Threat Modeling for Security Assessment in Cyber-physical Systems
|
|
|
- Kristian McLaughlin
- 9 years ago
- Views:
Transcription
1 Threat Modeling for Security Assessment in Cyber-physical Systems Janusz Zalewski Florida Gulf Coast University Steven Drager & William McKeever Air Force Research Lab, Rome, NY Andrew J. Kornecki Embry-Riddle Aeronautical University Presented by A.J. Kornecki at AGH, Krakow, June 25, 2013 Based on a paper: Zalewski, J., Drager, S., McKeever, W., Kornecki A.J. "Threat Modeling for Security Assessment in Cyber-physical Systems", CSIIRW'2012, ACM /12/10, Oak Ridge, Tenn., USA, October 30 - November 1, 2012 Copyright A.J. Kornecki, 2013 page 1
2 Overview Introduction and Motivation How to Measure? Control and Cyber-physical Systems Threat Modeling Security Risk Assessment Experiments Conclusion Copyright A.J. Kornecki, 2013 page 2
3 Why Threat Modeling? System designers must first determine what threats are feasible [and then what security policies make economic sense relative to the values of resources exposed to a threat] Source: D. Kleidermacher, M. Kleidermacher, Embedded Systems Security, Newnes/Elsevier, Oxford, 2012 In case of imminent security breach: cyber-physical systems requires either reconfiguration to reacquire the needed resources automatically or a graceful degradation if they the resources are not available Source: National Research Council, Committee for Advancing Software- Intensive Systems Producibility Critical Code: Software Producibility for Defense National Academies Press, 2010 Copyright A.J. Kornecki, 2013 page 3
4 Intruder Knowledge High Attack Sophistication Low Network Management Diagnostics Sweepers Back Doors Disabling Audits Stealth /Advanced Scanning Techniques Denial of Service Hijacking Sessions Exploiting Known Vulnerabilities Password Cracking Self-Replicating Code Password Guessing Threat Trends STUXNET/ Flame Malicious Code Morphing WWW Attacks Automated Probes/Scans GUI Packet Spoofing Sniffers BOTS Zombies Distributed Attack Tools Attackers Lipson, H. F., Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMS/SEI-2002-SR-009, November 2002, page 10. Threats become more complex as attackers proliferate Copyright A.J. Kornecki, 2013 page 4
5 Example: Modern Aircraft Threat Trends {courtesy of Volpe National Transportation System Center, June 2013} Copyright A.J. Kornecki, 2013 page 5 5
6 Aircraft Data Network (ADN) Aircraft control Flight and Embedded Control Systems AFDX Engine HUMS Airline Information Services Cabin Core EFB/Gatelink Passenger Information and Entertainment Services IFE- TBD Passenger- Owned Devices Control the Operate the Entertain the Airplane Airline Passengers Closed Private Public Entertain the Passengers {source ARINC 664, Aircraft Data Network, Part 5, Network Domain Characteristics and Interconnection} Copyright 6 A.J. Kornecki, 2013 page 6
7 Security Standards Guidelines & Initiatives FAA/RTCA SC-216 (Aeronautical System Security) & Eurocae WG-72 Subcommittees o DO-326: Airworthiness Security Process Specification o DO-XXX: Security Assurance and Assessment Methods for -Related Aircraft Systems o DO-YYY: Security Guidance for Instructions for Continuing Airworthiness (ICA) o FAA Advisory Circular (AC) ARINC Network Infrastructure and Security (NIS) Working Group o Best Practices (Security Catalog) o ARINC 842: Guidance for Usage of Digital Certificates ICAO Twelfth ANC: o Working Paper 122: Cyber Security For Civil Aviation (November 2012) Copyright A.J. Kornecki, 2013 page 7
8 Are We Preoccupied with Measurements? We are missing good (any) measures to characterize non-functional software properties related to trustworthiness (safety, security, dependability, etc.), as opposed, for example, to timing properties (responsiveness, timeliness, schedulability, predictability) But there are other means How to assess security before the system is put into operation? o Theoretical Assessment (analytical model) o Actual Experiments (measurements) o Simulation (numerical calculations) Copyright A.J. Kornecki, 2013 page 8
9 A Side-bar: How to Measure? NOW: Definition of a metric (meter) is the length of the path traveled by light in vacuum during a time interval of 1/ of a second EARLIER: King Henry I is believed to decree that a yard should be: the distance from the King s nose to the end of his outstretched thumb For example: Property length Metric meter Measure device Copyright A.J. Kornecki, 2013 page 9
10 Classical Views of a Control System CONVENTIONAL MODERN (cyber-physical) Copyright A.J. Kornecki, 2013 page 10
11 Cyber-physical System Relationship between the computer/software system and its operational environment SOFTWARE SYSTEM RELIABILITY SAFETY SECURITY OPERATIONAL ENVIRONMENT Copyright A.J. Kornecki, 2013 page 11
12 /Security Views of a Cyber-physical System SAFETY SECURITY Copyright A.J. Kornecki, 2013 page 12
13 Analytical Models to Describe System Behavior Continuous: o Differential Equations Discrete: o Finite State Machines o Finite Automata o Petri Nets o Bayesian Belief Networks o Queuing Theory o Rule-based Reasoning o Markov Chains *** Copyright A.J. Kornecki, 2013 page 13
