---
title: 'Lecture 03 System Security II'
disqus: hackmd
---
:::info
ST1004 Infocomm Security
:::
ISEC Lecture 03 System Security II
===
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 80%;
display: block;
}
</style>
## Table of Contents
[TOC]
Client Security
---
- securing client involves
- using hardware system security
- securing OS software
- protecting peripheral devices connected
### Hardware System Security
- involves diff tools
- secure booting tools
- hardware root of trust
- preventing electromagnetic spying
__Secure Booting__
- __BIOS (Basic Input/Output System)__
- firmware used on early comps to hold boot process
- ability to update BIOS with firmware update allowed threat actor to create malware to infect BIOS
- to combat BIOS attacks __UEFI (Unified Extensible Firmware Interface)__ developed to replace BIOS
- __secure boot__ security standard also created
- when using UEFI & secure boot, comp checks digital signature of ea piece of boot software
- if signatures deemed valid comp boots
- else doesn't boot

__Hardware Root of Trust__
- chain of trust
- ea element of boot process relies on confirmation of prev element to know that entire process is secure
- hardware root of trust
- strongest starting point is hardware which cannot be modified
- security checks "rooted" in hardware checks
__Electromagnetic Spying__
- security researchers found that it's possible to pick up electromagnetic fields & read data that's producing them
- US gov developed classified standard
- to prevent attackers from picking up electromagnetic fields from gov buildings
- AKA __Telecommunications Electronics Material Protected from Emanating Spurious Transmissions (TEMPEST)__
__Supply Chain Infections__
- supply chain
- network that moves product from supplier to customer
- diff steps in supply chain allowed for malware to be injected into products during manufacturing/storage
- AKA __supply chain infections__
- supply chain infections considered dangerous
- if malware planted in ROM firmware of device, difficult/impossible to clean infected device
- users may be receiving infected devices at point of purchase, unaware of infection
- cannot be easily prevented
### Securing OS Software

__OS Security Configuration__
- typical OS security config include
- disabling unnecessary ports & services
- disabling default accounts/passwords
- employing least functionality
- app whitelisting/blacklisting
- instead of recreating same security config on ea comp
- tools can be used to automate process
- in windows
- security template is collection of security config settings that can be deployed to other devices
__Patch Management__
- OS has increased in size & compexity
- new attack tools made secure functions vulnerable
- __security patch__ - software security update to repair discovered vulnerabilities
- __feature update__ - includes enhancements to software to provide new/expanded functionality
- doesn't address security vulnerability
- __service pack__ - accumulates security updates & additional features
- patch management tools
- tools for patch distribution
- patch reception
- __patch distribution__
- patches sometimes create new problems
- vendor should thoroughly test before deploying
- __automated patch update service__
- manage patches locally than rely on vendor's online update service
- advantages
- downloading patches from local server can save bandwidth & time
- admins can approve/decline updates, force updates to install by specific date, & obtain reports on what updates ea computer needs
- admins can approve updates for "detection" only
- allows them to see which comps need update w/o actually installing it

- patch reception
- today patches auto downloaded & installed
- ensures software always up-to-date
- Microsoft changed its security update procedures & user options
- forced updates
- no selective updates
- more efficient distribution
- up-to-date resets
__Antimalware__
- antimalware software packages can provide added security
- software includes
- antivirus
- antispam
- antispyware
- __Antivirus (AV)__ - software that examines a computer for infections
- scans new documents that might contain viruses
- searches for known virus patterns
- weakness of anti-virus
- vendor must continually search for new viruses, update & distribute signature files to users
- newer approach to AV is heuristic monitoring (AKA __dynamic analysis__)
- uses variety of techniques to spot characteristics of virus instead of attempting to make matches
- one AV heuristic monitoring technique - __code emulation__
- questionable code executed in virtual env to determine if its virus
- antispam
- mail gateway - monitors emails for spam & other unwanted content
- some spam can slip through
- antispam filtering software traps spam
- spam filtering methods
- create list of approved & nonapproved senders
- blacklist - nonapproved senders
- whitelist - aapproved senders
- blocking certain file attachment types
- bayesian filtering - divides email messages into 2 piles
- spam
- nonspam
- antispyware - helps prevent comps from becoming infected by diff types of spyware
- pop-up - small windows appearing over website
- usually created by advertisers
- pop-up blockers - separate program as part of anti-spyware package
- incorporated within browser
- allows user to limit/block most pop-ups
- alert can be displayed in browser
- gives user option to display pop-up
- trusted OS
- __OS hardening__ - tightening security during design & coding of OS
- __trusted OS__ - OS that has been designed through OS hardening

