What Is Vulnerability Assessment? Chapter 23. vulnerability In computer security, the term vulnerability is applied to a weakness in a system that allows.

Slides:



Advertisements
Similar presentations
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 12 Network Security.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Introducing Computer and Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security and Penetration Testing
Controls for Information Security
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Department Of Computer Engineering
Introduction to Network Defense
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
SEC835 Database and Web application security Information Security Architecture.
Computer Crime and Information Technology Security
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Information Systems Security Computer System Life Cycle Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Software Security Testing Vinay Srinivasan cell:
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IS Network and Telecommunications Risks Chapter Six.
CSCE 522 Secure Software Development Best Practices.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Role Of Network IDS in Network Perimeter Defense.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 40 Internet Security.
Seminar On Ethical Hacking Submitted To: Submitted By:
Web Application Protection Against Hackers and Vulnerabilities
Critical Security Controls
Security Testing Methods
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Evaluating Existing Systems
Click to edit Master subtitle style
Evaluating Existing Systems
Firewalls.
Security in Networking
Intro to Ethical Hacking
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
Network hardening Chapter 14.
Presentation transcript:

What Is Vulnerability Assessment? Chapter 23

vulnerability In computer security, the term vulnerability is applied to a weakness in a system that allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware (malicious software), a script code injection, or an SQL injection or others

A security risk is classified as vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of a working or fully implemented attack is classified as an exploit. Constructs in programming languages that are difficult to use properly can be large sources of vulnerabilities.

Vulnerability assessment may be performed on many objects, not only computer systems/networks.

Vulnerability assessment without a comprehensive report is pretty much useless. A vulnerability assessment report should include: Identification of vulnerabilities Quantity of vulnerabilities

Vulnerabilities should be sorted by severity and then by servers/services. Critical vulnerabilities should be at the top of the report and should be listed in descending order, that is, critical, then high, medium, and low.

1. REPORTING Reporting capability is of growing importance to administrators in a documentation-oriented business climate where you must not only be able to do your job, you must also provide written proof of how you’ve done it.

2. THE “ IT WON’T HAPPEN TO US ” FACTOR assume that bad things happen to “ other people, ” not to us. Organizational decision makers assume that their companies aren’t likely targets for.

3. WHY VULNERABILITY ASSESSMENT? Vulnerability assessment is used to find unknown problems in the systems. The main purpose of vulnerability assessment is to find out what systems have flaws and take action to mitigate the risk. Some industry standards such as DSS PCI require organizations to perform vulnerability assessments on their networks.

4. PENETRATION TESTING VERSUS VULNERABILITY ASSESSMENT A penetration test mainly consists of a vulnerability assessment, but it goes one step further. A penetration test is a method for evaluating the security of a computer system or network by simulating an attack by a malicious hacker. The process involves an active analysis of the system for any weaknesses, technical flaws, or vulnerabilities. This analysis is carried out from the position of a potential attacker and will involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner, together with an assessment of their impact and often with a proposal for mitigation or a technical solution.

Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps:

1.Cataloging assets and capabilities (resources) in a system 2. Assigning quantifiable value and importance to the resources 3. Identifying the vulnerabilities or potential threats to each resource 4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

This is generally what a security company is contracted to do, from a technical perspective — not to actually penetrate the systems but to assess and document the possible vulnerabilities and to recommend mitigation FIGURE 23.1 One critical vulnerability affects the entire network. measures and improvements. Vulnerability detection, mitigation, notification, and remediation are linked as, shown in Figure 23.2.

5. VULNERABILITY ASSESSMENT GOAL The theoretical goal of network scanning is elevated security on all systems or establishing a network wide minimal operation standard. Figure 23.3 shows how usefulness is related to ubiquity. HIPS: Host-Based Intrusion Prevention System NIDS: Network-Based Intrusion Detection System AV: Antivirus NIPS: Network-Based Intrusion Prevention System

6. MAPPING THE NETWORK Before we start scanning the network we have to find out what machines are alive on it. Most of the scanners have a built-in network mapping tool, usually the Nmap network mapping tool running behind the scenes.

Nmap The Nmap Security Scanner is a free and open- source utility used by millions of people for network discovery, administration, inventory, and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on a network, what services (application name and version) those hosts are offering, what operating systems they are running, what type of packet filters or firewalls are in use, and more.

7. SELECTING THE RIGHT SCANNERS Scanners alone don’t solve the problem; using scanners well helps solve part of the problem. Start with one scanner but consider more than one. It is a good practice to use more than one scanner. This way you can compare results from a couple of them. Some scanners are more focused on particular services. A typical scanner architecture is shown in Figure 23.6.

8. CENTRAL SCANS VERSUS LOCAL SCANS The question again arises, should we scan locally or centrally? The answer is both. Central scans give overall visibility into the network. Local scans may have higher visibility into the local network. Centrally driven scans serve as the baseline. Locally driven scans are key to vulnerability reduction. Scanning tools should support both methodologies. Scan managers should be empowered to police their own area and enforce policy.