14 Example: Discrete-Time Markov Chains It is generally not possible to predict future states However, the statistical properties of future states can be predicted The set of all states and transition probabilities characterize completely with the Markov chain A finite-state machine can be used as a graphical representation of a Markov chain How to develop state transition probabilities? Base them on heuristic analysis of the chain More in: Kornecki, A., Stevenson, W., Zalewski, J., "Availability Assessment of Embedded Systems with Security Vulnerabilities", proceedings of 34th IEEE Software Engineering Workshop SEW 2011, Limerick, Ireland, June 20-21, 2011 Copyright A.J. Kornecki, 2013 page 14
15 Case Study - Security Impact Assessment A simple case study of a Cooperative Adaptive Cruise Control (CACC) Identification of vulnerabilities in incoming messages (commission, omission, corruption, flooding) Copyright A.J. Kornecki, 2013 page 15
16 Case Study Markov Model Markov model with Relex Reliability Studio* tool was used to assess the availability of the system with and without the security component CACC implemented as a discrete-time Markov model with three states and the transitions determined by failure rates or repair rates o Operational State (Normal) o Degraded State (Flooding, Corruption, Introduction, Deletion) o Failed State * Copyright A.J. Kornecki, 2013 page 16
17 Threats Two aspects of handling potential threats in cyberphysical systems: o Threat Modeling: A systematic exploration technique to expose any circumstance or event having the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service [IEEE ] 1 o Threat Assessment: Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat [CNSS-4009] 2 1. IEEE Standard for Developing a Software Project Life Cycle Process 2. National Information Assurance (IA) Glossary Copyright A.J. Kornecki, 2013 page 17
18 Threat Handling Process: a Sequence of Actions 1. Understand the Adversary s View 2. Create a Model: Data Flow Diagrams 3. Determine and Investigate the Threats: a) Use STRIDE to identify/define the threats b) Use Threat Trees to assess vulnerabilities c) Use DREAD to characterize risks 4. Mitigate the Threats 5. Validate the Mitigations Copyright A.J. Kornecki, 2013 page 18
19 Understanding the Adversary s View Copyright A.J. Kornecki, 2013 page 19
20 Identify and Define Threats: STRIDE What is STRIDE? identify and define threats o Spoofing - a situation in which an attacker successfully masquerades as legitimate party o Tampering - intentional modification of data by an attacker that would make them harmful to the user o Repudiation - authentication between users that they can be confident in the authenticity of the messages (but it cannot be provided to an attacker after the event) o Information Disclosure - a situation when the user data is available to the attacker o Denial of Service - making a resource not available to its intended users due to a malicious attack o Elevation of Privilege - gaining access to resources that are normally protected from an attacker Copyright A.J. Kornecki, 2013 page 20
21 Threat Tree Example Root Threat Unmitigated Condition Mitigated Condition Mitigated Condition Mitigated Condition Unmitigated Condition Mitigated Condition Copyright A.J. Kornecki, 2013 page 21
22 Characterize Risk: DREAD What is DREAD? characterize risk o Damage Potential severity as related to equipment, resources, and environment o Reproducibility likelihood of an ability of an event to be reproduced o Exploitability likelihood to use system unethically or for malicious purpose o Affected Users severity as related to human population o Discoverability likelihood of a capacity of data/information to be found (being discoverable) Copyright A.J. Kornecki, 2013 page 22
23 How to Evaluate Security Risk? risk is evaluated as a product of severity of consequences and the likelihood of hazards Security risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically is a function of [CNSS-4009] : o the adverse impacts that would arise if the event occurs; and o the likelihood of occurrence We need a system for assessing the severity of computer system security vulnerabilities Examples: STRIDE Threat Library, Common Weakness Enumeration (CWE), Common Vulnerabilities/Exposures (CVE), and Copyright A.J. Kornecki, 2013 page 23
24 What is Common Vulnerability Scoring System? CVSS is a system for assessing the severity of computer system security vulnerabilities CVSS defines three groups of metrics for assessing vulnerabilities: base, temporal and environmental (however, only the base is mandatory) Copyright A.J. Kornecki, 2013 page 24
25 CVSS Base Impact & Exploitability Metrics The base group consists of six metrics divided into two subcategories: impact and exploitability metrics (in lieu of severity) Metrics are evaluated on a three-level non-numerical scale mapped onto numeric values (1, 2, and 3) o Impact metrics: Confidentiality, Integrity, Availability: None, Partial, Complete o Exploitability metrics: Access Vector: Local, Adjacent, Full Access Complexity: High, Medium, Low Authentication: Multiple, Single, None Copyright A.J. Kornecki, 2013 page 25
26 Proposed CVSS Base Scoring Formula: All six values are related with different weights by a formula, thus, producing a unique number of the base metric o BaseScore6 = = ((0.6*Impact) + (0.4*Exploitability) 1.5)*f(Impact) o Impact = = 10.41*(1-(1-Conf.Impact)*(1-Integ.Impact)*(1-Avail.Impact)) o Exploitability = = 20*Access.Vector*Access.Complexity*Authentication o f(impact) = 0 if Impact is equal to 0 = otherwise Copyright A.J. Kornecki, 2013 page 26