Physical Security
---
- includes
- external perimeter defenses
- internal physical access security
- security for protecting hardware device itself
### External Perimeter Defenses
- designed to restrict access to equipment areas
- type of defense includes
- barriers
- guards
- motion detection devices
__Barriers__
- fencing - usually a tall, permanent structure
- modern perimeter fences equipeed with other deterrents like proper lighting & signage
- cage - fenced secure waiting station area
- Eg. area that contain visitors to facility until approved for entry
- barricade - large concrete ones used
- bollard - short but sturdy vertical post used as vehicular traffic barricade to prevent car from "ramming" into secured area
__Guards__
- human security guards considered active security elements
- video surveillance cameras transmit signal to specified & limited set of receivers called __closed circuit television (CCTV)__
- frequently used for surveillance in areas that need security monitoring like banks, casinos, airports & military installations
__Motion Detection__
- determining object's change in pos in relation to its surroundings
- movement usually generates audible alarm

### Internal Physical Access Security
- include
- door locks
- access logs
- mantraps
- protected distribution systems for cabling
__Door Locks__
- __standard keyed entry lock__ provides minimal security
- __deadbolt locks__ provide additional security & require that a key be used to both open & lock the door
- __cipher locks__ are combination locks that use buttons that must be pushed in proper sequence
- can be programmed to allow certain individual's code to be valid on specific dates & times
- key management procedures
- keep track of keys issued & require users to sign their name when receiving keys
- receive proper approvals of supervisors or other appropriate persons before issuing keys
- when making duplicates of master keys, mark them "Do Not Duplicate" & wipe out manufacturer's serial numbers
- secure unused keys in locked safe
- change locks immediately upon loss or theft of keys
__Access Logs__
- access list
- record of individuals who have permission to enter secure area
- records time they entered and left
- today cipher logs & other tech can create electronic access logs
__Mantraps__
- separates secured from nonsecured area
- monitors & controls 2 interlocking doors
- only 1 door can open at any time
- used at high-security areas where only authorised persons can enter
- Eg. cash handling areas & research labs
__Protected Distribution Systems (PDS)__
- system of cable conduits used to protect classified info that's transmitted between 2 secure areas
- created by US Department of Defense (DOD)
- 2 types of PDS
- __hardened carrier PDS__ - conduit constructed of special electrical metallic tubing
- __alarmed carrier PDS__ - specialised optical fibers in conduit that sense acoustic vibrations that occur when intruder attempts to gain access

### Computer Hardware Security
- physical security protecting hardware of host system
- most portable devices have steel bracket security slot
- cable lock can be inserted into slot & secured to device & cable connected to lock can be secured to desk/chair
- safe/secure cabinet
- can be prewired for power & network connections
- allows devices to charge while stored and receive updates
Application Security
---
- need to protect apps that run on devices
- aspects
- app development security
- secure coding techniques
- code testing
- virtualisation
### Virtualisation
- virtualisation - means of managing & presenting computer resources w/o regard to phy layout/location
- host virtualisation
- entire OS env simulated
- vm - simulated software-based emulation of computer
- host system runs hypervisor that manages virtual OS & supports 1 or more guest systems
- advantages
- new virtual server machines can be made available __(host availability)__ & resources can be easily expanded/contracted as needed __(host elasticity)__
- reduce costs
- fewer phy comps purchased & maintained
- provide uninterrupted server access to users
- supports live migration which allows vm to be moved to diff phy comp with no impact to users
- test latest patches on vm before installing
- snapshot of particular state of vm can be saved for later use
- testing existing security config __(security control testing)__ can be performed using simulated network env
- suspicious program can be loaded into isolated vm & executed __(sandboxing)__
- if malware, only vm impacted
- security for virtualised env
- guest OS remained dormant may not contain latest patches & security updates
- not all hypervisors have necessary security controls to keep out attackers
- existing security tools designed for single physical servers & not always adapt well to multiple vm
- vm must be protected from outside network & other vm on same comp
Chapter Summary
---



###### tags: `ISEC` `DISM` `School` `Notes`