Computer and Network Security: Best Practices
by Etaoin Shrdlu
Computer Security
Computer Security is keeping anyone from doing things that you
do not want them to do, with, or from your data, computers, or
any peripheral device.
- We must protect
- stored information
- accuracy of information
- information value
- access to external services
- access to internal services
- the organization's privacy
- We protect against
- Hackers/Crackers - typically young hobbyists, who gain
access via external network connections
- Criminal Intruders - they have more resources and
capabilities than the hobbyists
- Corporate/Industrial/Foreign Espionage - they have even more
resources, and great skills and determination
- Insiders - they are very dangerous, since they are already
past the first barrier
- Contractors - they present the same problems as insiders,
and have less reason for loyalty
- Levels of Responsibility
- The personal level of responsibility implies that security
is everyone's job. Good passwords, careful assessment of
software installed, good virus practices, and the recognition
that security is the responsibility of each person with a
password. System administrators and each single computer or
network user are in this category.
- The interior level of responsibility governs the
responsibilities of the network administrator, and also covers
many of the responsibilities of the system
administrators. Groups of machines, and local area networks,
are at this level.
- The exterior level of responsibility lies with the network
administrator, and the computer or network security
administrators. The firewall and other countermeasures are at
this level.
- Types of Attacks
- Social Engineering - This is always the easiest way in.
- Ask the local administrator to change "your" account's
password
- Look over the shoulder of someone while they type (shoulder
surfing)
- Look for passwords that are written down in obvious
places
- Look for computers that are logged in to the network, or are
otherwise vulnerable, and are unattended
- Bugs, Backdoors, and Bad Practices
- Easy or compromised passwords create an authenticated
user
- Operating systems and networks should always be up to the
latest patch levels
- Unused software packages and services should be removed or
disabled
- Protocols are not designed to be secure (TCP/IP, SNA,
DECNet, Appletalk, etc.)
- Denial of Service - very little can be done to defend
against this. Assume that it will happen and make contingency
plans.
- Using up the resources of a machine or network
- Disrupt communications via corrupt routing tables or
other attacks
Levels of Data
- Data can be divided up into (at least) three layers,
according to the level of protection required for it.
- Level 1 data is defined to be that any compromise or harm to
will cause irreparable damage to the reputation of the
company, or will cause a loss of more than 10 million dollars
(adjust this according to the current worth of your
company)
- Level 2 data is defined to be data that will cause poor
publicity, or will cause a loss of between one-half million
and 10 million dollars (same caveat as above)
- Level 3 data is defined to be data that will cause a loss of
less than one-half million dollars (same caveat), or cause
inconvenience and disruption to the enterprise
Personnel data is assumed to be level 1 or level 2 data. Yearly
forecasts, and other irreplaceable items are level 1
data. Different protection is required for these levels. Level 1
data should be secured at all times, and probably should not be
available from the external network, or else should be placed
under heightened protection.
Cryptography is not a Toy
- Cryptographic protocols and packages should never depend on
the outmoded "security through obscurity" philosophy.
- Extend trust only where necessary
- Use well-known packages
- Do not trust certificate authorities, as these may be
compromised or forged (This is a politically charged
statement, and may or may not be palatable to all
entities)
- Keep up with current techniques, and use the strongest
encryption methods available to you
The Security Policy
- This is a formal definition of an organization's stance on
security - on what is and is not allowed. Each organization
must determine for itself what level of security is wise, and
how much enforcement is necessary.
- Everything not explicitly prohibited is permitted
(permissive policy)
- Everything not explicitly permitted is prohibited
(restrictive policy)
- A certain level of security may be a legal requirement
(various countries have privacy protection acts, or
requirements for protection of data)
- There may be restrictions in what you may, or may not,
monitor
- Prosecution of intruders depends on evidence that is
admissible in court.
Computer logs are probably not qualified, nor is most
electronic media. The policy must state what evidence is or will
be maintained for this purpose.
Password Rules
Passwords guard the perimeter of the organization. Each and
every password scheme should use some form of true encryption
(no ROT13 or simple hashing), and should belong to a single
user. Passwords should never be shared. There are many available
programs that will "crack" simple passwords.
- Minimum standards for passwords are:
- At least 6 characters in length
- Mix case and other characters
- Do not use dictionary words
- Use other rules as they make sense for your
organization
Protect the Physical Network
Sniffers and network taps are still easy to install, even
though many organizations use modern cabling. Physical
inspection of the network is important. Network monitoring for
unusual or odd traffic patterns may also help spot protocol
analyzers. Session authentication and password protection are
useless if the network itself is compromised.
Last modified: Sat Oct 30 23:12:31 PDT 2004