slides

Command Line &
Information Security Pillars
Dr. X
Logistics
• Command line lab due Thursday, Feb. 2 @ midnight
• Project proposal: have you done your research yet?
• Future Crimes reading: how is this going?
Command Line
• Steep learning curve!!
• Key commands that you have learned:
•
•
•
•
•
•
•
•
Pwd
Ls
Cd
Mkdir
Echo
Cat
Cp
nano
Command Line
• Syntax
•
•
•
•
•
\: directories
Spaces are important!
>: redirect
*: wildcard!
|: pipe the output of one command to the input of another
• File hierarchy
• Command options
• One option: ls –al
• More than one option: cp file1.txt file2.txt
Environment Variables
• System variables are a special class of predefined variables available
to all program units. System variables are used to set the options for
plotting, to set various internal modes, to return error status, etc.
• System variables have a predefined type and structure that cannot be
changed. When an expression is stored into a system variable, it is
converted to the variable type, if necessary and possible.
• Examples
• $USER
• $PATH
• $HOME
Information Security
Fundamentals
…or how we will save the world... One server at at time =)
The rabbit hole
...
What is information security?
• What are the goals?
• Who/what are we trying to secure?
What is security
• CIANA
• Confidentiality
• Integrity
• Availability
• Non-repudiation
• Authentication
Research on the web
• Find examples of violation of CIANA pillars
Examples
• Confidentiality
• In December 2013, national retailer Target reported the theft of records for
40 million credit and debit cards used at its stores. Not long after the breach,
the card data was being sold at underground forums to thieves. The credit
card data was supposed to be confidential, but confidentiality of the data was
not preserved.
• Integrity
• In 2010, the Stuxnet computer worm was used to infiltrate the computer
systems controlling Iran's nuclear enrichment centrifuges. The Stuxnet code
modified the programmable logic controller (PLC) software, causing the
centrifuges to spin out of control, while giving the console operators only
normal indications. The integrity of the PLC software was violated in this
attack.
Examples
• Availability
• In 2008, computer systems supporting banks, media, communications,
transportation, and other infrastructure in the nation of Georgia experienced a
widespread denial-of-service attack originating from Russia. At the time, a dispute
had flared up between Georgia and Russia over control of areas along the GeorgiaRussia border. The availability of critical systems through Georgia's (entire country)
connection to the Internet was greatly diminished.
• Non-repudiation Although there aren't many publicized examples of nonrepudiation violations, or 'repudiation attacks,' the following are some
general examples:
• Unauthorized manipulation of e-commerce transaction logs (making it hard or
impossible to later prove a company performed an action, such as an equipment
purchase or a stock market trade).
• Unauthorized manipulation of administrator access logs on any computer (making it
hard or impossible to later prove who was logged on, and when).
Examples
• Authentication
• In 2011, a company called RSA, which provides security services,
acknowledged its proprietary authentication system, which is employed by
some defense contractors and other high-security industries,
was compromised. As a result, the attackers were also able to log into systems
at Lockheed Martin, and other companies, using the stolen credentials of
legitimate users.
What is currently running on your computer?
• Windows
• Open a run box.
• Type taskmgr.exe and press return. Alternatively right-click the taskbar and
select 'Start Task Manager'...
• Mac
• Open spotlight search
• Type” Activity monitor”
• Command line
• Top
• Ps
Are you safe/secure?
What services can your computer run?
• Mac
• Open spotlight, type terminal
• Type: launchctl list
• Windows
• Open a run box.
• Type: services.msc
• Are all these services necessary?
• Remote desktop service: is it necessary for your grandma’s computer?
Is it necessary for the CEOs computer?
Cyber Security
• Cyber Security is about providing services while maintaining
the CIANA properties.
Think/Answer
• A computer in an airtight-watertight vault would be very secure. Why is
this level of security not attainable in any practical setting? From a user's
perspective what Pillar of Cyber Security is violated?
• Suppose you went into a Starbucks (which offers wireless Internet access to
its customers), and brought radio-jamming equipment so wireless (WiFi)
communication was impossible. Explain, from the other customers'
perspectives, which of the five Pillars of Cyber Security are attacked in this
scenario.
• Suppose you went into a Starbucks (which offers wireless Internet access to
its customers) and used a WiFi snooping tool to discover someone’s session
key for their online bank login, and used it to login to their account.
Explain, from the other customers' perspectives, which of the five Pillars of
Cyber Security are attacked in this scenario.
Think/Answer
• If you then looked at the info there. Explain, from the account holder's
perspective, which Pillar of Cyber Security would you have attacked?
• If you then actually transferred money from their account into yours.
Explain, from the account holder's perspective, which Pillar of Cyber
Security would be attacked?
• If you then actually transferred money from their account into yours.
Explain, from the bank's perspective, which Pillar of Cyber Security would
be attacked?
• If you then were able to delete any record of the money transfer. Explain,
from the bank's and account holder's perspective, which Pillar of Cyber
Security would be attacked.
Sources
• Introduction to Cybersecurity Technical Foundations:
https://www.usna.edu/CyberDept/sy110/index.html