Defense in Depth Project Pap
Total Page:16
File Type:pdf, Size:1020Kb
A PROPOSED FRAMEWORK FOR BUSINESS INFORMATION SECURITY BASED ON THE CONCEPT OF DEFENSE-IN-DEPTH by MATTHEW K. BURNBURG A MASTER’S THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Management Information Systems SCHOOL OF BUSINESS AND MANAGEMENT UNIVERSITY OF ILLINOIS AT SPRINGFIELD SPRINGFIELD, ILLINOIS MAY 2003 i GRADUATE THESIS ACCEPTANCE PAGE ABSTRACT A PROPOSED FRAMEWORK FOR BUSINESS INFORMATION SECURITY BASED ON THE CONCEPT OF DEFENSE-IN-DEPTH by Matthew K. Burnburg Chairperson of the Supervisory Committee: Professor Rassule Hadidi Management Information Systems Department Information systems security is a complex area of study and practice. Communication of security requirements to business executives is difficult due to the highly specialized nature of the field and the accelerating deployment of new technologies. This study proposes a framework based on generally accepted domains of information security and the temporal nature and locality of data and information. The proposed framework also accounts for the small world network characteristics of the Internet. This study evaluates this framework within the context of an operating financial industry network. ii Table of Contents GRADUATE THESIS ACCEPTANCE PAGE II ABSTRACT II LIST OF FIGURES V LIST OF TABLES VI ACKNOWLEDGMENTS VII CHAPTER 1 1 INTRODUCTION 1 STATEMENT OF THE PROBLEM 2 PURPOSE OF THE STUDY 3 SIGNIFICANCE 5 SCOPE 6 ASSUMPTIONS AND LIMITATIONS 6 ORGANIZATION OF THE PAPER 8 CHAPTER 2 LITERATURE REVIEW 9 WHY IS INFORMATION SECURITY IMPORTANT? 9 WHAT IS THE GOAL? 16 WHAT IS THE RISK? 17 WHO ARE THE PLAYERS? 24 ATTACK METHOD 26 SECURITY FRAMEWORKS 28 A GENERAL FRAMEWORK FOR CONCEPTUALIZATION OF DEFENSE-IN- DEPTH 31 ORGANIZATIONAL ENVIRONMENT 34 LEGAL AND GOVERNMENTAL ENVIRONMENT 35 APPLICATION AND SYSTEM DEVELOPMENT 38 OPERATIONAL SECURITY 40 PHYSICAL SECURITY 41 ACCESS CONTROLS 41 ENCRYPTION AND CRYPTOGRAPHY 47 DISASTER RECOVERY AND ORGANIZATIONAL CONTINUITY 47 LOCALITY AND COMPLEXITY OF THE PROPOSED FRAMEWORK 48 DATA STORAGE 50 HOST 51 LOCAL AREA NETWORK 51 INTRANET 52 iii WIDE AREA NETWORK 52 BOUNDARY 53 INTERNET 54 EXTRANET 55 INTERACTION ON PUBLIC NETWORKS 56 CHAPTER 3 PROPOSED METHOD AND PROCEDURE 58 DATA COLLECTION 58 DATA ANALYSIS 59 THE ORGANIZATION’S NETWORK 59 CHAPTER 4 RESULTS 63 DATA SOURCES 63 OVERALL TRAFFIC 65 USER PASSWORD CONTROLS 72 NETWORK ACCESS CONTROL LAYERS 74 ANTI-VIRUS LAYERS 76 COMPLEXITY OF ATTACK 78 CHAPTER 5 DISCUSSION AND FUTURE DIRECTIONS 110 DISCUSSION 110 FUTURE DIRECTIONS 122 BIBLIOGRAPHY 123 APPENDIX A: POLICIES AND PROCEDURES 127 INTRANET AND INTERNET SECURITY POLICY 128 INFORMATION PROTECTION POLICY 133 RIGHT TO FINANCIAL PRIVACY POLICY AND PROCEDURES 155 APPENDIX B: CONFIGURATIONS 159 FIREWALL CONFIGURATION 159 EDGE ROUTER CONFIGURATION (BEFORE ACL MODIFICATION) 161 EDGE ROUTER CONFIGURATION (AFTER ACL MODIFICATION) 162 APPENDIX C: SELECTED DATA SETS 165 FIREWALL LOG EXCERPT (SANITIZED) 166 SOURCE COUNTRY BY IP ADDRESS 167 TRAFFIC BY DESTINATION PORT (IP) 169 NMAP SCAN SAMPLE DATA 187 HISTOGRAMS OF TOTAL AND ATTACK TRAFFIC 227 iv LIST OF FIGURES Discrete Attacking Hosts on Cable-Connected Home PC (Burnburg 2001)......................................... 13 Numbers of Discrete Attacks, Probes or Scans on Cable-Connected PC (Burnburg 2001) ................. 14 Reasons for not Reporting Intrusions (Computer Security Institute 2001) ........................................... 18 CERT Statistics through Q3 2001 (CERT®) .......................................................................................... 18 Attack Sophistication vs. Intruder Knowledge (Pethia 2001)................................................................ 19 Actions Taken to Computer Intrusions (Computer Security Institute 2001)......................................... 20 Unauthorized Use of Computer Systems Within the Last 12 Months................................................... 21 Security Technologies Used (Computer Security Institute 2001).......................................................... 22 Type of Attack or Misuse Detected in the Last 12 Months (Computer Security Institute 2001).......... 23 Point of Attack (Computer Security Institute 2001).............................................................................. 24 Likely Sources of Attack (Computer Security Institute 2001)............................................................... 26 Attacker Methodology ............................................................................................................................ 28 McCumber INFOSEC Model (1991) ..................................................................................................... 29 Information Assurance Model (Maconachy et al 2001)......................................................................... 