System Security
Software-Based Attacks
• Malicious software, or malware
– Software that enters a computer system without the owner’s knowledge or
consent
– Malware is a general term that refers to a wide variety of damaging or annoying
software
• The three primary objectives of malware
– To infect a computer system
– hide the malware’s malicious actions
– Bring profit from the actions that it performs
Infecting Malware
• Viruses
– Programs that secretly attach to another document or program and execute
when that document or program is opened
– Once a virus infects a computer, it performs two separate tasks
• Replicates itself by spreading to other computers
• Activates its malicious payload
– Cause problems ranging from displaying an annoying message to erasing files
from a hard drive or causing a computer to crash repeatedly
• Types of computer viruses
– File infector virus
– Boot virus
– Companion virus
• Metamorphic viruses
– Avoid detection by altering how they appear
• Polymorphic viruses
– Also encrypt their content differently each time
• Worm
– Program designed to take advantage of a vulnerability in an application or an
operating system in order to enter a system
– Worms are different from viruses in two regards:
• A worm can travel by itself
• A worm does not require any user action to begin its execution
– Actions that worms have performed: deleting files on the computer; allowing the
computer to be remote-controlled by an attacker
Concealing Malware
• Trojan Horse (or just Trojan)
– Program advertised as performing one activity that but actually does something
else
– Trojan horse programs are typically executable programs that contain hidden
code that attack the computer system
• Rootkit
– A set of software tools used by an intruder to break into a computer, obtain
special privileges to perform unauthorized functions, and then hide all traces of
its existence
• Rootkit (continued)
– The rootkit’s goal is to hide the presence of other types of malicious software
– Rootkits function by replacing operating system commands with modified
versions
• That are specifically designed to ignore malicious activity so it can escape
detection
– Detecting a rootkit can be difficult
– Removing a rootkit from an infected computer is extremely difficult
• You need to reformat the hard drive and reinstall the operating system
• Logic bomb
– A computer program or a part of a program that lies dormant until it is triggered
by a specific logical event
– Once triggered, the program can perform any number of malicious activities
– Logic bombs are extremely difficult to detect before they are triggered
• Privilege escalation
– Exploiting a vulnerability in software to gain access to resources that the user
would normally be restricted from obtaining
• Types of privilege escalation
– When a user with a lower privilege uses privilege escalation to access functions
reserved for higher privilege users
– When a user with restricted privileges accesses the different restricted functions
of a similar user
Malware for Profit
• Spam
– Unsolicited e-mail
– Sending spam is a lucrative business
– Costs involved for spamming:
• E-mail addresses
• Equipment and Internet connection
– Text-based spam messages can easily by trapped by special filters
Image spam uses graphical images of text in order to circumvent text-based filters
• Image spam cannot be easily filtered based on the content of the message
• To detect image spam, one approach is to examine the context of the message and
create a profile, asking questions such as:
– Who sent the message?
– What is known about the sender?
– Where does the user go if she responds to this e-mail?
– What is the nature of the message content?
– How is the message technically constructed?
• Spyware
– A general term used for describing software that imposes upon a user’s privacy
or security
• Antispyware Coalition defines spyware as:
– Technologies that are deployed without the user’s consent and impair the user’s
control over:
• Use of their system resources, including what programs are installed on
their computers
• Collection, use, and distribution of their personal or other sensitive
information
• Material changes that affect their user experience, privacy, or system
security
• Spyware has two characteristics that make it very dangerous
– Spyware creators are motivated by profit
• Spyware is often more intrusive than viruses, harder to detect, and more
difficult to remove
– Spyware is not always easy to identify
• Spyware is very widespread
• Although attackers use several different spyware tools
– The two most common are adware and keyloggers
• Adware
– A software program that delivers advertising content in a manner that is
unexpected and unwanted by the user
• Adware can be a security risk
– Many adware programs perform a tracking function
• Monitors and tracks a user’s activities
• Sends a log of these activities to third parties without the user’s
authorization or knowledge
• Keylogger
– A small hardware device or a program that monitors each keystroke a user types
on the computer’s keyboard
– As the user types, the keystrokes are collected and saved as text
• As a hardware device, a keylogger is a small device inserted between the keyboard
connector and computer keyboard port
• Software keyloggers
– Programs that silently capture all keystrokes, including passwords and sensitive
information
– Hide themselves so that they cannot be easily detected even if a user is
searching for them
• Botnets
– When hundreds, thousands, or even tens of thousands of zombie computers are
under the control of an attacker
• Zombie
– An infected computer with a program that will allow the attacker to remotely
control it
• Attackers use Internet Relay Chat (IRC) to remotely control the zombies
• Attacker is knows as a bot herder
Hardware-Based Attacks
• Hardware that often is the target of attacks includes the BIOS, USB devices, network
attached storage, and even cell phones
BIOS
• Basic Input/Output System (BIOS)
– A coded program embedded on the processor chip that recognizes and controls
different devices on the computer system
– Executed when the computer system is first turned on and provides low-level
access to the hard disk, video, and keyboard
• On older computer systems the BIOS was a Read Only Memory (ROM) chip
