Threat Modeling for Security Assessment in Cyber-physical Systems

Size: px
Start display at page:

Download "Threat Modeling for Security Assessment in Cyber-physical Systems"

Transcription

1 Threat Modeling for Security Assessment in Cyber-physical Systems Janusz Zalewski Florida Gulf Coast University Steven Drager & William McKeever Air Force Research Lab, Rome, NY Andrew J. Kornecki Embry-Riddle Aeronautical University Presented by A.J. Kornecki at AGH, Krakow, June 25, 2013 Based on a paper: Zalewski, J., Drager, S., McKeever, W., Kornecki A.J. "Threat Modeling for Security Assessment in Cyber-physical Systems", CSIIRW'2012, ACM /12/10, Oak Ridge, Tenn., USA, October 30 - November 1, 2012 Copyright A.J. Kornecki, 2013 page 1

2 Overview Introduction and Motivation How to Measure? Control and Cyber-physical Systems Threat Modeling Security Risk Assessment Experiments Conclusion Copyright A.J. Kornecki, 2013 page 2

3 Why Threat Modeling? System designers must first determine what threats are feasible [and then what security policies make economic sense relative to the values of resources exposed to a threat] Source: D. Kleidermacher, M. Kleidermacher, Embedded Systems Security, Newnes/Elsevier, Oxford, 2012 In case of imminent security breach: cyber-physical systems requires either reconfiguration to reacquire the needed resources automatically or a graceful degradation if they the resources are not available Source: National Research Council, Committee for Advancing Software- Intensive Systems Producibility Critical Code: Software Producibility for Defense National Academies Press, 2010 Copyright A.J. Kornecki, 2013 page 3

4 Intruder Knowledge High Attack Sophistication Low Network Management Diagnostics Sweepers Back Doors Disabling Audits Stealth /Advanced Scanning Techniques Denial of Service Hijacking Sessions Exploiting Known Vulnerabilities Password Cracking Self-Replicating Code Password Guessing Threat Trends STUXNET/ Flame Malicious Code Morphing WWW Attacks Automated Probes/Scans GUI Packet Spoofing Sniffers BOTS Zombies Distributed Attack Tools Attackers Lipson, H. F., Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMS/SEI-2002-SR-009, November 2002, page 10. Threats become more complex as attackers proliferate Copyright A.J. Kornecki, 2013 page 4

5 Example: Modern Aircraft Threat Trends {courtesy of Volpe National Transportation System Center, June 2013} Copyright A.J. Kornecki, 2013 page 5 5

6 Aircraft Data Network (ADN) Aircraft control Flight and Embedded Control Systems AFDX Engine HUMS Airline Information Services Cabin Core EFB/Gatelink Passenger Information and Entertainment Services IFE- TBD Passenger- Owned Devices Control the Operate the Entertain the Airplane Airline Passengers Closed Private Public Entertain the Passengers {source ARINC 664, Aircraft Data Network, Part 5, Network Domain Characteristics and Interconnection} Copyright 6 A.J. Kornecki, 2013 page 6

7 Security Standards Guidelines & Initiatives FAA/RTCA SC-216 (Aeronautical System Security) & Eurocae WG-72 Subcommittees o DO-326: Airworthiness Security Process Specification o DO-XXX: Security Assurance and Assessment Methods for -Related Aircraft Systems o DO-YYY: Security Guidance for Instructions for Continuing Airworthiness (ICA) o FAA Advisory Circular (AC) ARINC Network Infrastructure and Security (NIS) Working Group o Best Practices (Security Catalog) o ARINC 842: Guidance for Usage of Digital Certificates ICAO Twelfth ANC: o Working Paper 122: Cyber Security For Civil Aviation (November 2012) Copyright A.J. Kornecki, 2013 page 7

8 Are We Preoccupied with Measurements? We are missing good (any) measures to characterize non-functional software properties related to trustworthiness (safety, security, dependability, etc.), as opposed, for example, to timing properties (responsiveness, timeliness, schedulability, predictability) But there are other means How to assess security before the system is put into operation? o Theoretical Assessment (analytical model) o Actual Experiments (measurements) o Simulation (numerical calculations) Copyright A.J. Kornecki, 2013 page 8

9 A Side-bar: How to Measure? NOW: Definition of a metric (meter) is the length of the path traveled by light in vacuum during a time interval of 1/ of a second EARLIER: King Henry I is believed to decree that a yard should be: the distance from the King s nose to the end of his outstretched thumb For example: Property length Metric meter Measure device Copyright A.J. Kornecki, 2013 page 9

