TKK |
Networking Laboratory
| Studies
| S-38.153
S-38.153: Answers for May 2005 exam
Answers for May 2005
exam.
- As the shutdown expences are 50.000 €, the internet shop
must be quite large one with large amount financial and personal
details online. In this case to protect company reputation,
quick shutdown is reasonable choise. There may be a difference
if sensitive information is only on (still safe) backend
services. Many questioned absense of immdeiate backup
server.
- One solution is to prohibit access from internal server to other
servers expect to anti-virus companies. If company web servers
are vulnerable, it may be vice to block external access to those
also, unless thay are easily replaceable.
- The cheapest solution is to try educating users to select better
passwords (and enforcing good passwords) and that can be tried as
the first step. (Notifying users about bad passwords may create
new security problems.) However, the expence for devices is not
too great to be econimically feasible (with additiona high-tech
factor).
- Security model is explained in article "UMTS Security" (and on
slides). Essential points were explaining mutual authentication,
secure agreement on communication parameters, use of TMSI,
authentication quintet. GSM compatibility makes possible to use
fake base stations.
- The most serious mistake was using third-party system to log in
other system. Also having a large number of services and
providing shell-access for developers to a single host as well as
failure to update vulnerable services contributed to compromise.
On-line host-based IDS would have identified attack on Sourceforge
(so apache.org compromise would not happen); also one in
apache.org would have detected attack earlier.
- Network (packet, steteful, application-level) and host-based
firewalls. Between different policies: internet-intranet, different
departments, public services etc.
- Quite often it was no considered what information is public or
available by other means. Also for some cases availability and
integrity is far more important that confidentiality (like with
diabetes). Call records and email server logs, for example must have
high level of confientiality; and call records high integrity for
nbilling purposes. Routing table content and list of authorative name
servers is not secret, but its imporant to have proper integrity.
Router configuration is confidential as it may contain keys or
passords.
This page is maintained by Webmaster and
Markus Peuhkuri.
Last update on the page
2005-05-30 15:40
URL: http://www.netlab.tkk.fi/opetus/s38153/k2005/answers-2005-05.shtml
[TKK
> Electrical and Communications Engineering
> Studies
]