11/14 SNA Presentation 3 Survivable Network Analysis Oracle Financial System SNA step 3 Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian.

Slides:



Advertisements
Similar presentations
Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
Advertisements

Distance Education Team 1 Adrian Sia Xavier Appé Anoop Georges Salvador Gonzales Augustine Ani Zijian Cao Joe Ondercin SNA Step 3 November 14, 2001.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Oracle Financial System Project Team: Aseem Gupta Jeng Toa Lee Jun Lu Kevin Patrick Zhu Thomas Verghese Weicheng Wong Xuegong Wang ( Jeff ) Date : 26 th.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Student Application System SNA Step 3 Attacker Profiles and Scenarios
Using Your Knowledge – Security Threats
1 Oracle Financial System Mary Ann Carr September 14, 2000.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CSA 223 network and web security Chapter one
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Extranet for Security Professionals Intrusion Scenarios Heather T. Kowalski Tong Xu Ying Hao Hui Huang Bill Halpin Nov. 14, 2000.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Distance Education Team 2 Security Architectures and Analysis.
Earl Crane Hap Huynh Jeongwoo Ko Koichi Tominaga 11/14/2000 Physician Reminder System SNA Step 3.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Oracle Financial System Project Team: Xuegong Wang Jun Lu ZhengChun Mo Patrick Zhu Thomas Verghese Weicheng Wong Date : 14 th November, 2001 Step 3.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Earl Crane Hap Huynh Jeongwoo Ko Koichi Tominaga 12/12/2000 Physician Reminder System: Survivability Network Analysis Step 4.
SNA, Step 2, 10/31 Survivable Network Analysis Oracle Financial Management Services Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian Song.
Survivable Network Analysis Oracle Financial Management Services Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian Song.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Storage Security and Management: Security Framework
Computer Crime and Information Technology Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Viruses & Destructive Programs
Chapter 6 of the Executive Guide manual Technology.
Introduction of Internet security Sui Wang IS300.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Assurance Policy Tim Shimeall
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Operating System Security Fundamentals Dr. Gabriel.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
Topic 5: Basic Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Security and Ethics Safeguards and Codes of Conduct.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Information Systems Security
Review of IT General Controls
Threat Modeling for Cloud Computing
Securing Network Servers
Instructor Materials Chapter 7 Network Security
Answer the questions to reveal the blocks and guess the picture.
Lecture 2 - SQL Injection
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Presentation transcript:

11/14 SNA Presentation 3 Survivable Network Analysis Oracle Financial System SNA step 3 Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian Song

11/14 SNA Presentation 3 Overview Review Essential Components Attacker profiles Attack Patterns Intrusion Usage Scenarios Compromisable Components Diagram Next Steps

11/14 SNA Presentation 3 Essential Services Users must have access to financial service applications Core Financial Applications Application Desktop Integrator Applications Feeder systems must integrate with financial applications Primary actions performed by users are: Billing, reporting & reconciliation of budgets and expenses

11/14 SNA Presentation 3 Essential Components Diagram Kerberos SCP HTTPS … Oracle Connection Mgr. Kerberos Domain Contriller Acis.as. cmu.edu (Sun Sparc Cluster) LPR (print) SSH SMTP ( ) Tandem O. DB HTTP … O. Listener Mistral (Development) SQL Net O. Forms CITRIX FTP LPR (print) SSH SMTP ( ) O. DB HTTP … O. Listener Chinook (Backup) SQL Net O. Forms CITRIX FTP LPR (print) SSH SMTP ( ) CAMPUS NETWORK Cyert Computer Center 6555 Penn Ave FIBER Secure Directory

11/14 SNA Presentation 3 Potential Attacker Profiles Curious Student Hacker Student Employee Disgruntled Full-Time Employee Academic Spy

11/14 SNA Presentation 3 Attacker Profile #1 Curious Student Hacker Member of CMU campus community Low to Medium level of expertise: Possible CS, IDS, ECE or other technical background Accesses system from internal campus LAN Student attacks system in order to learn from experimentation with hacking tools & concepts Student’s motivation is for disclosure or modification rather than deletion of data Level: Target-of Opportunity Attack

