A Software Security Assessment System Based On Analysis of
|
|
|
- Prosper Preston
- 10 years ago
- Views:
Transcription
1 A Software Security Assessment System Based On Analysis of Vulnerabilities 1,2 Chenmeng Sui, 1 Yanzhao Liu, 2 Yun Liu, 1 China Information Technology Security Evaluation Center, Beijing,China,[email protected] 2, Corresponding Author Key Laboratory of Communication and Information Systems, Beijing Jiaotong University,Beijing,China, @bjtu.edu.cn,[email protected], Abstract In recent years, software security plays an important role in verifying system safety and avoiding the casualties and property losses, but it is difficult to assess system security in traditional software engineering and software test. Focusing on the software security assessment system, this paper based on the vulnerability analysis method, which takes the advantage of both qualitative analysis and quantitative analysis to assess the security of software. The major methods of domestic and foreign software security measurement are discussed. Through the comparative analysis of existing vulnerability rating system, especially the CVSS and VRSS, this paper discovers their respective advantages and proposes a more accurate rating system to obtain the final security score of the software system. An example application is provided in the paper, which shows that the assessment system we proposed is practical. 1. Introduction Keywords: software security, vulnerability analysis, CVSS, VRSS, Quantitative scoring, SSAS Software security refers to the software within the stipulated time will cause harm to the system itself and systems outside probability, such hazards include physical security, substantial property damage and great expectations of the event.[1,2] As one of the most important attributes for trustworthy software, security can protect people's property and interests will not be threatened. Therefore, the trustworthiness of the software referred to the security is attracted high attention by researchers. Because of the importance of software security, many security experts at home and abroad are working on software security evaluation. For example, the business transaction information is based on computer network security, create a relatively safe, reliable, and convenient E- business applications, the information to provide better and reliable protection[3].because of the importance of software security, many security experts at home and abroad are working on software security evaluation. At present, the most frequently used network security evaluating methods are risk evaluating method and leak scanning tool software to test and evaluate the security degree of the system[4]. However, measuring security is hard because the discipline itself is still in the early stage of development. According to the different characteristics, and the commonly used method of software security testing at home and abroad are divided into 3 categories: based on reliability analysis method, based on formal models method and based on software security testing method[5]. These methods have their advantages and disadvantages, but they do not specifically quantify a degree of security software. So the focus of our research is to put forward a software security assessment system that can give a specific score of the security. Along with the software scalability, connectivity and complexity increases, more and more software flaw and vulnerabilities exposed. Attackers can exploit vulnerabilities in software to jeopardize intellectual property, consumer trust, and business operations and services. So vulnerability is the root causes of software security and analyzing and rating them is our first step to establish this security assessment system. Journal of Convergence Information Technology(JCIT) Volume7, Number6, April 2012 doi: /jcit.vol7.issue
2 Over the past several years, a number of large computer security vendors and non-profit organizations have developed, promoted, and implemented procedures to analyze and rate the vulnerabilities. We combine the advantages of the CVSS(Common Vulnerability Scoring System), a vulnerability scoring system designed to provide an open and standardized method for rating software vulnerabilities[6], and the VRSS, a method for rating and scoring vulnerabilities, which combines historical vulnerability rating systems advantages[7], in our research. By improving and expanding these two systems, we propose a new method to score the vulnerability. The score of each vulnerability is eventually used in software security assessment system and the final security score can reflect the security of software. The paper is organized as follows. Section 2 introduces the related content of software vulnerability, including the vulnerability properties and classification. Section 3 analyzes the rating systems of vulnerabilities, especially the CVSS and VRSS. Section 4 presents our improvement and proposes our new software security assessment system. Section 5 gives an example application to prove our system is practical. Finally, Section 6 is the conclusion of the paper and some future works will also be shown. 