William Slater's CYBR 515 Blog

William Slater's CYBR 515 Blog
CYBR 515 - Security Architecture and Design

Tuesday, October 11, 2011

Post 026 - CYBR 515



Implementing E-Mail Security Solutions to Defend Against E-Mail Dangers, Scams, and SPAMS

This week in the CYBR 515 - Security Architecture and Design class, we are studying E-Mail Dangers and how to implement security against these dangers to mitigate the risks.

I received the e-mail below this morning. The header is also included for those who like to read such things The point in including this scam e-mail in this blog is to show:

1) It looks VERY authentic and legitimate. They want you to believe that they are from Microsoft Canada and that they are legitimate.

2) That even the best spam filters can't catch everything and that your ability to be secure in the use of e-mail requires constant vigilance and education about the dangers that are associated with e-mail threats.

You brain, your awareness, and your vigilance may be some of your best defenses in e-mail and other places you touch and use the Internet (especially the web via web browsers).

===============================================================

E-Mail Header:

X-MSK: CML=3.201000
Received: from zuul.matrixconsulting.net ([10.4.5.2]) by powerweb.net with MailEnable ESMTP; Tue, 11 Oct 2011 10:33:03 -0500
X-ASG-Debug-ID: 1318347175-00958a099a1049e00001-LAYJgu
Received: from sharpe (78-33-47-12.static.enta.net [78.33.47.12]) by zuul.matrixconsulting.net with ESMTP id ypTHT0fs5gSIj2Qr for ; Tue, 11 Oct 2011 11:32:55 -0400 (EDT)
X-Barracuda-Envelope-From: customers@microsoft.ca
X-Barracuda-Apparent-Source-IP: 78.33.47.12
From: "Microsoft-Canada"
Subject: Critical Update For Microsoft Firewall and Security Center 4081
To: slater@billslater.com
X-ASG-Orig-Subj: Critical Update For Microsoft Firewall and Security Center 4081
Content-Type: text/plain;
Reply-To: customers@microsoft.ca
Date: Tue, 11 Oct 2011 16:32:57 +0100
X-Priority: 1
X-Library: Indy 8.0.25
X-Barracuda-Connect: 78-33-47-12.static.enta.net[78.33.47.12]
X-Barracuda-Start-Time: 1318347175
X-Barracuda-URL: http://zuul.matrixconsulting.net:8000/cgi-mod/mark.cgi
X-Virus-Scanned: by bsmtpd at matrixconsulting.net
X-Barracuda-Spam-Score: 0.64
X-Barracuda-Spam-Status: No, SCORE=0.64 using per-user scores of TAG_LEVEL=3.5 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=4.0 tests=BSF_SC0_SA601, MISSING_MID, NORMAL_HTTP_TO_IP
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.2.77031
Rule breakdown below
pts rule name description
---- ---------------------- --------------------------------------------------
0.14 MISSING_MID Missing Message-Id: header
0.00 NORMAL_HTTP_TO_IP URI: Uses a dotted-decimal IP address in URL
0.50 BSF_SC0_SA601 Custom Rule SA601
Message-Id: <20111011153304.70ED92067105@zuul.matrixconsulting.net>
X-ME-Bayesian: 0.000000
Return-Path:

===============================================================

E-Mail Text Body:

Tuesday, October 11, 2011,
10:33 AM

Dear Customer,

Please notice that Microsoft has recently issued a Security Update for Microsoft Windows Firewall and Security Center.

This Update is to prevent malicious users from getting access to your computer files by executing arbitary code on a new buffer overflow found in the windows firewall process.

This is an high-priority updates. In order to help protect your computer against security threats and malicious code.

Please follow these instructions:

1. Download the file from http://200.21.20.163/SecurityPatch/SECURITY_FIX_4081.exe

2. Double-click on SECURITY_FIX_4081.exe to start the update.

3. Click on *Allow Access*

This is an Automated Message produced by Microsoft Canada Co., Please Do Not Reply

Microsoft Team.


===============================================================

Stay safe online!

Best regards,

William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
slater@billslater.com
williamslater@gmail.com
http://billslater.com/career
Chicago, IL
United States of America

Monday, October 10, 2011

Post 025 - CYBR 515


Week 7 Assignments

Theme for the Week - Electronic Mail Security

Learning Objectives:
Plan for a secure email infrastructure where email is exchanged and stored securely and only recipients can unencrypt them.
Explain the use of Pretty Good Privacy (PGP) in encrypting and decrypting email.
Differentiate between off-line and on-line email encryption techniques.
Conduct an email risk assessment.
Readings:
Chapter 7 in your textbook.