10 Classical Views of a Control System CONVENTIONAL MODERN (cyber-physical) Copyright A.J. Kornecki, 2013 page 10

11 Cyber-physical System Relationship between the computer/software system and its operational environment SOFTWARE SYSTEM RELIABILITY SAFETY SECURITY OPERATIONAL ENVIRONMENT Copyright A.J. Kornecki, 2013 page 11

12 /Security Views of a Cyber-physical System SAFETY SECURITY Copyright A.J. Kornecki, 2013 page 12

13 Analytical Models to Describe System Behavior Continuous: o Differential Equations Discrete: o Finite State Machines o Finite Automata o Petri Nets o Bayesian Belief Networks o Queuing Theory o Rule-based Reasoning o Markov Chains *** Copyright A.J. Kornecki, 2013 page 13

14 Example: Discrete-Time Markov Chains It is generally not possible to predict future states However, the statistical properties of future states can be predicted The set of all states and transition probabilities characterize completely with the Markov chain A finite-state machine can be used as a graphical representation of a Markov chain How to develop state transition probabilities? Base them on heuristic analysis of the chain More in: Kornecki, A., Stevenson, W., Zalewski, J., "Availability Assessment of Embedded Systems with Security Vulnerabilities", proceedings of 34th IEEE Software Engineering Workshop SEW 2011, Limerick, Ireland, June 20-21, 2011 Copyright A.J. Kornecki, 2013 page 14

15 Case Study - Security Impact Assessment A simple case study of a Cooperative Adaptive Cruise Control (CACC) Identification of vulnerabilities in incoming messages (commission, omission, corruption, flooding) Copyright A.J. Kornecki, 2013 page 15

16 Case Study Markov Model Markov model with Relex Reliability Studio* tool was used to assess the availability of the system with and without the security component CACC implemented as a discrete-time Markov model with three states and the transitions determined by failure rates or repair rates o Operational State (Normal) o Degraded State (Flooding, Corruption, Introduction, Deletion) o Failed State * Copyright A.J. Kornecki, 2013 page 16

17 Threats Two aspects of handling potential threats in cyberphysical systems: o Threat Modeling: A systematic exploration technique to expose any circumstance or event having the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service [IEEE ] 1 o Threat Assessment: Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat [CNSS-4009] 2 1. IEEE Standard for Developing a Software Project Life Cycle Process 2. National Information Assurance (IA) Glossary Copyright A.J. Kornecki, 2013 page 17

18 Threat Handling Process: a Sequence of Actions 1. Understand the Adversary s View 2. Create a Model: Data Flow Diagrams 3. Determine and Investigate the Threats: a) Use STRIDE to identify/define the threats b) Use Threat Trees to assess vulnerabilities c) Use DREAD to characterize risks 4. Mitigate the Threats 5. Validate the Mitigations Copyright A.J. Kornecki, 2013 page 18

19 Understanding the Adversary s View Copyright A.J. Kornecki, 2013 page 19

20 Identify and Define Threats: STRIDE What is STRIDE? identify and define threats o Spoofing - a situation in which an attacker successfully masquerades as legitimate party o Tampering - intentional modification of data by an attacker that would make them harmful to the user o Repudiation - authentication between users that they can be confident in the authenticity of the messages (but it cannot be provided to an attacker after the event) o Information Disclosure - a situation when the user data is available to the attacker o Denial of Service - making a resource not available to its intended users due to a malicious attack o Elevation of Privilege - gaining access to resources that are normally protected from an attacker Copyright A.J. Kornecki, 2013 page 20

21 Threat Tree Example Root Threat Unmitigated Condition Mitigated Condition Mitigated Condition Mitigated Condition Unmitigated Condition Mitigated Condition Copyright A.J. Kornecki, 2013 page 21

22 Characterize Risk: DREAD What is DREAD? characterize risk o Damage Potential severity as related to equipment, resources, and environment o Reproducibility likelihood of an ability of an event to be reproduced o Exploitability likelihood to use system unethically or for malicious purpose o Affected Users severity as related to human population o Discoverability likelihood of a capacity of data/information to be found (being discoverable) Copyright A.J. Kornecki, 2013 page 22