2. SOFTWARE VULNERABILITIES In software security, vulnerabilities play a special role. A vulnerability means a bug, a flaw, a weakness, or an exposure of an application, system, device, or service which could lead to a failure of confidentiality, integrity, or availability [8,9]. RFC 2828 defining vulnerability as system design and flaws or weaknesses in the management or operation, can be exploited to violate system security policy. As Cheswick and Bellovin noted, Any software, regardless of whether it looks how safe it is, of which hides a vulnerability [10]. So understanding of the nature of the vulnerability is very helpful to our research on software security. First of all, we need to categorize vulnerabilities and analyze their attributes, so as to evaluate the impact of vulnerabilities on software security Vulnerability Classification There are a great variety of different vulnerabilities existing for different kinds of software. So how to classify these vulnerabilities validly is a very practical problem. At present, the vulnerability classification mainly used in computer systems security assessment areas such as intrusion detection and software engineering[11]. Nearly 30 years, many research institutions and researchers have carried out work in this area. Comparison of productive work are: Landwehr proposed a three-dimensional property classification including vulnerability origin, time and location; Longstaff increased the classification of access and easy offensive; Power proposed a classification based on hazard; Du and Mathur s method describes the causes, impact and restoration property of vulnerabilities; and Bishop s 6-axis classification, Knight s Four types classification and Venter s harmonized classification[12]. Through the analysis of various classifications above, we can see that each of these classifications is in fact based on the vulnerability of certain attributes to classify. So effects of different types of vulnerabilities on software security in the end also were caused by their attributes Vulnerability Attributes Now that we select vulnerabilities as metrics to evaluate software security, then the key question becomes the property of each category of vulnerability analysis and their specific impact on software security. Through research on security vulnerabilities in the past, we can find these basic attributes include: vulnerability types, causes, consequences and locations, and so on. In the related studies in the literature [12], professor Fang divided vulnerability attributes into 5 main categories: belonging-related, attack-related, cause-related, time-related and other attributes. And table 1 shows these five types of attributes subdivide again 22 specific attributes. 212
3 Table.1 Related attributes of security vulnerability Belongingrelated Attack-related Cause-related Time-related others manufacturer Hard or easy Origin genesis Involve time Identification num OS type Attack complexity Impacts Time impact Vulnerability name Application Attack source Security threats Release time Repair action Component type Attack methods Update time Object and effect speed location Access vector Info source Not every vulnerability attributes are useful for the security assessment. So, choosing which properties to analyze and how to quantify these properties is what we have to focus on. Only through in-depth studies on various attributes of the vulnerability, so as to develop the most suitable analysis method and evaluation criteria of the project. In the following section, we will introduce two vulnerability rating systems. 3. CVSS and VRSS Over the past several years, a number of large computer security vendors and non-profit organizations have developed, promoted, and implemented procedures to rank information system vulnerabilities. The United States computer emergency readiness team(us-cert) vulnerability scoring system assigns a score between 0 and 180 for each vulnerability. The SANS Institute has a vulnerability scoring system that is used by a group of security researchers to assign severity ratings to certain vulnerabilities. Microsoft has a vulnerability rating system known as the Microsoft Security Response Center Security Bulletin Severity Rating System[13]. A plan for the new system, called the Common Vulnerability Scoring System(CVSS), was unveiled at the RSA Conference in San Francisco in February, National Computer Network Intrusion Protection Center recently proposed a new vulnerability rating and scoring system named VRSS for qualitative rating and quantitative scoring vulnerabilities. All the methods of evaluation, only the CVSS and VRSS can give a specific vulnerability score and the calculation details. Next, we focused on both of these methods CVSS The Common Vulnerability Scoring System (CVSS) was introduced by the National Infrastructure Advisory Council (NIAC) and is now managed by the Forum of Incident Response and Security Teams (FIRST). CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities[9]. Since CVSS was published, it has been widely adopted by a variety of organizations. CVSS metrics for vulnerabilities are divided into three groups: Base metrics measure the intrinsic and fundamental characteristics of vulnerabilities that do not change over time or in different environments. Temporal metrics measure those attributes of vulnerabilities that change over time but do not change among user environments. Environmental metrics measure those vulnerability characteristics that are relevant and unique to a particular user s environment. Each group produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual representation that reflects the values used to derive the score. The base metrics are necessary to the assessment system, while the temporal and environmental metrics are not required. So we mainly focus on the base metrics and Table.2 lists the base metrics and the possible values for each metric. 213