9. DEFENSE IN DEPTH STRATEGY Defense in depth is an information assurance (IA) strategy in which multiple layers of defense are placed throughout an IT system. Defense in depth addresses security vulnerabilities in personnel, technology, and operations for the duration of the system’s life cycle. The idea behind this approach is to defend a system against any particular attack using several varying methods

Defense in depth In terms of computer network defense, defense-indepth measures should not only prevent security breaches, they should give an organization time to detect and respond to an attack, thereby reducing and mitigating the impact of a breach. Using more than one of the following layers constitutes defense in depth:

● Physical security (e.g., deadbolt locks) ● Authentication and password security ● Antivirus software (host based and network based) ● Firewalls (hardware or software) ● Demilitarized zones (DMZs) ● Intrusion detection systems (IDSs) ● Packet filters (deep packet inspection appliances and stateful firewalls) ● Routers and switches ● Proxy servers ● Virtual private networks (VPNs) ● Logging and auditing ● Biometrics ● Timed access control ● Proprietary software/hardware not available to the public

10. VULNERABILITY ASSESSMENT TOOLS There are many vulnerability assessment tools. The top 10 tools according to are listed here. Each tool is described by one or more attributes: ● Generally costs money; a free limited/demo/trial version may be available ● Works natively on Linux ● Works natively on OpenBSD, FreeBSD, Solaris, and/ or other Unix-like systems ● Works natively on Apple Mac OS X ● Works natively on Microsoft Windows ● Features a command-line interface ● Offers a GUI (point-and-click) interface ● Source code a vailable for inspection

The top 10 tools according to Nessus GFI LANguard Retina Core Impact ISS Internet Scanner X-Scan SARA QualysGuard SAINT MBSA

11. SCANNER PERFORMANCE A vulnerability scanner can use a lot of network bandwidth, so you want the scanning process to complete as quickly as possible. Of course, the more vulnerabilities in the database and the more comprehensive the scan, the longer it will take, so this can be a tradeoff. One way to increase performance is through the use of multiple scanners on the enterprise network, which can report back to one system that aggregates the results.

12. SCAN VERIFICATION The best practice is to use few scanners during your vulnerability assessment, then use more than one scanning tool to find more vulnerabilities. Scan your networks with different scanners from different vendors and compare the results. Also consider penetration testing, that is, hire white/gray-hat hackers to hack your own systems.

White hat A white hat hacker breaks security for non- malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement.white hat hacker ethical hackerpenetration tests vulnerability assessments

Black hat A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".

Part 1: Targeting The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response.port Open ports—those that do respond—will allow a hacker to access the system. Black hat

Part 2: Research and Information Gathering It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering“,. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network. Black hat

Part 3: Finishing The Attack This is the stage when the hacker will invade the primary target that he/she was planning to attack or steal from. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).honeypot Black hat

Grey hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

13. SCANNING CORNERSTONES Something in your organization that is not maintained or touched poses the largest threat

NETWORK SCANNING COUNTERMEASURES A company wants to scan its own networks, but at the same time the company should take countermeasures to protect itself from being scanned by hackers.

Find Security Holes Before They Become Problems Vulnerabilities can be classified into two major categories: ● Those related to errors made by programmers in writing the code for the software ● Those related to misconfigurations of the software’s settings that leave systems less secure than they could be (improperly secured accounts, running of unneeded services, etc.) Vulnerability scanners can identify both types.

15. VULNERABILITY DISCLOSURE DATE The time of disclosure is the first date that security vulnerability is described on a channel where the disclosed information on the vulnerability has to fulfill the following requirements: ● The information is freely available to the public. ● The vulnerability information is published by a trusted and independent channel/source. ● The vulnerability has undergone analysis by experts such that risk rating information is included upon disclosure.

16. PROACTIVE SECURITY VERSUS REACTIVE SECURITY There are two basic methods of dealing with security breaches: ● The reactive method is passive; when a breach occurs, you respond to it, doing damage control at the same time you track down how the intruder or attacker got in and cut off that means of access so it won’t happen again. ● The proactive method is active; instead of waiting for the hackers to show you where you’re vulnerable, you put on your own hacker hat in relation to your own network and set out to find the vulnerabilities yourself, before anyone else discovers and exploits them.

The best security strategy employs both reactive and proactive mechanisms. Intrusion detection systems (IDSs), for example, are reactive in that they detect suspicious network activity so that you can respond to it appropriately. Vulnerability assessment scanning is a proactive tool that gives you the power to anticipate vulnerabilities and keep out attackers instead of spending much more time and money responding to attack after attack. The goal of proactive security is to prevent attacks before they happen, thus decreasing the load on reactive mechanisms. Being proactive is more cost effective and usually easier 16. PROACTIVE SECURITY VERSUS REACTIVE SECURITY

17. VULNERABILITY CAUSES The following are vulnerability causes: ● Password management flaws ● Fundamental operating system design flaws ● Software bugs ● Unchecked user input

Password Management Flaws The computer user uses weak passwords that could be discovered by brute force. The computer user stores the password on the computer where a program can access it. Users reuse passwords between many programs and Web sites.

Fundamental Operating System Design Flaws The operating system designer chooses to enforce suboptimal policies on user/program management. For example, operating systems with policies such as default permit grant every program and every user full access to the entire computer. This operating system flaw allows viruses and malware to execute commands on behalf of the administrator.

Software Bugs The programmer leaves an exploitable bug in a software program. The software bug may allow an attacker to misuse an application through (for example) bypassing access control checks or executing commands on the system hosting the application. Also the programmer’s failure to check the size of data buffers, which can then be overflowed, can cause corruption of the stack or heap areas of memory (including causing the computer to execute code provided by the attacker).

Unchecked User Input The program assumes that all user input is safe. Programs that do not check user input can allow unintended direct execution of commands or SQL statements (known as Buffer overflows, SQL injection, or other nonvalidated inputs).