Export Controls on Intrusion Software. Collin Anderson Tom Cross
|
|
|
- Todd Lawson
- 10 years ago
- Views:
Transcription
1 Export Controls on Intrusion Software Collin Anderson Tom Cross
2 Do Export Controls on Intrusion Software Threaten Security Research? Truth is we don t know. (We re not lawyers and this isn t legal advice.) Truth is the Government doesn t know. (At least they are asking questions.) Truth is nobody knows. (We don t even agree about this...)
3 Outline: 1. Some Basics a. What is the problem? b. How do export controls work generally? 2. How these new Wassenaar rules work a. IP Network Surveillance Systems b. Intrusion Software c. Technology for the development of Intrusion Software 3. Implications a. Could these rules regulate full disclosure and open source? b. Do these rules apply to Vulnerability Research? c. Could these rules regulate coordinated disclosure or bug bounties? d. Could these rules regulate training classes? e. What if I leave pen testing tools on my laptop when I travel? f. What about foreign coworkers or my company s offices in other countries? g. What about reverse engineering tools? Debuggers? Exploit generators? Jailbreakers? h. If I ask BIS for permission, will I get a license? 4. What can we do about it?
4 The Basics
5 Surveillance is Big Business!
6 What s the problem?
7 The Problem: 1. The Citizen Lab correctly identified 21 customers of Hacking Team. 2. The US DEA and US Army are customers. DEA are using the technology out of their embassy in Bogota, Colombia. 3. Hacking Team sold its technology to three agencies in Morocco. The Moroccan government's intimidation of civil society is nothing more than an attempt to silence legitimate criticism. 4. Hacking Team have been evading the legitimate questions from UN investigators regarding the sale of technology to Sudan. 5. NICE Systems appears to have sold Hacking Team spyware to Azerbaijan, Uzbekistan, and Denmark. 6. Hacking Team are trying to secure a sale to the Rapid Action Battalion (RAB), a Bangladesh police unit described by Human Rights Watch as a death squad involved in torture and extrajudicial killings. 7. Hacking team reinstated support contracts with the Ethiopian government despite reports of the targeting of Ethiopian US-based journalists by Hacking Team's spyware. 8. Our lobbying of the Italian government on export controls worked. We wrote to the Italian Ministry of Economic Development, over 100 parliamentarians, and to the regional Government calling for unilateral export controls on Hacking Team's spyware. We were successful in that the Italian government implemented the controls that we had been calling for and temporarily suspended Hacking Team's operations, citing possible uses concerning internal repression and violations of human rights.
8 The Solution:
9 What is the Wassenaar Arrangement?
10 How do export controls work in the US? < ITAR (International Traffic in Arms Regs) Governed by the State Department Controls Military Items (US Munitions List) Includes items for National Police forces Includes Military Encryption Items Includes items that hinder the operation of adversary electronics Includes items that exploit the electromagnetic spectrum (regardless of transmission medium). EAR (Export Administration Regulations) > Governed by the US Bureau of Industry and Security (BIS) Controls Dual Use Items - Civilian items that have military applications Includes controls on Cryptography The new controls on Intrusion Software fit here
11 Wait, didn t we win the crypto wars?
12 License Exception TSU
13 The New Rules
14 IP Network Surveillance Systems 5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the following: 1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone): Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC )); Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and Indexing of extracted data; and 2. Being specially designed to carry out all of the following: Execution of searches on the basis of hard selectors ; and Mapping of the relational network of an individual or of a group of people.
15 What is Intrusion Software? Software specially designed or modified to avoid detection by monitoring tools, or to defeat protective countermeasures, of a computer or network capable device, and performing any of the following: The extraction of data or information, from a computer or network capable device, or the modification of system or user data; or The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. Monitoring tools : software or hardware devices, that monitor system behaviours or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or firewalls. Protective countermeasures : techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) or sandboxing
16 Is Intrusion Software Controlled? NO
17 Then what IS controlled? 4. A. 5. Systems, equipment, and components therefore, specially designed or modified for the generation, operation or delivery of, or communication with, Intrusion Software. 4. D. 4. Software specially designed or modified for the generation, operation or delivery of, or communication with, Intrusion Software.