4 Table.2 CVSS base metrics Base Metric Metric value Score Integrity None(N)/Partial(P)/Complete(C) 0/0.275/0.660 Availability None(N)/Partial(P)/Complete(C) 0/0.275/0.660 Confidentiality None(N)/Partial(P)/Complete(C) 0/0.275/0.660 Access Vector Local(L)/Adjacent network(a)/network (N) 0.395/0.646/1.0 Access Complexity High(H)/Medium(M)/Low (L) 0.35/0.61/0.71 Authentication None (N)/Single(S)/Multiple (M) 0.704/0.56/0.45 The base equation is the foundation of CVSS scoring. The base equation is: BaseScore=round_to_1_decimal(((0.6*Impact)+(0.4*Exploitability) 1.5)*f(Impact)) Impact=10.41*(1-(1-ConfImpact)*(1-IntegImpact)*(1-AvailImpact)) Exploitability=20*Access Vector*Access Complexity*Authentication The scoring process first calculates the base metrics according to the base equation, which delivers a score ranging from 0 to 10, and creates a vector. This score can visually show an impact on basic security properties of software from a vulnerability. CVSS provides a common assessment method, helps security form a unified standard. So we apply its base metrics to our system VRSS VRSS is a new vulnerability rating system and scoring system for qualitative rating and quantitative scoring vulnerabilities, which can combine respective advantages of all kinds of vulnerability rating systems. VRSS has two important steps. One is rating method and the other is scoring method. Figure.1 shows the framework of VRSS. Rating Level Scoring Range High (6.00, 10.00] Vulnerabilities Medium (2.00, 6.00] Low (0.00, 2.00] Figure 1. The framework of VRSS According to the CVSS base metrics, VRSS use confidentiality, integrity, and availability properties to evaluate the risk level of vulnerabilities and the possible values for each of these three security properties are None, Partial and Complete. Each of the three metrics has three different values, so considering these three metric, there are 27 kinds of cases through combination of the three metrics. Ultimately there are 10 possible impact score and it is an intermediate result which will be used in the scoring method. In the second step, VRSS use exploitability metrics to calculate quantitative score. The exploitability metrics capture how the vulnerability is accessed and whether or not extra conditions are required to exploit it and the metric values are totally reference CVSS base metrics. The equations are listed as follows: Quantitative Score=Impact Score+ Exploitability Score; Exploitability Score=2 * Access Vector * Access Complexity * Authentication The result of VRSS, which is similar with the methods of X-Force and Vupen, is more consistent with the normal distribution than CVSS v2[7]. 4. Software Security Assessment System SSAS 214
5 In the previous chapter, we have already presented and analyzed the attributes, types and evaluation methods of vulnerabilities. In order to give a quantitative characterization to software security, we make some improvements to CVSS and VRSS, so as to propose SSAS in this section, a system that based on analysis of vulnerabilities. We will introduce SSAS systematically in the following parts Improvement of CVSS and VRSS CVSS As an international standard, CVSS provides an open framework and a tool to quantify the severity and risk of vulnerabilities. In addition, CVSS provides a common assessment method, which could help security field form a unified standard. Thus, relatively speaking, CVSS has wider development prospect. But on the other hand, no matter how scientific and perfect standard-setting, in order to work in the real application, the standard must be combined with specific application environments. CVSS use confidentiality, integrity, and availability properties to evaluate the base impact and the possible values for each of the three security properties are none, partial and complete. The classification of the possible values is not enough for our system. So according to the classification and quantitative criteria in reference [14], we give our specific quantitative criteria in Table.3, Table.4 and Table.5. Table.3 Quantitative criteria of integrity Description Implant root Trojan horse, can append, modify or create any file content Can use ESP to append, modify, delete or create some of the contents of the file or the root processes memory space s data structure. Can use garbage or ESP to append, modify delete or create some specific file content or processes memory space s data structure of several normal users Can use garbage or ESP to