|
|
|
- Gerald Garrison
- 10 years ago
- Views:
Transcription
1 Why COTS Software Increases Security Risks Gary McGraw and John Viega Reliable Software Technologies Ridgetop Circle, Suite 250, Sterling, VA phone: (703) , fax: (703) Abstract Understanding the risks inherent in using COTS software isimportant because information systems today are being built from ever greater amounts of reused and pre-packaged code. Security analysis of complex software systems has always been a serious challenge with many open research issues. Unfortunately, COTS software serves only to complicate matters. Often, code that is acquired from a vendor is delivered in executable form with no sourcecode, making some traditional analyses impossible. The upshot is that relying on today's COTS systems to ensure security is a risky proposition, especially when such systems are meant to work over the Internet. This short paper touches on the risks inherent some of today's more popular COTS systems, including Operating Systems and Java Virtual Machines. 1 COTS in Action (or, COTS Inaction) Like the rest of the Department of Defense, the United States Navy is mandated to use Commercial O-The-Shelf (COTS) technology in order to standardize and to save money. The Navy's Smart Ship initiative, which is currently being tested as a pilot study on the Aegis missile cruiser USS Yorktown, is a prime example of the move to COTS. A major part of the initiative is to migrate systems to the Microsoft Windows NT Operating System. What recently happened to the Yorktown serves to underscore the nature of security risks inherent in COTS-based systems. In September 1997, the Yorktown was underway in maneuvers o the Virginia coast. During the maneuvers, the Yorktown suered a serious systems failure caused by a divide by zero error in an NT application. According to the RISKS digest (Volume 18, Issue 88), the zero seems to have been an erroneous data item entered by a system user. As a result of the error, the ship was dead in the water for over two and a half hours. This somewhat amusing anecdote would turn out to be a very serious and potentially deadly problem during wartime. Windows NT is known to have anumber of failure modes, any one of which could be leveraged into an Information Warfare weapon. Nevertheless, since NT is quickly becoming a de facto standard in industry, the DoD is unlikely to abandon its eort to adopt it. Instead of becoming less likely, problems such as those experienced on the Yorktown are a hint of things to come. 2 COTS Problems Percolate Up Despite the proliferation of NT Workstations in business-critical and mission-critical environments, little analysis of the software that comprises the NT platform has been performed. This implies that the extent towhich NT has inherent security and robustness risks, systems built with a COTS architecture that include NT inherit the same risks. Operating Systems are not alone in this problem. Any third-party software included in a system has the same risk-percolation property, whether the software is packaged at the component level or higher. That means that COTS parts of electronic commerce systems now on the drawing board, including Web browsers and Java Virtual Machines, introduce similar concerns [1]. Unfortunately, if a vendor embeds COTS software in a product, end users will not absolve the vendor of blame for any system failures. The real problem is this: COTS often suer from dependability, security, and safety problems. What can we doto analyze COTS and measure them according to these properties? This problem is exacerbated by the fact that COTS are usually delivered with no guarantees about their
2 behavior in black box form. It is hard enough to try to determine what a program will do given its source code. Without the source code, the problem becomes much harder. 3 So Why Use COTS? If COTS introduce more risks, why use them? Unfortunately, the issue is not completely cut-anddry COTS have anumber of important benets that should not be overlooked. The main benets of COTS software are the following: 1. Reduction in development time. There is often a great demand to produce software as quickly as possible. One driving factor is that many vendors need to stay one step ahead of competing products. 2. A reduction in lines of code to be written. COTS components provide functionality the developer would have had to write, otherwise. Thus, the code that would have been required to implement that functionality issaved. An exception is the \glue" code that ties a system to the COTS component. Such code, however, tends to be a small part of a program. 3. A reduction in complexity faced by the developer. COTS components can provide abstractions that can hide complexity thatadevel- oper would otherwise have totackle. Not only can this benet help reduce development time, it can potentially lead to fewer errors in the non-cots portions of the system. Consider component re-use in programming systems like Visual Basic. Today's applications are more complicated than ever, and the time pressure to get them done and put them into use is greater than ever. Visual Basic components save both time and eort. There is no reason that the software industry should not learn from electrical engineering where prefabricated components have been used for years. 