18 Technology is also controlled 4. E. 1. c. Technology for the development of Intrusion Software. Technology - Specific information necessary for the development, production, or use of a product. The information takes the form of technical data or technical assistance. NOTE: Intrusion Software itself is NOT controlled, but information necessary for the development of Intrusion Software IS controlled, including technical data and technical assistance.
19 The Implications
20 What about Full Disclosure and Open Source? 15 CFR The following items are not subject to the EAR: Publicly available technology and software that: (i) Are already published or will be published as described in of this part; (ii) Arise during, or result from, fundamental research, as described in of this part; (iii) Are educational, as described in of this part;
21 Encryption vs. Intrusion Software Stuff Encryption: License Exception TSU Must be publicly available Must be open source You must BIS and notify them Controlled Stuff related to Intrusion Software : 15 CFR 734.3(b)(4) Must be publicly available Does NOT need to be open source BIS does NOT need to be notified
22 Is Vulnerability Research Covered? BIS, in the federal register: Technology for the development of intrusion software includes proprietary research on the vulnerabilities and exploitation of computers and networkcapable devices. BIS, in the FAQ on their website: The proposed rule would not control Information about the vulnerability, including causes of the vulnerability. BIS, also in the FAQ on their website: Neither the disclosure of the vulnerability nor the disclosure of the exploit code would be controlled under the proposed rule. However: The proposed rule would control Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform.
23 Coordinated Disclosure and Bug Bounties From the BIS FAQ: Any technical data sent to an anti-virus company or software manufacturer with the understanding that the information will be made publicly available, would not be subject to the EAR. However, "technology" that is not intended to be published would be subject to the control.
24 Planning to disclose a mitigation bypass?
25 Sharing Exploit Toolkit Samples? If you discover an exploit toolkit in the wild and want to share it with other infosec professionals or software vendors across borders, apparently, this may not be allowed under the proposed rule. BIS, in their FAQ: Exploit toolkits would be described in proposed ECCN 4D004 There are no end user or end use license exceptions in the proposed rule.
26 What about training classes? On the one hand: Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information. Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform. On the other hand, 15 CFR 734.7(a)(4): Release at an open conference, meeting, seminar, trade show, or other open gathering. (i) A conference or gathering is open if all technically qualified members of the public are eligible to attend and attendees are permitted to take notes or otherwise make a personal record (not necessarily a recording) of the proceedings and presentations. (ii) All technically qualified members of the public may be considered eligible to attend a conference or other gathering notwithstanding a registration fee reasonably related to cost and reflecting an intention that all interested and technically qualified persons be able to attend, or a limitation on actual attendance, as long as attendees either are the first who have applied or are selected on the basis of relevant scientific or technical competence, experience, or responsibility (See Supplement No. 1 to this part, Questions B(1) through B(6)).
27 Planning to travel outside the USA? Baggage (BAG). (a) Scope. This License Exception authorizes individuals leaving the United States either temporarily (i.e., traveling) or longer-term (i.e., moving) and crew members of exporting or reexporting carriers to take to any destination, as personal baggage, the classes of commodities, software and technology described in this section. BIS, in the Federal Register: No license exceptions would be available for these items, except certain provisions of License Exception GOV, e.g., exports to or on behalf of the United States Government pursuant to (b) of the EAR.
28 What about foreign coworkers & offices? BIS, in their FAQ: The proposed rule does not provide for any exceptions to deemed export license requirements. BIS on Deemed Export - Release of controlled technology to foreign persons in the U.S. are "deemed" to be an export to the person s country or countries of nationality. Also, BIS, in their FAQ: There is no license exception for intra-company transfers or internal use by a company headquartered in the United States under the proposed rule.