append, modify, delete or create some files or processes space s contents of normal users No effect on system integrity Table.4 Quantitative criteria of availability Description System of unrecoverable crash Some files, components or processes of system are not available, the system is suspended or restarted Some data files or processes memory space s data structure of multiple users is covered, modified or deleted and result in a crash or not available Some data files or processes memory space s data structure of a user is covered, modified or deleted and result in a crash or not available In the equivalence attack conditions, a service process or system load increases or decrease performance No effect on system availability Level- Score I 10 I 8 I 5 I 2 I 0 Level- Score A 10 A 8 A 5 A 2 A 1 A 0 Table.5 Quantitative criteria of confidentiality Level- Description Score C 10 Read the contents of arbitrary files, monitor system or network activity C 8 Read some contents of the system files or system processes and kernel space C 5 Read the contents of some specific files or memory space s data of multiple normal users C 2 Read some specific normal files of non-sensitive memory space s data of a normal users C 1 Confirm OS type, version num and application C 0 No effect on system confidentiality In the next part we will use these data to calculate the base impact of the vulnerability. 215
6 VRSS The quantitative score of VRSS is composed of impact score and exploitability score. The value of impact score is range from 0 to 9, while the other is range from 0 to 1. So the latter s contribution to the overall score is very small and not enough to show its true impact on security. Take this into consideration, we treat exploitability as a probability and multiply by the base impact score The framework Figure.2 shows the framework of the SSAS. The system has three important steps: data acquisition, data analysis and data calculation. In the following part, we will introduce these three steps in details. Vulnerability Vulnerability Integrated Collection Attributes Analysis Calculation NESSUS Vulnerability List BI EX IS SRS Figure 2. The framework of SSAS Nessus is a great tool designed to automate the testing and discovery of known security problems. Nessus is designed to help identify and solve these known problems, before a hacker takes advantage of them[15]. In General, Nessus is a powerful and practical software and we choose it as our vulnerability scanner in step 1. After analysis and summary of the scan report, we get a vulnerability list, which including three levels of vulnerability. Through the specific judgment on the impact properties, we choose the corresponding score of each item and give the weight to them. In the whole, the second step focuses on analyzing the impact of the vulnerabilities by reading the descriptions of them. The last step is calculating the data we obtained from the previous step. We need three indirect values to obtain the final results. The specific equations will be explained in the next part The equations Firstly we calculate the base impact of a vulnerability on the software security. According to the description in Tab.4.1.1, we choose the corresponding value of each attribute and its weight. If the software has a higher requirement for one of the attributes, the weight for the higher one is 0.5 and the others weight is If the software has an average requirement for the 3 attributes, the weight is 0.33 for each one. Base Impact = I W + A W + C W (1) As is shown in Eq.(1), x, y and z stands for corresponding level of the attributes. By analyzing the specific effects on the three security properties of software from a vulnerability, we can get the value of x, y, z and their respective weights. And the base impact is an intermediate result ranging from 0 to 10. Secondly the exploitability metrics capture how the vulnerability is accessed and whether or not extra conditions are required to exploit it. The corresponding values of AV, AC and AU could be got in Tab.3.1. Exploitability is a probability and its value is range from 0 to 1. The equation is as follows: Exploitability = AV AC AU (2) 216
7 Thirdly, as is shown in Eq.(3), we use BI and EX to calculate the final impact score ranging from 0 to 10, which reflects the severity of the vulnerability quantitatively. Impact Score = BI EX (3) Our ultimate goal is to assess the security of the software and our research is based on the vulnerabilities. So finally, we define software security metrics based on the representative vulnerabilities of the software as shown in the equation below: SRS = IS W n (4) SRS is the abbreviation for the security risk score and it stands for the final security state of the software. In the early stages we use NESSUS to scan the vulnerabilities and this tool divides vulnerabilities into 4 risk levels. We select the levels which have an impact on the security. In formula(4), j stands for the risk level and the value of 1, 2, 3represents low, medium, high. n stands for the vulenerabilites number of corresponding levels. For example, n stands for the number of vulnerabilities in low risk. W is the weight of corresponding levels and it stands for the impact bias of the vulnerabilities. We give them the values as follows: W = 0.7 W = 0.8 W = 0.9 By calculating the average scores of the vulnerabilities in each level, we get the sum of 3 average scores and we define it as the security risk score that can reflect the security of the software quantitatively. 