4 Security Risks in Java: A case study The Java programming language from Sun Microsystems makes an interesting case study from a COTS security perspective. Java was, after all, designed with security in mind. Java's security mechanisms are built on a foundation of type safety and include a number of language-based enforcement mechanisms[6]. Unfortunately, as with any complex system, Java has had its problems with security. It turns out to be very hard to do things exactly right, and exactly right is what is demanded by security. [7] denes four broad categories of attacks with which to understand Java's security risks. These categories can be used to categorize all mobile code risks: 1. System modication attacks occur when an attacker exploits a security hole to take over and modify the target system. These attacks are very serious and can be used for any number of nefarious ends, including: installing a virus, installing a trap door, installing a listening post, reading private data, and so on. 2. Invasion of privacy attacks happen when a piece of Java code gets access to data meant to be kept private. Such data includes password les, personal directory names, and the like. 3. Denial of service attacks make it impossible to use a machine for legitimate activities. These kinds of attacks are almost trivial in today's systems (Java or otherwise) and are an essential risk category for e-commerce and defense. 4. Antagonism attacks are meant to harass or annoy a legitimate user. These attacks might include displaying obscene pictures or playing sound les forever. Unfortunately, all four categories of attack can be carried out in Java systems. By far the most dangerous attacks, system modication, leverage holes in the Java Virtual Machinetowork. Though Java's internal defenses against such attacks are strong, at least sixteen major security holes have been discovered in Java (and since patched). The latest such hole, a problem with class loading in Java 2,was discovered in March If supposedly-secure systems like Java Virtual Machines (items commonly included as COTS in systems ranging from smart cards and embedded devices to Web browsers) have security risks, what does this say about less security-conscious COTS? The somewhat disturbing answer is that other systems are much worse o. Microsoft's ActiveX system, for example, presents a number of far more serious security problems than Java does. 5 Current Options We see the following options as available to a vendor who would like to use COTS software: 1. Avoid COTS altogether write all software inhouse. 2. Depend on the law for protection.
3 3. Demand warranties from COTS vendors. 4. Perform system level testing with the COTS software embedded. 5. Ask for independent product certication, as opposed to personnel or process certication. 6. Determine the robustness of the software if the COTS software were to fail. 7. Use software wrappers. Avoiding COTS software completely gives the vendor quite a bit of control, but foregoes all benets associated with COTS, so is not generally desirable. The legal system might provide some respite for the vendor who uses COTS software, but laws covering software are few and far between, and their enforceability is in question, due to unsatisfactory legal precedents. Warranties may be enforceable, but tend to be dicult to obtain, since adequate testing is such a dicult proposition, even with an extremely large user base. 5.1 Software Testing Most software security vulnerabilities result from two factors: program bugs and malicious misuse. Technologies and methodologies for analyzing software in order to discover these vulnerabilities (and potential avenues for exploitation) are a current topic of computer security research. White-box software analysis technologies usually require program source code. However, most COTS software applications are delivered in the form of binary executables (including hooks to dynamic libraries), rendering source-code{ based techniques useless. Performing similar analyses at the binary level has not been shown to be feasible. Thus, alternative methods for analyzing software vulnerability under malicious misuse or attack are required. Black-box analysis is an important approach to software vulnerability localization that, given today's inexpensive hardware, can be performed relatively cheaply. Such analyses are particularly attractive because they can be applied to binary executables, including COTS and legacy executables. One reasonable methodology is using random and intelligent data generation, and then monitoring results based on a security policy, which could be enforced by hand, or by a sandbox. We have experimented applying such a methodology to test the robustness of Windows NT software, with highly encouraging results [4]. That work follows the footsteps of two other research eorts, Fuzz [8] and Ballista [5], both of which considered the robustness of Unix system software. 