is more research, and some standardization. Perhaps “vision”. • Before we can recommend any integration of this technology into DOD, we highly recommend that code Verification and Validation be performed. 24 Personal Security in the Cloud Overall Summary • Human issues are the root cause of most security problems. Cloud Computing is just another way that we “talk the talk, but don’t walk the walk”. • Good basic security (common sense, good password practices, etc.) are the best defense. • Policies and Procedures need to be updated to encompass Cloud Computing issues. Personal Security in the Cloud 25 Two alternative approaches Personal Security in the Cloud 26 Personal Security in the Cloud Questions? Personal Security in the Cloud 27 Personal Security in the Cloud References http://venturebeat.com/2012/09/17/2012-security-breaches/ http://lightsquare.us/ http://lifehacker.com/391555/best-free-ways-to-protect-your-private-files http://www.aescrypt.com/, http://www.truecrypt.org/ http://www.yousendit.com/solutions/file-transfer/secure-file-transfer http://www.perspecsys.com/resources/what-is-cloud-dataencryption/?pi_ad_id=18542931608&gclid=CJGd-qj70LUCFWbZQgodjyAA6Q http://security.stackexchange.com/questions/25375/why-not-use-larger-cipherkeys http://www.drdobbs.com/open-source/beware-open-sourceencryption/220800130?queryText=beware%2Bof%2Bopen%2Bsource%2Bencrypti on http://www.eetimes.com/design/embedded-internet-design/4372428/Howsecure-is-AES-against-brute-force-attacks http://www.axantum.com/axcrypt/ Personal Security in the Cloud 28