– Today’s computer systems have a PROM (Programmable Read Only Memory)
chip
• Because it can be flashed, the BIOS can be the object of attacks
– One virus overwrites the contents of the BIOS and the first part of the hard disk
drive, rendering the computer completely dead
– An attacker could infect a computer with a virus and then flash the BIOS to install
a rootkit on the BIOS
USB Devices
• USB devices use flash memory
– Flash memory is a type of EEPROM, nonvolatile computer memory that can be
electrically erased and rewritten repeatedly
• USB devices are widely used to spread malware
• Also, USB devices allow spies or disgruntled employees to copy and steal sensitive
corporate data
• In addition, data stored on USB devices can be lost or fall into the wrong hands
• To reduce the risk introduced by USB devices:
– Disable the USB in hardware
– Disable the USB through the operating system
– Use third-party software
Network Attached Storage (NAS)
• Storage Area Network (SAN)
– Specialized high-speed network for attaching servers to storage devices
– SAN can be shared between servers and can be local or extended over
geographical distances
• Network Attached Storage (NAS)
– Another type of network storage
– Single, dedicated hard disk-based file storage device that provides centralized
and consolidated disk storage available to LAN users through a standard network
connection
• Advantages to using NAS devices on a network
– Offer the ability to easily expand storage requirements
– Allow for the consolidation of storage
• The operating system on NAS devices can be either a standard operating system, a
proprietary operating system, or a “stripped-down” operating system with many of the
standard features omitted
• NAS security is implemented through the standard operating system security features
Cell Phones
• Cellular telephones (cell phones)
– Portable communication devices that function in a manner that is unlike wired
telephones
• Two keys to cellular telephone networks
– Coverage area is divided into smaller individual sections called cells
– All of the transmitters and cell phones operate at a low power level
• Almost all cell phones today have the ability to send and receive text messages and
connect to the Internet
• Types of attacks
– Lure users to malicious Web sites
– Infect a cell phone
– Launch attacks on other cell phones
– Access account information
– Abuse the cell phone service
Attacks on Virtualized Systems
• Just as attacks can be software-based or hardware-based, attacks can also target
software that is emulating hardware
• This type of software, known as virtualization, is becoming one of the prime targets of
attackers
What Is Virtualization?
• Virtualization
– A means of managing and presenting computer resources by function without
regard to their physical layout or location
• Operating system virtualization
– A virtual machine is simulated as a self-contained software environment by the
host system but appears as a guest system
• Server virtualization
– Creating and managing multiple server operating systems
• One of the factors driving the adoption of virtualization is the cost of energy
• Operating system virtualization is playing an increasingly important role in security
– Has allowed increased flexibility in launching attacks
– Is also being used to make systems more secure
Attacks on Virtual Systems
• Virtualization provides the ability to run multiple virtual computers on one physical
computer
• Virtualization can also be beneficial in providing uninterrupted server access to users
– By means of live migration and load balancing
• Security for virtualized environments can be a concern for two reasons
– Existing security tools were designed for single physical servers and do not
always adapt well to multiple virtual machines
– Virtual machines not only need to be protected from the outside world, but they
also need to be protected from other virtual machines on the same physical
computer
• Hypervisor
– Software that runs on a physical computer and manages one or more virtual
machine operating systems
– Can contain security code that would allow the hypervisor to provide security by
default to all virtual machines
• Another option is for security software to function as a separate program that is
“plugged in” to the hypervisor
• Another approach is running security software, such as a firewall and intrusion
detection system
– As a specialized security virtual machine on the physical machine
Hardening the Operating System
• Hardening the operating system to resist attacks is often a three-
pronged approach that involves:
– Managing updates to the operating system
– Protecting against buffer overflows
– Configuring operating system protections
• Update terminology
– The task of writing a secure operating system is daunting
– Due to the increased length and complexity of operating
systems
• Unintentional vulnerabilities were introduced and then
these were exploited by attackers
• Update terminology (continued)
– Security patch
• A general software security update intended to cover
vulnerabilities that have been discovered
– Hotfix addresses a specific customer situation
• Often may not be distributed outside that customer’s
organization
– Service pack
• A cumulative package of all security updates plus
additional features
• Patch management techniques
– Install updates automatically
– Download updates but let me choose whether to install
them
– Check for updates but let me choose whether to download
and install them
– Never check for updates
• Patches can sometimes create new problems
• Automated patch update service
– Used to manage patches locally instead of relying upon the
vendor’s online update service
• Advantages to an automated patch update service
– Can save bandwidth and time
– Computers that do not have Internet access can receive
updates
– Administrators can approve or decline updates for client
systems, force updates to install by a specific date, and
obtain reports on what updates each computer needs
• Advantages to an automated patch update service (continued)
– Specific types of updates that the organization does not test
can be automatically installed whenever they become
available
– Administrators can approve updates for “detection” only
– Users cannot disable or circumvent updates