Network and Data Security for Non-Engineers
Total Page:16
File Type:pdf, Size:1020Kb
Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers Frank M. Groom Kevin Groom Stephan S. Jones MATLAB® and Simulink® are trademarks of The MathWorks, Inc. and are used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MATLAB® and Simulink® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular peda- gogical approach or particular use of the MATLAB® and Simulink® software. CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20160426 International Standard Book Number-13: 978-1-4987-6786-6 (Paperback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid- ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti- lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy- ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Groom, Frank M., author. | Groom, Kevin M., author. | Jones, Stephan., author. Title: Network and data security for non-engineers / Frank M. Groom, Kevin Groom, and Stephan S. Jones. Description: Boca Raton : CRC Press, Taylor & Francis Group, an Informa Business, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016008261 | ISBN 9781498767866 Subjects: LCSH: Computer networks--Security measures. Classification: LCC TK5105.59 .G78 2017 | DDC 005.8--dc23 LC record available at https://lccn.loc.gov/2016008261 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface .................................................................................................................................... xiii Authors .....................................................................................................................................xv 1 Introduction to Security Threats ..................................................................................1 2 The 2014–2015 Anthem Blue Cross and Blue Shield Break-In Case Study ..................3 Step 1: Reconnaissance ...................................................................................................... 4 Step 2: Picking the Right Target and Spear Phishing em ............................................... 4 Spear Phishing .............................................................................................................. 5 Waterholes ..................................................................................................................... 5 Step 3: Initial System Entry ............................................................................................... 5 Next Steps to Establish an Undetectable Anonymous Persistent Presence .......................... 6 Password Decryption Process and Equipment ................................................................... 6 Testbed .............................................................................................................................. 6 Final Steps ......................................................................................................................... 6 Tools Used by Hackers to Acquire Valid Entry Credentials and Tools Used by Security Personnel to Detect Activity and Malware and Protect the Stored Data .............. 8 Tool 1: Initial Spear-Phishing Entry Leading to the ScanBox Keystroke Logger ........... 8 Tool 2: Setting Up an Anonymous Path Using Tor ..................................................... 12 Tool 3: CrowdStrike Identied Hacker Clusters, China Chopper Web-Shell Controller .....................................................................................................................16 CrowdStrike’s Identied Hacking Clusters ..............................................................16 China Chopper Web Shell Controller ......................................................................17 Types of Common Monitoring Software Employed ................................................18 Looking for Derusbi Parsing Software .....................................................................18 RSA’s ECAT Scanning Software..............................................................................19 Yara’s Operation ......................................................................................................19 3 Anonymous Persistent Threats ...................................................................................21 Rivest–Shamir–Adleman (RSA) Identied Shell Crew .....................................................21 Kaspersky Lab Has Identied a Recent Attack Group at Identies Its Tools as Careto: e Mask ............................................................................................................ 23 Dark Web ........................................................................................................................ 24 4 Creating Secure Code .................................................................................................25 First Principle of Code Protection: Code Isolation and Connement ...............................25 Code Isolation Techniques ............................................................................................... 26 Implementation of the Four Code-Connement Methods .............................................. 28 v vi ◾ Contents Reference Monitors ..................................................................................................... 28 OS Chroots ................................................................................................................. 28 OS Jail Routines .......................................................................................................... 28 FreeBSD Jail ................................................................................................................ 29 Linux’s Ptrace Monitor and Systrace Routines............................................................. 29 Employing Applications Such as Ostia or NACI ......................................................... 30 Isolation of Virtual Machines .......................................................................................... 30 Computer Virtualization ..............................................................................................31 reats to Computer Virtualization ..................................................................................31 Subverting VM Isolation ............................................................................................. 32 VM-Based Malware .................................................................................................... 32 Software Fault Isolation .............................................................................................. 32 5 Providing a Secure Architecture .................................................................................35 Providing a Secure Architecture ........................................................................................35 Isolation and Least Privilege .........................................................................................35 Access Control Concepts ............................................................................................. 36 Operating Systems ...................................................................................................... 37 Browser Isolation and Least Privilege .......................................................................... 38 Hacking Attacks .............................................................................................................. 38 Spear Phishing and Behavioral Attacks ............................................................................ 39 Spoong, Digital Misrepresentation, and Mobile Security ..............................................