This week:
Most of us involved with network security find it humorous that email, in general, is no more secure today than when it was proposed in the 1970s. Think of it like a post card in the snail mail system where anyone can read it if they see it. We protect ourselves behind elaborate firewalls and encrypt our Local Area Networks, wireless networks, and Virtual Private Networks. Then, we send plain text email across a public network where anyone with the appropriate network access and a protocol analyzer can intercept and read it. There are multiple ways to protect email from unauthorized access. In this lesson, we examine how electronic mail can be properly secured.
Assignment 7_1 (On-line Quiz)
Take this ten question true/false and multiple choice chapter quiz over the reading assignment. Quizzes are a "participation grade," which means that you can retake them as many times as necessary. However, please be aware that low scores are a sign that you need to go back to the reading assignment, slow down, and read more carefully.
You need to take the quiz by the end of the week to earn credit.
Assignment 7_2 (Post to this week's discussion forum)
Post a substantive answer to one of the following questions. Please select a question that has not been previously answered by one of your classmates, until all questions have been answered at least once. Once that has been done, you may select any question that has only been answered once. Once you have submitted your initial post, read each initial post and respond to at least three. Remember to cite your sources.

1. Pretty Good Privacy (PGP) documentation often refers to a private key in an asymmetric encryption public/private key pair as a secret key. What problems can this cause and why?

2. What encryption/decryption and hashing algorithms are used in PGP and how are they used?

3. As security consultants, you are asked to evaluate PGP for possible use to encrypt sensitive information for one of your customers. What potential problems or issues do you see with it and what steps could you take to satisfy yourself that the risk is acceptable?

4. Most email is sent as clear text, even though the means to secure it have been around for years. Why do you think most people don't take the extra step of protecting their email? What can be done to promote securing email for general users?

5. How would I turn on Secure/Multipurpose Internet Mail Extensions (S/MIME) in Microsoft Outlook and what consequences would doing so have on recipients of my email? It would be a good idea to use the Internet and other appropriate sources for this information. Remember to cite your sources.

6. What encryption/decryption and hashing algorithms are used in S/MIME and how are they used?

7. What is the difference between PGP and S/MIME? Include a comparison of off-line and on-line encryption in your answer.

8. DomainKeys Identified Mail (DKIM) overcomes some of the problems and restrictions with other secure mail systems. What are the problems and restrictions that it overcomes and how does it overcome them?

9. What does the term Radix-64 conversion mean and how does it work? Provide an example

10. How are keys managed in PGP? As part of your answer, include information on where private keys are stored and how public keys are shared.

Our trivia question for the week: What cryptographic system was used by the Japanese navy in World War 2, and how did we break their code?
General Posting Guidelines (for participation): Postings are counted as participation for the week. Make sure all postings for this week's assignments are posted to this week's discussion forum. You must post at least two substantive messages to get minimum credit for participation (a 'C' grade). Two messages on different days gets a 'B' for participation - more postings (including answering other questions) get more credit. To qualify for an 'A' grade, you must post at least three critical thinking messages on three different days. Postings on the last day of the lesson will not count for credit since other students will not have sufficient time to respond or participate in your discussion. Post early and often. Don't wait until the last minute!

Assignment 7_3 (Attach to this assignment)
For this assignment, create a design for a secure email infrastructure. You can choose any email system, server, client, and security appliance or software that you know about or can find information about from any appropriate source. Your design may be real or notional. It may include components that exist or that are only a figment of your imagination. The only rule about using any component is that you must explain how it contributes to the security of your email system and what, if any, drawbacks or limitations it has. Produce a Visio diagram of your logical infrastructure and a one page summary that explains the major components, their functions, and capabilities/limitations. Include protection against spam and phishing emails in your infrastructure.
Save your deliverables in individual files named CYBR515 Assignment 7_3a and CYBR515 Assignment 7_3b , and attach them to this assignment.
Again, please note that both files must be attached at the same time that you submit your assignment. If you submit the assignment with only one file, you will not be able to attach the second one without help from your instructor.

Assignment 7.4 Milestone 3 (Due next week)
You should devote some time to the Milestone 3 submission for your semester project this week. The next set of deliverables are due on the last day of Week 8. Get started as soon as you can to avoid the last minute rush.

Post 024 - CYBR 515



Thoughts on Strong, Positive, Leadership - You CAN Lead by Inspiring People

I believe that positive Leadership that inspires people and gets the best results. I do not believe that Steve Jobs was a good, positive Leader. He was a visionary and an innovator.

These people are my role models for strong, positive Leadership:


I invite you to study the Leadership abilities and style of these people and you will start to understand how each, in their own special way was able to change the world and make it a better place without intimidating and humiliating people.

When you see Leaders that lead by bullying, mobbing tactics, intimidating and humiliating people, refer them to this post and just say NO!!!

