Taxonomy of Computer Security Incidents Yashodhan Fadnavis.

Slides:



Advertisements
Similar presentations
Distance Education Team 1 Adrian Sia Xavier Appé Anoop Georges Salvador Gonzales Augustine Ani Zijian Cao Joe Ondercin SNA Step 3 November 14, 2001.
Advertisements

OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Mr C Johnston ICT Teacher
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
A Common Language for Computer Security Incidents John D. Howard, Thomas A. Longstaff Presented by: Jason Milletary 9 November 2000.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Network Security Testing Techniques Presented By:- Sachin Vador.
FIT3105 Security and Identity Management Lecture 1.
Handling Security Incidents
Earl Crane Hap Huynh Jeongwoo Ko Koichi Tominaga 11/14/2000 Physician Reminder System SNA Step 3.
Web server security Dr Jim Briggs WEBP security1.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Payment Card Industry (PCI) Data Security Standard
COEN 252: Computer Forensics Router Investigation.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
APA of Isfahan University of Technology In the name of God.
Securing Information Systems
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Computer Crime and Information Technology Security
1 Guide to Network Defense and Countermeasures Chapter 2.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Software Security Testing Vinay Srinivasan cell:
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
--Harish Reddy Vemula Distributed Denial of Service.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Information Systems Security Operations Security Domain #9.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Lesson 2 Computer Security Incidents Taxonomy. Need an accepted taxonomy because... Provides a common frame of reference If no taxonomy, then we: Can’t.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Module 11: Designing Security for Network Perimeters.
Introduction to Information Security
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
1 Copyright © 2014 M. E. Kabay. All rights reserved. Taxonomy of Computer Security Breaches CSH6 Chapter 8 “Using a Common Language for Computer Security.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network security Vlasov Illia
Computer Security Incidents
Secure Software Confidentiality Integrity Data Security Authentication
Cyber Crimes Chunlian QU 9/18/2018.
Prepared By : Binay Tiwari
Computer Security Incidents
Intrusion Detection system
Intrusion.
Presentation transcript:

Taxonomy of Computer Security Incidents Yashodhan Fadnavis

How does it help? Taxonomy gives common names to event Security against a ‘class’ of attacks

Satisfying Taxonomy Mutually Exclusive Exhaustive Unambiguous Repeatable Accepted Useful

Listing Terms E.g. Password sniffing, Brute force attacks, Eavesdropping, Harassment, Covert Channels, Viruses, Logic Bombs, Software loopholes, WEP loopholes, Source address spoofing, Software piracy, Degradation of services, Session hijacking Failed six satisfying properties = Bad Taxonomy. Lists can be never ending.

Listing categories Stealing Social passwords Engineering Password sniffing Brute force Eavesdropping Harassment Bugs and backdoors Covert channels Viruses Logic Bombs Authentication Failures Software loopholes Protocol Failures Info LeakageDoS WEP Loopholes Source Address spoofing Software Piracy Degradation Of Service Session Hijacking Cheswick and Bellovin List

Other taxonomies Result categories Empirical categories Matrices

Incident Taxonomy Events: An action directed at a target which is intended to result in change of the state of the target. Action: Step taken by a user or a process to achieve a result. Target: A computer or a network logical entity.

Action + Target = Event Action Probe Scan Flood Authenticate Bypass Spoof Read Target Account Process Data Network Computer Event

Attack Tool Physical Attack Information Exchange User Command Script or program Autonomous Agent Toolkit Action Probe Scan Flood Authenticate Bypass Spoof Read Target Account Process Data Component Computer Event Vulnerability Design Implementation Configuration Unauthorized result Increased Access Disclosure of Information Corruption of Information DoS Theft of resources Attack

Incident Incident: A group of attacks that can be distinguished from other attacks because of the uniqueness of the attackers, objectives, sites and timing. AttackersAttackObjectives

Incident Taxonomy Attacker Hackers Spies Terrorists Corporate Attackers Professional Criminals Vandals Voyeurs Objectives Challenge, Status, Thrill Political Gain Financial Gain Damage Incident

Federal Incident Reporting Guidelines Agency name Point of contact information including name, telephone, and address Incident Category Type (e.g., CAT 1, CAT 2, etc.) Incident Timestamp Source IP, Destination IP, port, and protocol Operating System, including version, patches, etc. System Function (e.g., DNS/web server, workstation, etc.) Antivirus software installed, including version, and latest updates Location of the system(s) involved in the incident (e.g. Clemson) Method used to identify the incident (e.g., IDS, audit log analysis, system administrator) Impact to agency Resolution

Federal Agency Incident Categories CategoryNameReporting Timeframe CAT 0Exercise/Network Defense TestingNot Applicable; this category is for each agency's internal use during exercises. CAT 1*Unauthorized AccessWithin one (1) hour of discovery/detection. CAT 2*Denial of Service (DoS)Within two (2) hours of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate activity. CAT 3*Malicious CodeDaily Note: Within one (1) hour of discovery/detection if widespread across agency. CAT 4*Improper UsageWeekly CAT 5Scans/Probes/Attempted AccessMonthly Note: If system is classified, report within one (1) hour of discovery. CAT 6InvestigationNot Applicable; this category is for each agency's use to categorize a potential incident that is currently being investigated.

Questions?