27 How the Threat Model is Used? How the Threat Model is Used? o In Design: Code Review o In Implementation: Penetration Testing o *** In Security Assessment: Simulation Example: mapping a cyber-physical system into SDL threat modeling tool (CACC imitation) Copyright A.J. Kornecki, 2013 page 27
28 Microsoft SDL Threat Modeling Tool Threat Modeling Is a core element of the Microsoft Security Development Lifecycle (hence SDL) for everyday user making threat modeling easy The SDL Threat Modeling Tool enables any developer or software architect to: o Communicate about the security design of their systems o Analyze designs for security issues using a proven methodology o Suggest and manage mitigations for security issues Copyright A.J. Kornecki, 2013 page 28
29 Example Microsoft SDL screen-shot Copyright A.J. Kornecki, 2013 page 29
30 Security Assessment via Simulation An actual example of a message exchange system over the CAN network has been set up The example includes two CAN nodes communicating with each other over the CAN bus, with additional Internet connectivity for both nodes The arrangement imitates part of the functionality of a larger CACC system CVE ID Publish Date Update Date Integrity Score Access Complexity Authentication Confidentiality Availability CVE Remote High Not Required None None None The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through and 2.2.x through , when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a.htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE Copyright A.J. Kornecki, 2013 page 30
31 Copyright A.J. Kornecki, 2013 page 31
32 Copyright A.J. Kornecki, 2013 page 32
33 Conclusions Firm modeling process established Experimental measurement process set up Tools ready and easy to use Potential Case Studies: o CAN (Controller Area Network) o Industrial Control Systems: SCADA o Wireless Sensor Networks: Zigbee o RFID/NFC o Time-Triggered Systems Copyright A.J. Kornecki, 2013 page 33
34 Comments/Questions Copyright A.J. Kornecki, 2013 page 34
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Outline Scope Civil aviation regulation History Cybersecurity threats Cybersecurity controls and technology
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities
16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office
HACKING RELOADED. Hacken IS simple! Christian H. Gresser [email protected]
HACKING RELOADED Hacken IS simple! Christian H. Gresser [email protected] Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
Evolving Optical Transport Network Security
Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director 732-699-6188 [email protected] Copyright 2012 All Rights reserved 1 Outline Overview of Optical
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"
Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC" Genève- UIPF 27 Nov.2010 La mission de WISeKey est de faciliter la croissance économique globale en sécurisant
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based
Lecture Outline Intruders & Intrusion Hackers Criminal groups Insiders Detection and IDS Techniques Detection Principles Requirements Host-based Network-based Honeypot Madartists Intruders significant
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
Criteria for Software Tools Evaluation in the Development of Safety-Critical Real-Time Systems 1
Criteria for Software s Evaluation in the Development of Safety-Critical Real-Time Systems 1 Andrew J. Kornecki Embry-Riddle Aeronautical University Daytona Beach, FL 32114-3900, USA Janusz Zalewski Florida
Threat Modeling Architecting & Designing with Security in Mind OWASP. The OWASP Foundation http://www.owasp.org. Venkatesh Jagannathan
Threat Modeling Architecting & Designing with Security in Mind Venkatesh Jagannathan -Chennai Chapter Leader [email protected] [email protected] Copyright The Foundation Permission is granted to copy, distribute
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Technical Proposition. Security
Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net [email protected] Why Read this Technical Proposition?
NETWORK SECURITY ASPECTS & VULNERABILITIES
NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Towards a Systematic Threat Modeling Approach for Cyber-physical Systems
Towards a Systematic Threat Modeling Approach for Cyber-physical Systems Goncalo Martins 1, Sajal Bhatia 1, Xenofon Koutsoukos 1, Keith Stouffer 2, CheeYee Tang 2, and Richard Candell 2 1 Institute for
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
3 Web Services Threats, Vulnerabilities, and Countermeasures
3 Web Services Threats, Vulnerabilities, and Countermeasures Securing a Web service requires us to protect, as far as possible, all of its basic components, shown in Figure 3.1, and their interactions
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected]
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected] A great proportion of essential services are moving into internet space making the
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Rapid Threat Modeling Techniques
SESSION ID: ASD-R01 Rapid Threat Modeling Techniques Chad Childers IT Security Ford Motor Company Agenda Threat Modeling background Lessons Learned to make threat modeling faster Techniques specifically
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