5. Example Application In order to put our SSAS into practical application, we implement a security assessment platform with java. And we choose the wisdom subway platform developed by our lab as our test object. Firstly, we use NESSUS to scan this software and collect the useful vulnerabilities for the latter calculation. Secondly, by analyzing the vulnerabilities attributes and impacts, we enter the corresponding values of each vulnerability into the platform. Figure.3 shows the input interface and Figure.4 shows the entries have been added. After these preparatory works, we can easily work out the final software security score with our SSAS. Figure.5 shows the result of the calculation. As the score increases, the system risks are increasing. The result showed in Figure.4 presents the software we developed is secure relatively. And according to the numbers and severity of the vulnerabilities, we can prioritize these vulnerabilities and remediate those that pose the greatest risk. Figure 3.Vulnerability Input Interface 217
8 Figure 4. Vulnerability List 6. Conclusion and future work Figure 5. The result of SSAS In this paper, we have introduced the classifications and attributes of vulnerabilities and analyzed the existing vulnerability rating methods. By taking full advantage of the existing systems metrics and improving the details of some aspects, we propose our SSAS to assess the security quantitatively. Finally, we prove SSAS can be put into practice through the platform we have developed. As possible future works, we plan to assess the software security from a multiple perspective. In addition, we have analyzed just an individual impact on software security from a vulnerability, without taking into account the multiple consequences of vulnerability at the same time, so we will study on vulnerability relevance in the future. Furthermore, we will continue to pay attention to SSAS and make it more accurate, flexible and usable. 7. Acknowledgement The authors are grateful for a variety of valuable comments from the anonymous reviewers. This work is supported by National Natural Science Foundation of China under Grant References [1] Yamada S, Reliability/ safety evaluation of software, Safety Eng,vol.33, pp , [2] Gwandu B A L, Creasey D J, Using Formal Methods in Design for Reliability as Applied to An Electronic System That In tegrates Software and Hardware to Perform a Function, Microelectronic Reliable, vol.8, no.35, pp , [3] Ma Jun, Research of Electronic Business Security Based On Public Key Encryption Methods, International Journal of Advancements in Computing Technology(IJACT), vol.4, no.2, pp.50-57, [4] Yuan Jiang, Dongming Jiang, The Security Assessment Method of Wireless Sensor Network with Interval Grey Linguistic Variables, International Journal of Advancements in Computing Technology(IJACT), vol.3, no.10, pp.85-91,
9 [5] He Xin, Zheng Jun, Liu Chang, A Survey on Research of Software Safety Test, Computer Measurement& Control, vol.19, no.3, pp , [6] Ju An Wang, Hao Wang, Minzhe Guo, Min Xia, Security Metrics for Software Systems, In Proceedings of the ACMSE '09 March, pp.19-21, [7] Qixu Liu, Yuqing Zhang, VRSS: A new system for rating and scoring vulnerabilities, Computer Communications, vol.34, pp , [8] John Chambers, John Thompson, Common vulnerability scoring system, Available from: < [9] Peter Mell, Karen Scarfone, Sasha Romanosky, A complete guide to the common vulnerability scoring system version 2.0, June Available from:< [10] RFC 2828, Internet Security Glossary, Internet Engineering Task Force, IETF, [11] Zhang Yong-zheng, Yun Xiao-chun, Hu Ming-zeng, Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute, Journal of China Institute of Communications, vol.25, no.7, pp , [12] Yongzheng Zhang, Binxing Fang, Chi Yue, Survey and Evaluation on Computer Vulnerability Database, Computer Science, vol.33, no.8, pp.19-21, [13] P. Mell and K. Scarfone, Improving the Common Vulnerability Scoring System, IET Inf. Secur., vol.1, no.3, pp , [14] Wang Yong, Yunxiao Chun, Cui Xiang, Research on lifecycle based software vulnerability taxonomy with multidimensional quantitative attribute, In Proceedings of the 2nd Conference on Vulnerability Analysis and Risk Assessment, pp , [15] Harry Anderson, Introduction to Nessus,
Enterprise Software Management Systems by Using Security Metrics
Enterprise Software Management Systems by Using Security Metrics Bhanudas S. Panchabhai 1, A. N. Patil 2 1 Department of Computer Science, R. C. Patel Arts, Commerce and Science College, Shirpur, Maharashtra,
A Multi-layer Tree Model for Enterprise Vulnerability Management
A Multi-layer Tree Model for Enterprise Vulnerability Management Bin Wu Southern Polytechnic State University Marietta, GA, USA [email protected] Andy Ju An Wang Southern Polytechnic State University Marietta,
Q: What is CVSS? Q: Who developed CVSS?