23 How to Evaluate Security Risk? risk is evaluated as a product of severity of consequences and the likelihood of hazards Security risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically is a function of [CNSS-4009] : o the adverse impacts that would arise if the event occurs; and o the likelihood of occurrence We need a system for assessing the severity of computer system security vulnerabilities Examples: STRIDE Threat Library, Common Weakness Enumeration (CWE), Common Vulnerabilities/Exposures (CVE), and Copyright A.J. Kornecki, 2013 page 23

24 What is Common Vulnerability Scoring System? CVSS is a system for assessing the severity of computer system security vulnerabilities CVSS defines three groups of metrics for assessing vulnerabilities: base, temporal and environmental (however, only the base is mandatory) Copyright A.J. Kornecki, 2013 page 24

25 CVSS Base Impact & Exploitability Metrics The base group consists of six metrics divided into two subcategories: impact and exploitability metrics (in lieu of severity) Metrics are evaluated on a three-level non-numerical scale mapped onto numeric values (1, 2, and 3) o Impact metrics: Confidentiality, Integrity, Availability: None, Partial, Complete o Exploitability metrics: Access Vector: Local, Adjacent, Full Access Complexity: High, Medium, Low Authentication: Multiple, Single, None Copyright A.J. Kornecki, 2013 page 25

26 Proposed CVSS Base Scoring Formula: All six values are related with different weights by a formula, thus, producing a unique number of the base metric o BaseScore6 = = ((0.6*Impact) + (0.4*Exploitability) 1.5)*f(Impact) o Impact = = 10.41*(1-(1-Conf.Impact)*(1-Integ.Impact)*(1-Avail.Impact)) o Exploitability = = 20*Access.Vector*Access.Complexity*Authentication o f(impact) = 0 if Impact is equal to 0 = otherwise Copyright A.J. Kornecki, 2013 page 26

27 How the Threat Model is Used? How the Threat Model is Used? o In Design: Code Review o In Implementation: Penetration Testing o *** In Security Assessment: Simulation Example: mapping a cyber-physical system into SDL threat modeling tool (CACC imitation) Copyright A.J. Kornecki, 2013 page 27

28 Microsoft SDL Threat Modeling Tool Threat Modeling Is a core element of the Microsoft Security Development Lifecycle (hence SDL) for everyday user making threat modeling easy The SDL Threat Modeling Tool enables any developer or software architect to: o Communicate about the security design of their systems o Analyze designs for security issues using a proven methodology o Suggest and manage mitigations for security issues Copyright A.J. Kornecki, 2013 page 28

29 Example Microsoft SDL screen-shot Copyright A.J. Kornecki, 2013 page 29

30 Security Assessment via Simulation An actual example of a message exchange system over the CAN network has been set up The example includes two CAN nodes communicating with each other over the CAN bus, with additional Internet connectivity for both nodes The arrangement imitates part of the functionality of a larger CACC system CVE ID Publish Date Update Date Integrity Score Access Complexity Authentication Confidentiality Availability CVE Remote High Not Required None None None The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through and 2.2.x through , when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a.htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE Copyright A.J. Kornecki, 2013 page 30

31 Copyright A.J. Kornecki, 2013 page 31

32 Copyright A.J. Kornecki, 2013 page 32

33 Conclusions Firm modeling process established Experimental measurement process set up Tools ready and easy to use Potential Case Studies: o CAN (Controller Area Network) o Industrial Control Systems: SCADA o Wireless Sensor Networks: Zigbee o RFID/NFC o Time-Triggered Systems Copyright A.J. Kornecki, 2013 page 33

34 Comments/Questions Copyright A.J. Kornecki, 2013 page 34

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

Web-based Modules for Cyberphysical Systems Security

Web-based Modules for Cyberphysical Systems Security Web-based Modules for Cyberphysical Systems Security Janusz Zalewski, Florida Gulf Coast University Nary Subramanian, University of Texas at Tyler Andew Kornecki, Embry-Riddle Aeronautical University Bogdan

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

Information Systems Security

Information Systems Security Information Systems Security Lecture 4: Security Engineering Prof. Dr. Christoph Karg Aalen University of Applied Sciences Department of Computer Science 11.10.2015 Learning Objective Learning Objective

More information

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat

More information

Microsoft STRIDE (six) threat categories

Microsoft STRIDE (six) threat categories Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System

More information

Risk Assessment and Cloud Strategy Development: Getting it Right this Time!

Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Barbara Endicott-Popovsky, PhD University of Washington Center of Information Assurance and Cybersecurity Kirsten Ferguson-Boucher

More information

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Outline Scope Civil aviation regulation History Cybersecurity threats Cybersecurity controls and technology

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities 16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office

More information

Recall the Security Life Cycle

Recall the Security Life Cycle Lecture 7: Threat Modeling CS 436/636/736 Spring 2014 Nitesh Saxena Recall the Security Life Cycle Threats Policy Specification Design Implementation Operation and Maintenance So far what we have learnt

More information

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de HACKING RELOADED Hacken IS simple! Christian H. Gresser cgresser@nesec.de Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security

More information

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...

More information

Security Testing. How security testing is different Types of security attacks Threat modelling

Security Testing. How security testing is different Types of security attacks Threat modelling Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Lecture 7: Threat Modeling. CS 392/6813: Computer Security Fall 2007. Nitesh Saxena. *Adopted from a previous lecture by Nasir Memon

Lecture 7: Threat Modeling. CS 392/6813: Computer Security Fall 2007. Nitesh Saxena. *Adopted from a previous lecture by Nasir Memon Lecture 7: Threat Modeling CS 392/6813: Computer Security Fall 2007 Nitesh Saxena *Adopted from a previous lecture by Nasir Memon Course Admin HW 1 to 5 are graded; solutions provided HW6 being graded

More information

Mobile Application Threat Analysis

Mobile Application Threat Analysis The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under

More information

Threat Modeling. 1. Some Common Definition (RFC 2828)

Threat Modeling. 1. Some Common Definition (RFC 2828) Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.

More information

Beyond the Noise: More Complex Issues with Incident Response

Beyond the Noise: More Complex Issues with Incident Response Beyond the Noise: More Complex Issues with Incident Response IFIP WG Meeting, June 30, 2006 David Dittrich Center for Information Assurance and Cybersecurity/ The Information School University of Washington

More information

Secure By Design: Security in the Software Development Lifecycle

Secure By Design: Security in the Software Development Lifecycle Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development

More information

Evolving Optical Transport Network Security

Evolving Optical Transport Network Security Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director 732-699-6188 jkimmins@appcomsci.com Copyright 2012 All Rights reserved 1 Outline Overview of Optical

More information

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder mohamed.abomhara@uia.no Winter School in Information Security, Finse May

More information

APPLICATION THREAT MODELING

APPLICATION THREAT MODELING APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation

More information

Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011

Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011 Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against

More information

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

Quelle sécurité dans une banque?  Sécurité des transactions électroniques sur Internet et KYC Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC" Genève- UIPF 27 Nov.2010 La mission de WISeKey est de faciliter la croissance économique globale en sécurisant

More information

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services 1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

ISSECO Syllabus Public Version v1.0

ISSECO Syllabus Public Version v1.0 ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to

More information

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

Web Application Security Considerations

Web Application Security Considerations Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based Lecture Outline Intruders & Intrusion Hackers Criminal groups Insiders Detection and IDS Techniques Detection Principles Requirements Host-based Network-based Honeypot Madartists Intruders significant

More information

Data Platform Security. Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar

Data Platform Security. Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar Data Platform Security Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar Agenda Problem Statement Security for Enterprise Security Defaults - Vulnerabilities Configurations

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

Application Security Testing

Application Security Testing Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the

More information

Risk Management in the Development Process A Progress Report

Risk Management in the Development Process A Progress Report Risk Management in the Development Process A Progress Report 1 Introduction 2 Smart Meter Gateway - basic facts 3 Real Life Example Introduction Industry 4.0 and IoT gain importance of Embedded Systems

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor

More information

IDENTIFICATION OF BASIC MEASURABLE SECURITY COMPONENTS IN SOFTWARE INTENSIVE SYSTEMS

IDENTIFICATION OF BASIC MEASURABLE SECURITY COMPONENTS IN SOFTWARE INTENSIVE SYSTEMS IDENTIFICATION OF BASIC MEASURABLE SECURITY COMPONENTS IN SOFTWARE INTENSIVE SYSTEMS Reijo M. Savola VTT Technical Research Centre of Finland P.O. Box 1100, 90571 Oulu, Finland ABSTRACT Appropriate information

More information

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE

More information

Software Vulnerability Assessment

Software Vulnerability Assessment Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Cyber Impact Assessment for Space Mission Assurance

Cyber Impact Assessment for Space Mission Assurance Cyber Impact Assessment for Space Mission Assurance Presented by: Douglas Wiemer d.wiemer@rheagroup.com Mission and system taxonomy contribution: Cédric Seynat cseynat@rheagroup.ca 18 June 2013 1 1 Topics