29 Debuggers and exploit generators? BIS, in their FAQ: General purpose tools, such as IDEs, are not described under proposed ECCN 4D004 because they are not "specially designed" for the generation of "intrusion software." Some penetration testing tools (FAQ #12) and exploit toolkits (FAQ #18) are described in proposed ECCN 4D004, as they are command and delivery platforms for "intrusion software."
30 Jailbreaking Software? BIS, in their FAQ: If particular jailbreak software did meet all the requirements for classification under ECCN 4D004 (such as a commercially sold delivery tool "specially designed" to deliver jailbreaking exploits) then it would be subject to control and a license would be required to export it from the United States. Note that if such software were "publicly available," it would not be subject to the Export Administration Regulations.
31 Will I get a license? BIS, in the Federal Register: Note that there is a policy of presumptive denial for items that have or support rootkit or zero-day exploit capabilities. Dave Aitel: If you are modular in any way, you facilitate 0day. An 0day is just a program after all. So anything that can execute commands or auto update is now "default deny" for export.
32 What do we do about it?
33 Comment Period? At the time these slides were composed, the open comment period will close before Defcon, on July 20th, However, we anticipate that BIS may extend this comment period, or open up a new one in the future.
34 Key Points: At least, the US has published their interpretations and asked for feedback. The Wassenaar Negotiators did not. Many countries in Europe have enacted this without publishing information about how they plan to interpret it. Regulators will probably be responsive to clear, negative impacts the regs will have on: Legitimate information security research. Legitimate computer security work. Legitimate business activity and the economy as a whole. Regulators will not be responsive to vitriol or paranoid, overly broad misinterpretations of their proposed regs. Its important to relate potential problems to the specific statements that regulators have made about how they interpret the regulations.
35 Stay Informed: Federal Register: gov/articles/2015/05/20/ /wassenaar-arrangement-2013-plenaryagreements-implementation-intrusion-and-surveillance-items BIS FAQ: Regs list:
ETRAC Presentation ECCN 4E001.c intrusion software technology. Jim O Gorman, President October 15, 2015
ETRAC Presentation ECCN 4E001.c intrusion software technology Jim O Gorman, President October 15, 2015 Offensive Security - Projects Kali Linux (previously BackTrack Linux) Industry Standard Open source
Intrusion Software Tools and Export Control Introduction. Export Control in Context
Intrusion Software Tools and Export Control Introduction The purpose of this Note is to explain the controls on export of intrusion software tools that were agreed by the Wassenaar Arrangement in December
Export Control Management System
Export Control Management System Export Controls are federal regulations and laws that restrict the export of certain controlled technologies in order to restrict access to goods and technology that have
I. The Proposed Interpretation of Intrusion Software Inappropriately Fails to Exclude Software for Defensive Activities
July 20, 2015 Ms. Hillary Hess Director, Regulatory Policy Division Room 2099B Bureau of Industry and Security U.S. Department of Commerce 14th Street & Pennsylvania Ave., N.W. Washington, D.C. 20230 Re:
Export Control Compliance Procedure Guide June 8, 2012
Export Control Compliance Procedure Guide June 8, 2012 1 TABLE OF CONTENTS Contents TABLE OF CONTENTS... 1 SUMMARY... 2 INTRODUCTION... 3 SCHOOL POLICY... 4 EXCLUSIONS... 4 WHAT IS AN EXPORT?... 4 CONDUCTING
COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls
Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 1 / JUNE 13, 2013 Expert Analysis Software Development and U.S. Export Controls
Encryption Export Controls: A Comparative Analysis between the EU and the US
2013 Annual International Trade Compliance Conference Encryption Export Controls: A Comparative Analysis between the EU and the US John F. McKenzie Baker & McKenzie San Francisco Jasper Helder Baker &
EXPORT CONTROLS COMPLIANCE
Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern
Table of Contents 734.1 INTRODUCTION 734.1 INTRODUCTION... 1 734.2 IMPORTANT EAR TERMS AND PRINCIPLES... 1 734.3 ITEMS SUBJECT TO THE EAR..