5.2 Product Certication There are many certication standards that can be applied to software process, such as ISO 9000, and the Carnegie Mellon Capability Maturity Model. There are also ways to certify the people who build software. Such certication models can not oer high levels of assurance since they do not test the actual software. A good analogy is that dirty water can run from clean pipes even the best process, carried out by the best people can produce shoddy software. Currently, there is no tried and true approach for certifying general-purpose software for robustness or security. Developing such a certication process in which people can reasonably place their trust is quite dicult, since tools for detecting such problems tend not to be eective enough in practice. Such tools would need to be able to accurately quantify the robustness or security of a piece of software. One eective approach for quantifying robustness is fault injection, which is described in the next subsection. Recently we have begun to develop a process that can be used to certify for security that is still under development [2]. 5.3 Robustness Testing One way for developer to gain reasonable assurance of the robustness of a COTS component is to test the component in-house. Currently, the best verication and validation technique for doing so is software fault injection [9]. Fault injection is a \what-if" analysis technique, and is not statistical testing, or any sort of proof of correctness. Faults are injected into a piece of software, and then the behavior of the modied software is observed for anomalous behavior 1. The intuition behind this technique is that the more \what-if" games you play, the more condent you become that your software can overcome anomalous situations. In order to work well, the injected faults need to be representative of the types of actual problems that are likely to crop up in the program. Fault injection techniques have long been used to test for robustness of both hardware and software, and recently have been applied successfully to the security domain [3]. Fault injection techniques can be tailored to COTS systems by systematically injecting faults into the inputs of the COTS application, and then the outputs of the COTS software is observed for unacceptable results. An overview of such anarchitecture is shown in Figure 1. 1 Note that it is possible for a COTS component to return an erroneous output without having a negative impact on the system as a whole. Such cases are generally not considered intolerable, but are also uncommon.
4 Figure 1: Applying fault injection techniques to test embedded COTS software 5.4 Software Wrapping Fault injection techniques can be used to identify unacceptable behavior exhibited by a COTS component. What they cannot do is automatically correct those problems. Since the system developer generally does not have access to the source of COTS components, it is also not usually feasible to repair detected faults. One way that can help alleviate the problem is for the developer to \wrap" the COTS software, disallowing it from exhibiting undesired functionality by placing a software barrier around the component, limiting what it can do. Generally, the way in which such wrapping is done is by testing inputs before a call, and only allowing the call if the input is likely to produce acceptable behavior. An overview of this technique is shown in Figure 2. system developer must write code that gracefully handles inputs that can not properly be handled by the COTS component. However, we haveyet to encounter a more practical approach to addressing the problem of gracefully avoiding robustness problems in COTS software. 6 Conclusion It is clear that muchwork remains to be done in understanding the security implications of using COTS. COTS software is becoming as ubiquitous as software itself. Given that COTS specically designed with security in mind (such as the Java VM) suer from serious security problems, we can only cringe at the thought of the risks that less carefully-designed COTS introduce. Using COTS software is a gamble, but it is one that manydevelopers must take. For those developers, we recommend the following course of action: 1. Perform thorough system-level testing. 2. Request warranties from vendors of COTS software. 3. Assess how your system will tolerate COTS failures. 4. Take your own mitigating steps by wrapping COTS components. References [1] A.K. Ghosh. E-Commerce Security: Weak Links, Best Defenses. John Wiley & Sons, New York, NY, ISBN [2] A.K. Ghosh and G. McGraw. An approach for certifying security in software components. In Proceedings of the National Information Systems Security Conference, October Crystal City, VA USA. [3] A.K. Ghosh, T. O'Connor, and G. McGraw. An automated approach for identifying potential vulnerabilities in software. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 104{114, Oakland, CA, May Figure 2: Wrapping a COTS component This technique is both complex and error prone. One signicant problem with the approach is that the [4] A.K. Ghosh, M. Schmid, and V. Shah. Testing the robustness of windows nt software. In Proceedings of the Ninth International Symposium on Software Reliability Engineering (ISSRE'98), pages 231{235, Los Alamitos, CA, November IEEE Computer Society.