Best regards,

William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
slater@billslater.com
williamslater@gmail.com
http://billslater.com/career
Chicago, IL
United States of America


Sunday, October 9, 2011

Post 023 - CYBR 515









Steve Jobs shows off the new Apple iPad 2 in 2011









Can a Leadership Style Adversely Affect the State and Quality of an Organization's Information Security?

Apple's Co-founder and former CEO, Steven Paul Jobs (1955 - 2011), passed away on October 5, 2011. May he rest in peace, and may his family and friends be comforted and experience rapid healing during their time of intense loss.

Much has been said of Mr. Job's visionary contributions to the work of computing and personal communications, and how he empowered the masses by having the vision to humanize technology and make it useful. That is all noteworthy, and significant, and it has certainly made the world a more interesting place.

But this article shows the real Steve Jobs, and the way he treated the people around him, who were executing his vision to change the world. http://gawker.com/5847344/what-everyone-is-too-polite-to-say-about-steve-jobs. I was aware of these traits, but it's documented so well here that it deserves to be shared. I was also aware that Mr. Jobs' tyrannical ways worked some people so hard that it broke up marriages and almost drove some people crazy. It's a poor leadership style that in my opinion could not have continued, if he had continued to live.

And since this is a blog for a course in Security Architecture and Design, the point of this post, however, is that I personally believe that a poor tyrannical, leadership style, based on bullying, intimidation, and humiliation, can itself constitute a threat to information security because it increases risks that an organization doesn't want. This is because when things start to go awry, many people who work on the Team of a Tyrant may become passive aggressive and enjoying watching a Tyrannical Leader fail. I believe that there is a human trait in which people like to see what goes around comes around. If a tyrant mistreats people, those people will probably be happy to see him or her get what is coming to them. If that means watching a tyrant take the heat for situations like 1) the compliance penalities associated with a data breach; or 2) failing to secure something that should have been secured during an information security-related project; or 3) a Business Continuity Plan that is missing critical components that will ultimately doom it to failure if and when it is ever executed; employees will be only too glad to see these things occur, despite the fact that it could and will adversely affect an organization. So I believe that a poor leader can create situations that in raise the information security risk factors in an organization.

What's the answer? I will share what I believe is the answer in a in a post that follows this one.

Friday, October 7, 2011

Post 022 - CYBR 515





U.S. Air Force Predator firing a deadly Hellfire Missile











U.S. Air Force Predator Crew





Exclusive: Computer Virus Hits U.S. Drone Fleet
By Noah Shachtman October 7, 2011 | 1:11 pm | Categories: Drones

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”

My comments:

This is the first public release of such information. About 14 months ago with the disclosure of the Stuxnet worm and its effect on equipment in the Iranian Nuclear facilities, one industry observer noted that this was the public beginning of specialized, weaponized computer software. With the advent of a virus that is quietly monitoring U.S. Air Force Drone Crews as they fly operational missions in Afghanistan and other forward operating locations, we may be witnessing the second chapter of specialized, weaponized computer software.

As a former U.S. Air Force Officer, I sincerely wish the men and women of the U.S. Air Force Drone Team the best as they fight this newly identified danger to their operational mission.

------------------

Post 021 - CYBR 515





Electronic Health Records, the Department of Veterans Affairs, the Department of Defense and the Future

The white paper link about the VA and the DoD and the State of Health Records Initiatives and diagram above describe a big picture view of what I am doing in my career now with VA and DoD-related Health Care Records Initiatives. You may want to download and view this new white paper

http://download.1105media.com/GIG/Custom/2011PDFS/InsightsHealthIT.pdf

I am managing a program that develops the enabling software for these initiatives.

This is truly the future of Health Care Records and because it will pass Personally Identifiable Information (PII) and other related sensitive information over a complex network of MANY distributed systems and applications, it represents MANY opportunities for the application of security controls and Cybersecurity best practices to protect this information. This is one more reason I am happy that I enrolled in the M.S. in Cybersecurity program at Bellevue University on August 29, 2011.

=====================

William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
slater@billslater.com
http://billslater.com/career
Chicago, IL
United States of America


Post 020 - CYBR 515

October is now National Cybersecurity Awareness Month

As an M.S. student in Cybersecurity at Bellevue University, I am happy to inform you that October is now National Cybersecurity Awareness Month. Please share with your friends, kids, grandkids, co-workers, neighbors, Facebook Friends, etc.

http://www.staysafeonline.org/

Stay Safe Online!

William F. Slater, III, M.S., MBA, PMP, CISSP, SSCP, CISA, MCITP, MCSE, ISO 20000, ISO 27001 Auditor, ISO 27002, MCP #3585

Project Manager / Program Manager
Chicago, IL
slater@billslater.com