HP OpenVMS Guide to System Security |
Security for the System Administrator |
System Security Breaches |
|
|
| |
The following sections describe these phases for both attempted and successful break-ins.
In all phases, train personnel to retain information and data as evidence, should there be a need to apprehend and prosecute the perpetrator.
Unsuccessful Intrusion
Attempts ![]()
Unsuccessful intrusion attempts include situations where someone
has attempted to guess passwords or browse through files.
Detecting
Intrusion Attempts ![]()
You usually detect intrusion attempts through the following
sources:
Identifying
the Perpetrator ![]()
Enabling file auditing simplifies identification of file browsers.
If, however, browsing is being initiated from another node in the
network, you must inspect the network server log file (NETSERVER.LOG)
that corresponds to the times of the protection violations. Coordinate
your investigation with the security administrator at the remote
node.
Identifying a perpetrator who is guessing passwords is considerably more difficult, especially when the source is anonymous, as from a dialup line. Usually, you must trade identification for prevention. Often the only way to positively identify an outsider attempting to enter the system requires that you permit further attempts while establishing the perpetrator's identity.
Preventing
Intrusion Attempts ![]()
The prevention phase for this kind of attack involves preventing
the would-be intruder from actually gaining access to the system
and making future attempts more difficult.
To reduce the opportunities for successful password guessing:
To reduce the opportunities for successful file browsing:
Successful Intrusions ![]()
A successful security breach can include a successful password
guessing scheme, theft or modification of either information or
system resources, and placement of damaging software on the system.
An intrusion may require a considerable amount of time to repair,
depending upon the skill and intent of the perpetrator.
Identifying the Successful Perpetrator ![]()
Identification is often the most difficult part of handling
an intrusion. First, you must establish whether the perpetrator
is an authorized user or not. This determines the nature of the
preventive measures that you will take. However, the distinction
between insiders and outsiders may be difficult to achieve.
Tradeoff Between Identification and Prevention ![]()
You may have to make a tradeoff between a positive identification of the intruder and preventing future attacks. Often, the data available initially does not allow complete identification. If it is important to identify the perpetrator, you will often find it necessary to permit continued intrusions while you analyze the intrusion activity. Increase your auditing. Consider planting traps in system procedures that are under your control (such as SYLOGIN.COM) to obtain additional information. Increase your system backup efforts to permit easier recovery if files become damaged.
Identifying external intruders is particularly difficult, especially if they use any switched forms of communication (such as dialup lines or public data networks). DECnet for OpenVMS software provides many features to help you trace the activity through the network back to the source node. If a local terminal is involved, physical surveillance may be appropriate.
When a switched connection is involved, one of the major computer security problems is the telephone system itself. Tracing a telephone or public data network connection is time-consuming. Chasing an intruder through the telephone system is likely to take months and will require the assistance of law enforcement authorities. The existence of multiple long-distance telephone services compounds the problem by increasing the number of organizations with whom you must deal.
As a result, identifying an outside intruder is usually worthwhile only when you have sustained substantial financial damage. In many cases, it may be more useful if you concentrate on preventing recurrences of the problem.
Securing
the System ![]()
The actions you must take to secure your system after an intrusion
depend on the nature and source of that intrusion. This section
describes these actions in order of priority.
Repair After a Successful Intrusion ![]()
After an intrusion, restore corrupted files. Decide whether
it is appropriate either to do a wholesale restoration of your system's
data or to repair problems as they are discovered. Look for modifications
to file protection that would have created paths for viruses and
for Trojan horses that were introduced into the system and may still
reside there.
|
|