11/14 SNA Presentation 3 Attacker Profile #2 Student Employee Objective is to steal financial funds Student employed by department at some point Has access to passwords & has experience using system interface Accesses system when superiors are not around Attack may occur in small increments over a long period of time Level: Intermediate Attack

11/14 SNA Presentation 3 Attacker Profile #3 Disgruntled Full-Time Employee Objective is to wreak havoc upon the system via deletion or modification of data Low to medium level of technical expertise High level of experience with system User has account and password with access to the system User is trusted and therefore is able to cause damage to mission critical system elements Level: Intermediate Attack

11/14 SNA Presentation 3 Attacker Profile #4 Academic Spy Objective is to steal sensitive information on grants from the University Medium to High level of technical expertise Accesses System internally or externally Primary motivation is disclosure of sensitive information rather than modification or deletion Level: Sophisticated attack

11/14 SNA Presentation 3 Attack Patterns Trojan Horse Application content pattern Possible upload of malicious code Feeder system Excel files Possible attackers Disgruntled employees Academic spies

11/14 SNA Presentation 3 Trojan Horse Gather information Identify external applications which integrate into system (Excel, etc) Evaluate processing of uploaded files via feeder system or application server Exploit Attach Visual Basic macro to Excel file Attach executable code to feeder file Damage Possible installation of back door code Denial-of-serve by insertion of malformed input

11/14 SNA Presentation 3 Attack Patterns Disclosure of sensitive information User access attack pattern Using incomplete or improperly assigned access rights to view information Potential attackers Students Disgruntled employees Academic spies

11/14 SNA Presentation 3 Disclosure of information Gather information Identify components with incomplete access control Use social engineering to acquire passwords Identify Exploit Normal system use with unauthorized access Damage Disclosure of information

11/14 SNA Presentation 3 Intrusion Usage Scenario IUS1 (Data integrity and Spoofing Attack) Unauthorized user(part-time worker/student ) Illegitimately obtain password View, modify confidential data and steal financial funds

11/14 SNA Presentation 3 Example of IUS1

11/14 SNA Presentation 3 Example of IUS1

11/14 SNA Presentation 3 Intrusion Usage Scenario IUS2 (Data integrity and insider attack) Authorized Employee (Disgruntled) Legitimate access right Modify data or issue illegal check

11/14 SNA Presentation 3 Example of IUS2

11/14 SNA Presentation 3 Example of IUS2

11/14 SNA Presentation 3 Intrusion Usage Scenario IUS3 (Availability attack) Student Hacker Possible upload of malicious code Feeder system Excel files Destroy or limit access to applications of OFS.

11/14 SNA Presentation 3 Intrusion Usage Scenario IUS4 (Recovery attack) Professional Hacker Directly access database, bypassing the firewall Corrupt major portions of the DB

11/14 SNA Presentation 3 Intrusion Usage Scenario IUS5 (Spoofing Attack) Unauthorized user(Academic Spy) Spoofing legitimate user View, modify confidential data and marketable information

11/14 SNA Presentation 3 Compromisable Components Diagram Kerberos SCP HTTPS … Oracle Connection Mgr. Kerberos Domain Contriller Acis.as. cmu.edu (Sun Sparc Cluster) LPR (print) SSH SMTP ( ) Tandem O. DB HTTP … O. Listener Mistral (Development) SQL Net O. Forms CITRIX FTP LPR (print) SSH SMTP ( ) O. DB HTTP … O. Listener Chinook (Backup) SQL Net O. Forms CITRIX FTP LPR (print) SSH SMTP ( ) CAMPUS NETWORK Cyert Computer Center 6555 Penn Ave FIBER Secure Directory

11/14 SNA Presentation 3 Other Potential Issues Password expiration Availability: Cross department Worker information Confidentiality: Remove User Access Right when employee leave

11/14 SNA Presentation 3 Ongoing Steps Client & Users 4 th client meeting to verify compromisable components More user meetings to verify IUS.b Discuss application of SNA method. Within Our Group Site visit to 6555 Penn Ave. Backup facility Describe existing and recommended strategies for resistance, recognition, and recovery Present the survivability map for the architecture