CVSS FAQ Q: What is CVSS? Q: Who developed CVSS? Q: What does CVSS not do? Q: What is involved in CVSS? Q: What are the details of the Base Metrics? Q: What are the details of the Temporal Metrics? Q:
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
METRICS FOR INFORMATION SECURITY VULNERABILITIES
ABSTRACT METRICS FOR INFORMATION SECURITY VULNERABILITIES Andy Ju An Wang, Min Xia and Fengwei Zhang Southern Polytechnic State University, USA It is widely recognized that metrics are important to information
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard
State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS
SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS Victor-Valeriu PATRICIU PhD, University Professor Department of Computer Engineering Military Technical Academy, Bucharest, Romania E-mail: [email protected]
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
A Complete Guide to the Common Vulnerability Scoring System Version 2.0
A Complete Guide to the Common Vulnerability Scoring System Version 2.0 June, 2007 Peter Mell, Karen Scarfone National Institute of Standards Sasha Romanosky Carnegie Mellon University and Technology Acknowledgements:
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Security and Vulnerability Issues in University Networks
, July 6-8, 2011, London, U.K. Security and Vulnerability Issues in University Networks Sanad Al Maskari, Dinesh Kumar Saini, Swati Y Raut and Lingraj A Hadimani Abstract The paper deals with security
A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain
International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin
Information Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007
FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007 1. AGENCY SPECIFIC E GOVERNMENT INITIATIVE: USAID S VULNERABILITY MANAGEMENT PROGRAM CISO SECURITY OBJECTIVE AND VISION The U.S. Agency for International
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Vulnerability Scanning & Management
Vulnerability Scanning & Management (An approach to managing the risk level of a vulnerability) Ziad Khalil 1, Mohamed Elammari 2 1 Higher Academy, 2 Rogue Wave Software Ottawa, Canada Abstract Vulnerability
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Web Application Security. Sajjad Pourali [email protected] CERT of Ferdowsi University of Mashhad
Web Application Security Sajjad Pourali [email protected] CERT of Ferdowsi University of Mashhad Take away Why web application security is very important Understanding web application security How
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Network Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Is Penetration Testing recommended for Industrial Control Systems?
Is Penetration Testing recommended for Industrial Control Systems? By Ngai Chee Ban, CISSP, Honeywell Process Solutions, Asia Pacific Cyber Security Assessment for Industrial Automation Conducting a cyber-security
Optimizing Network Vulnerability
SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Best Practices for Vulnerability Management
4 Steps to Reducing Risk with Vulnerability Management Best Practices Is Your Vulnerability Management Process Meaningful To Your Business? The vulnerability management process can be very useful and provide
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
NIST Interagency Report 7502 The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
NIST Interagency Report 7502 The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities Karen Scarfone Peter Mell NIST Interagency Report 7502 The Common
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.
Best Practices for Threat & Vulnerability Management Don t let vulnerabilities monopolize your organization. Table of Contents 1. Are You in the Lead? 2. A Winning Vulnerability Management Program 3. Vulnerability
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS
A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS Kishen Iyengar Dept. of Information Systems and Operations Management, University of Texas at Arlington, Box 19437 University of
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus
A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus SANON CHIMMANEE, THANYADA VEERAPRASIT, KRITSADA SRIPHAEW, ANIWAT HEMANIDHI Faculty of Information Technology
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training
Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)
Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great) Kelly Hammons Principal Consultant, CISSP Secutor Consulting October 2 nd, 2015 97% of breaches could have been avoided through
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Incident Object Description and Exchange Format
Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Cenzic Product Guide. Cloud, Mobile and Web Application Security
Cloud, Mobile and Web Application Security Table of Contents Cenzic Enterprise...3 Cenzic Desktop...3 Cenzic Managed Cloud...3 Cenzic Cloud...3 Cenzic Hybrid...3 Cenzic Mobile...4 Technology...4 Continuous
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com
On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
Penetration Testing. Security Testing
Penetration Testing Gleneesha Johnson Advanced Topics in Software Testing Fall 2004 Security Testing Method of risk evaluation Testing security mechanisms to ensure that their functionality is properly
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
How To Use Qqsguard At The University Of Minneapolis
Qualys is a vulnerability scanner that is used for critical servers and servers subject to compliance reporting. This scanner is not generally to be used for desktop or laptop scanning. OIT has purchased
Roles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
ON ATTACK GRAPH MODEL OF NETWORK SECURITY. Hasmik Sahakyan, Daryoush Alipour
26 ON ATTACK GRAPH MODEL OF NETWORK SECURITY Hasmik Sahakyan, Daryoush Alipour Abstract: All types of network systems are subject to computer attacks. The overall security of a network cannot be determined
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