More information

Information Assurance Metrics Highlights

Information Assurance Metrics Highlights Information Assurance Metrics Highlights Dr. Michael Schildcrout Naval Security Group 1 Outline Metrics Development Process Joint Service Effort DOT&E Sponsorship Risk Levels Remaining Issues 2 Information

More information

Criteria for Software Tools Evaluation in the Development of Safety-Critical Real-Time Systems 1

Criteria for Software Tools Evaluation in the Development of Safety-Critical Real-Time Systems 1 Criteria for Software s Evaluation in the Development of Safety-Critical Real-Time Systems 1 Andrew J. Kornecki Embry-Riddle Aeronautical University Daytona Beach, FL 32114-3900, USA Janusz Zalewski Florida

More information

Threat Modeling Architecting & Designing with Security in Mind OWASP. The OWASP Foundation http://www.owasp.org. Venkatesh Jagannathan

Threat Modeling Architecting & Designing with Security in Mind OWASP. The OWASP Foundation http://www.owasp.org. Venkatesh Jagannathan Threat Modeling Architecting & Designing with Security in Mind Venkatesh Jagannathan -Chennai Chapter Leader venki@owasp.org heyvenki@gmail.com Copyright The Foundation Permission is granted to copy, distribute

More information

Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada

Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the

More information

California State University, Chico. Information Security Incident Management Plan

California State University, Chico. Information Security Incident Management Plan Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Technical Proposition. Security

Technical Proposition. Security Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?

More information

NETWORK SECURITY ASPECTS & VULNERABILITIES

NETWORK SECURITY ASPECTS & VULNERABILITIES NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

Web application testing

Web application testing CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Towards a Systematic Threat Modeling Approach for Cyber-physical Systems

Towards a Systematic Threat Modeling Approach for Cyber-physical Systems Towards a Systematic Threat Modeling Approach for Cyber-physical Systems Goncalo Martins 1, Sajal Bhatia 1, Xenofon Koutsoukos 1, Keith Stouffer 2, CheeYee Tang 2, and Richard Candell 2 1 Institute for

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

McAfee Vulnerability Manager 7.0.2

McAfee Vulnerability Manager 7.0.2 McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains

More information

3 Web Services Threats, Vulnerabilities, and Countermeasures

3 Web Services Threats, Vulnerabilities, and Countermeasures 3 Web Services Threats, Vulnerabilities, and Countermeasures Securing a Web service requires us to protect, as far as possible, all of its basic components, shown in Figure 3.1, and their interactions

More information

Improving Cyber Security Risk Management through Collaboration

Improving Cyber Security Risk Management through Collaboration CTO Corner April 2014 Improving Cyber Security Risk Management through Collaboration Dan Schutzer, Senior Technology Consultant, BITS Back in March 2013, I wrote a CTO Corner on Operational and Cyber Risk

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Quantitative Security Risk Analysis of Enterprise Systems: Techniques and Challenges Tutorial ICISS, December 2014

Quantitative Security Risk Analysis of Enterprise Systems: Techniques and Challenges Tutorial ICISS, December 2014 Quantitative Security Risk Analysis of Enterprise Systems: Techniques and Challenges Tutorial ICISS, December 2014 Anoop Singhal Computer Security Division National Institute of Standards and Technology

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Improving SCADA Control Systems Security with Software Vulnerability Analysis Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: simram@it.su.lt

MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: simram@it.su.lt MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: simram@it.su.lt A great proportion of essential services are moving into internet space making the

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit

More information

UF Risk IT Assessment Guidelines

UF Risk IT Assessment Guidelines Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an

More information

Rapid Threat Modeling Techniques

Rapid Threat Modeling Techniques SESSION ID: ASD-R01 Rapid Threat Modeling Techniques Chad Childers IT Security Ford Motor Company Agenda Threat Modeling background Lessons Learned to make threat modeling faster Techniques specifically

More information

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report

More information

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

CDM Vulnerability Management (VUL) Capability

CDM Vulnerability Management (VUL) Capability CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

white SECURITY TESTING WHITE PAPER

white SECURITY TESTING WHITE PAPER white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...

More information

Ground System Attacks

Ground System Attacks Ground System Attacks Jared Ablon (jablon@mitre.org) February 25, 2014 Introduction to Ground System Software Assurance Approved for Public Release; Distribution Unlimited. 14-0091 Published by The Aerospace

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information