30 Proposed Framework (Front View)........................................................................................................ 33 Proposed Framework (Rear View) ......................................................................................................... 33 Proposed Framework (Cross-sectional View)........................................................................................ 49 The security framework in relation to other organizations .................................................................... 56 Organization Network before September 2002...................................................................................... 60 Organization Network after September 2002......................................................................................... 62 Total Daily Traffic .................................................................................................................................. 65 Percentage of Total Traffic (US vs. Foreign) ......................................................................................... 66 Daily Total and Attack Traffic................................................................................................................ 69 Percentage of Attack vs. Total Traffic.................................................................................................... 71 Network User Login Failures ................................................................................................................. 72 Network Access Control Services .......................................................................................................... 75 Private IP Address Spoofing Attempts................................................................................................... 76 Virus Detection by Layer........................................................................................................................ 77 Simple Mail Transfer Protocol Probes ................................................................................................... 83 File Transfer Protocol Probes ................................................................................................................. 86 Secure Shell Probes................................................................................................................................. 88 Domain Name Service Probes ................................................................................................................ 90 Hypertext Transport Protocol Probes ..................................................................................................... 92 Identification Protocol Probes................................................................................................................. 95 Remote Procedure Call Probes ............................................................................................................... 97 NetBIOS Name Service Probes.............................................................................................................. 99 NetBIOS Session Service Probes ......................................................................................................... 101 Microsoft SQL Server Probes............................................................................................................... 103 Top Ten Trojan Horse Probes............................................................................................................... 105 SubSeven Trojan Probes....................................................................................................................... 106 GateCrasher Trojan Probes................................................................................................................... 108 v LIST OF TABLES Attack Types Detected By IDS Software (Burnburg 2001)................................................................... 15 Attack Classification (Burnburg 2001)................................................................................................... 16 Total Traffic ............................................................................................................................................ 66 Foreign Total Traffic > Total US Traffic ............................................................................................... 67 Total Traffic Day of Week...................................................................................................................... 67 Total Traffic vs. Attack Traffic............................................................................................................... 70 Unique IP Addresses..............................................................................................................................