Scope of the Export Administration Regulations Part 734 - page 1 Table of Contents 734.1 INTRODUCTION... 1 734.2 IMPORTANT EAR TERMS AND PRINCIPLES... 1 734.3 ITEMS SUBJECT TO THE EAR.. 4 734.4 DE MINIMIS
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance Program (ICP) Contracting Services to Outside Experts
Olga Torres, Associate Ol T A i t Braumiller Schulz LLP International Trade Law www.globaltradelaw.net Overview Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance
University of Maryland Export Compliance Program
April 6, 2015 Message from the Vice President for Research Export control is governed by a group of federal regulations intended to advance the national security, foreign policy, and economic interests
Table of Contents 762.1 SCOPE 762.2 RECORDS TO BE RETAINED
Recordkeeping Part 762--page 1 Table of Contents 762.1 SCOPE... 1 762.2 RECORDS TO BE RETAINED... 1 762.3 RECORDS EXEMPT FROM RECORDKEEPING REQUIREMENTS... 3 762.4 ORIGINAL RECORDS REQUIRED... 4 762.5
Export Controls: What are they? Why do we care?
Export Controls: What are they? Why do we care? Laura Langton, PhD Export Control Manager [email protected] 314-747-1378 http://research.wustl.edu/complianceareas/exportcontrols What is an Export? Release
UNITED STATES DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY WASHINGTON, D.C. 20230
UNITED STATES DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY WASHINGTON, D.C. 20230 In the Matter of Winter Aircraft Products SA m a Ruf S. Lopez SA CFerrocarril41 1 DCHA 28045 Madrid, Spain and
Rules and Regulations
1059 Rules and Regulations Federal Register Vol. 76, No. 5 Friday, January 7, 2011 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most
Harvard Export Control Compliance Policy Statement
Harvard Export Control Compliance Policy Statement Harvard University investigators engage in a broad range of innovative and important research both in the United States and overseas. These activities
1. Not Subject to the EAR and Defense Article. (1) Reserved. (2) Reserved
1. Not Subject to the EAR and Defense Article 734.3 (a) (NO REVISION) (b) The following are not subject to the EAR: (1) (NO REVISION) (2) (NO REVISION) (3) Information and software that: (i) Are published,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
Export Controls and Cloud Computing: Legal Risks
Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Office of Export Enforcement Bureau of Industry and Security (BIS) U.S. Department of Commerce
Office of Export Enforcement Bureau of Industry and Security (BIS) U.S. Department of Commerce Sidney M. Simon Special Agent in Charge New York Field Office Export Enforcement s Mission Protect National
Second Annual Impact of Export Controls on Higher Education & Scientific Institutions
The following presentation was presented at the Second Annual Impact of Export Controls on Higher Education & Scientific Institutions Hosted by Georgia Institute of Technology In cooperation with Association
Table of Contents 738.1 INTRODUCTION (CCL) STRUCTURE
Commerce Control List Overview and the Country Chart Part 738 page 1 Table of Contents 738.1 INTRODUCTION... 1 738.2 COMMERCE CONTROL LIST (CCL) STRUCTURE... 1 738.3 COMMERCE COUNTRY CHART STRUCTURE...
