DOC PREVIEW
UI CS 448 - Case Study: Firewall

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS448/548 Sequence 28Case Study: Firewall!This section discusses an example of applying an eight-stage risk assessment methodology to firewalls!The reason for selecting this case study is to stimulate a discussion about the granularity of solutions.!Source –http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper012/nissc96.pdf–APPLYING THE EIGHT-STAGE RISK ASSESSMENT METHODOLOGY TO FIREWALLS–David L. Drake, et.al.–Figures and quoted material are directly adopted from the paper.1CS448/548 Sequence 28Risk Assessment: Firewall!Eight-Stage Methodology–squares: internal influences–triangle: external influence–circle: consequences–will occur if activities are insufficient2CS448/548 Sequence 28Risk Assessment: Firewall!Data gathering:–“Obtain the definition of the security boundary and the interfaces that will be defended by the firewall, both automatically and procedurally. The definition should be provided in the security policy”.–“Obtain »the list of system assets to be protected, »what constitutes a security breach, »the associated harm that could befall the assets, and »a quantitative loss per asset if it were compromised, modified by an unauthorized agent, or its availability were lost”. 3CS448/548 Sequence 28Risk Assessment: Firewall!Data gathering:–“Delineate »the attack scenarios that will (and will not) be defended against, »the likelihood of occurrence of each.” –“Delineate each of the system's countermeasures that protect it against attack. »A determination is made for each countermeasure if it is used to obstruct, detect or recover from an attack, or to detect or recover from a security breach. »This distinction is used to support the quantitative assessment of each countermeasure's effectiveness.”4CS448/548 Sequence 28Risk Assessment: Firewall!Example firewall uses amalgamation of actual system–firewall is a host using IP-based filtering–external router connected to the Internet–LAN supports various computer platforms–critical application data»company proprietary data»financial and privacy act data5CS448/548 Sequence 28Risk Assessment: Firewall–Data flow»“email in both directions»both internal and external hosts are allowed to "ping" the firewall (for»connectivity testing)»both in-coming and out-going Domain Name Service (DNS) requests»non-anonymous File Transfer Protocol (ftp)»World Wide Web”.6CS448/548 Sequence 28Table 1: Security Policy!Security Policy7CS448/548 Sequence 28Risk Assessment: Firewall8CS448/548 Sequence 28Risk Assessment: Firewall9CS448/548 Sequence 28Risk Assessment: Firewall10CS448/548 Sequence 28Risk Assessment: Firewall!Chains and Analysis–they demonstrate 2 chains –assume 80 chains for typical assessment »why 80 +- ?–1st chain is attack firewall is designed to protect against–2nd chain shows “human error” scenario»can not be handled by firewall11CS448/548 Sequence 28Risk Assessment: Firewall12CS448/548 Sequence 28Risk Assessment: Firewall13CS448/548 Sequence 28Risk Assessment: Firewall!False Sense of Security–firewalls make people happy»even if they don’t know what it can do»excuse for getting lazy w.r.t. enforcing security–still many problems, open doors–even though outside users might not be able to get in, inside users still have access to all resources!About this paper–seems interesting approach but unimplementable–seems to suffer from all problems associated with prob. risk assessment–scalability questionable14CS448/548 Sequence 28Risk Assessment: Firewall!Nice quote–“Firewalls are the wrong approach. They don’t solve the general problem, and they make it very difficult or impossible to do many things. On the other hand, if I were in charge of a corporate network, I’d never consider hooking into the Internet without one. And if I were looking for a likely financially successful security product to invest in, I’d pick firewalls.” - Charlie


View Full Document

UI CS 448 - Case Study: Firewall

Download Case Study: Firewall
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Case Study: Firewall and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Case Study: Firewall 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?