5 [5] P. Koopman, J. Sung, C. Dingman, D. Siewiorek, and T. Marz. Comparing operating systems using robustness benchmarks. In Proceedings of the 16th IEEE Symposium on Reliable Distributed Systems, pages 72{79, October [6] G. McGraw and E. Felten. Java Security: Hostile Applets, Holes, and Antidotes. John Wiley and Sons, New York, [7] G. McGraw and E. Felten. Securing Java: Getting Down to Business with Mobile Code. John Wiley & Sons, New York, NY, 2nd edition, [8] B.P. Miller, D. Koski, C.P. Lee, V. Maganty, R. Murthy, A. Natarajan, and J. Steidl. Fuzz revisted: A re-examination of the reliability of unix utilities and services. Technical report, University of Wisconsin, Computer Sciences Dept, November [9] J.M. Voas and G. McGraw. Software Fault Injection: Inoculating Programs Against Errors. John Wiley and Sons, New York, 1998.
The Software Quality Certication Triangle Jerey Voas Reliable Software Technologies Abstract The problem of certifying software's quality is being attacked in three distinct ways: (1) accrediting personnel,
Risks with web programming technologies. Steve Branigan Lucent Technologies
Risks with web programming technologies Steve Branigan Lucent Technologies Risks with web programming technologies Abstract Java applets and their kind are bringing new life to the World Wide Web. Through
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Software development process
OpenStax-CNX module: m14619 1 Software development process Trung Hung VO This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Abstract A software development
CLOUD FRAMEWORK & SECURITY OVERVIEW
CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This
Untangling the Woven Web: Testing Web-based Software
Untangling the Woven Web: Testing Web-based Software Gary McGraw, Ph.D. David Hovemeyer Reliable Software Technologies Corporation 21515 Ridgetop Circle, Suite 250 Sterling, VA 20166 (703) 404-9293 http://www.rstcorp.com
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Embracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Verification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research [email protected]
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Disposable Information Systems: The Future of Software Maintenance? J. Voas ([email protected]) Reliable Software Technologies, Sterling VA USA Abstract This paper is a summary of Voas's keynote address
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Endpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.
The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
PDSA Special Report. Is your Company s Security at Risk
PDSA Special Report Introduction There is probably no such thing as a completely secure company. However, if you are not thinking about security in your company, you are running a big risk. We are not
Outsource IT Services
Computer Systems and Network Solutions Table of Contents 1. IT Services...3 a. Computer and Networking Solutions...3 b. Benefits...3 2. DETAILS OF THE SERVICES... 4 3. COSTS AND TERMS...5 APPENDIX: List
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
CDC UNIFIED PROCESS PRACTICES GUIDE
Purpose The purpose of this document is to provide guidance on the practice of Release Strategy and to describe the practice overview, requirements, best practices, activities, and key terms related to
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks
Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks Wine, Viruses, and Methods of Achieving Security Running Windows software via CrossOver is, on average, much safer
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc.
Data Security So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Table of Contents: 1. Introduction 3 2. Cybersecurity: The loopholes in the system
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
CDM Software Asset Management (SWAM) Capability
CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References
Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Enhancing Cyber Security for the Warfighter
INTRODUCTION 115 Chapter 8 Enhancing Cyber Security for the Warfighter Sean R. Finnegan A key element of current and future U.S. warfighter capabilities is and will be the information systems being integrated
Java vs. Java Script
Java vs. Java Script Java and Java Script share two very similar names, but they are completely different languages that possess few commonalties. They differ both in their purpose and the applications
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Software Security Analysis - Execution Phase Audit
Software Security Analysis - Execution Phase Audit Bengt Carlsson * and Dejan Baca # * School of Engineering, Blekinge Institute of Technology ; PO Box 520, S-372 25 Ronneby, SWEDEN; bengt.carlsson;@bth.se
Software Sustainability Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat
2012 Systems and Software Technology Conference Software Sustainability Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat Paul R. Croll Fellow CSC
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
UserLock vs Microsoft CConnect
UserLock vs Microsoft White paper This document reviews how Microsoft and ISDecisions UserLock achieve logon management, and focuses on the concurrent connections restriction features provided by these
The Real Challenges of Configuration Management
The Real Challenges of Configuration Management McCabe & Associates Table of Contents The Real Challenges of CM 3 Introduction 3 Parallel Development 3 Maintaining Multiple Releases 3 Rapid Development
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