Top 10 Questions to Ask Before Exporting Software Containing Encryption
Top 10 Questions to Ask Before Exporting Software Containing Encryption January 14, 2009 Agenda Introduction FOSSBazaar Top Ten Questions Before Exporting Encryption Questions & Answers Speakers Eran Strod
COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT
COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that
A Primer on U.S. Export Controls
A Primer on U.S. Export Controls Presentation for the Pacific Northwest Defense Coalition By Akana K.J. Ma Partner, Ater Wynne LLP 16 July 2013 (503) 226-8489/[email protected] Akana K.J. Ma 2013 All Rights
Export Control Training
2007 Export Control Training Office of Sponsored Research and Programs Missouri State University Missouri State University Research Security and Export Controls Compliance Manual 11/7/2007 1 As an employee
Policy and Procedures Date: 08-24-11
Virginia Polytechnic Institute and State University Policy and Procedures Date: 08-24-11 Subject: Export and Sanctions Compliance Policy Definitions 1.0 Policy 2.0 Oversight 3.0 Responsibilities of Faculty,
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION
EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION EXPORT CONTROL LAWS WHAT ARE EXPORT CONTROLS? U.S. laws and their implementing regulations that govern the distribution to foreign nationals and
Export Controls. How to Comply with Export Controls. By Kimberly Marshall
Export Controls How to Comply with Export Controls By Kimberly Marshall Purpose of Regulation Technological superiority is a significant element in the defense of the United States, along with research,
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY
Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY 1 Why Be Concerned with Export Control Laws Certain export control laws may apply to FIT research activities here and abroad. Failure
Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee
This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The
TNC Insurance Compromise Model Bill March 24, 2015 v2
(Stat/Reg #): Transportation Network Vehicle Insurance Requirements A. Definitions 1. "Personal Vehicle" means a vehicle that is used by a Transportation Network Company Driver in connection with providing
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Course Title: Penetration Testing: Communication Media Testing, 1st Edition
Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Table of Contents 758.1 THE ELECTRONIC EXPORT INFORMATION (EEI) FILING TO THE AUTOMATED EXPORT SYSTEM (AES)
Export Clearance Requirements Part 758-page 1 Table of Contents 758.1 THE ELECTRONIC EXPORT INFORMATION (EEI) FILING TO THE AUTOMATED EXPORT SYSTEM (AES)1 758.2 AUTOMATED EXPORT SYSTEM (AES)... 5 758.3
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
United States Export Controls on Internet Software Transactions. John F. McKenzie Partner, Baker & McKenzie LLP
United States Export Controls on Internet Software Transactions John F. McKenzie Partner, Baker & McKenzie LLP August 2010 Table of Contents 1. Introduction...1 2. The Concept of an "Export" for Export
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Key Elements of International Trade Compliance. Presented by:
Key Elements of International Trade Compliance Presented by: International Business Transactions International Civil Litigation 2 I. Introduction Every international shipment implicates at least TWO legal
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Guidelines for Preparing Export License Applications Involving Foreign Nationals
Guidelines for Preparing Export License Applications Involving Foreign Nationals I. Introduction BIS has prepared these guidelines for exporters to use in submitting license applications for foreign nationals
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Supplemental Handout TNC Insurance Compromise Model Bill Updated March 26
Supplemental Handout TNC Insurance Compromise Model Bill Updated March 26 2015 National Association of Insurance Commissioners SUGGESTED KEY MESSAGES FOR TNC INSURANCE COMPROMISE MODEL BILL SUPPORTERS:
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
To proceed, you need to agree to the following Terms and Conditions:
To proceed, you need to agree to the following Terms and Conditions: By clicking on the box below, you enter into a subscription agreement with Silent Circle for the services it provides (the Agreement
COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6
1. Procedure Title: PCI Compliance Program COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 2. Procedure Purpose and Effect: All Colorado State University departments that accept credit/debit
RSA. Frequently Asked Questions. RSA Data Security, Inc. About Cryptography Export Laws. Answers to THE KEYS TO PRIVACY AND AUTHENTICATION
RSA Data Security, Inc. Answers to Frequently Asked Questions About Cryptography Export Laws RSA DATA SECURITY, INC. THE KEYS TO PRIVACY AND AUTHENTICATION Copyright Notice Copyright 1996 by RSA Data Security,
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Regulatory Compliance and Trade
Regulatory Compliance and Trade Global Transaction Services Cash Management Trade Services and Finance Securities Services Fund Services Regulatory Compliance and Trade 2007 These materials are provided
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Louisiana State University A&M Campus Export Control Compliance Manual October 2013
Louisiana State University A&M Campus Eport Control Compliance Manual October 2013 Acknowledgements: The information in this document has been derived from sources including University of Massachusetts
Surviving the Era of Hack Attacks Cyber Security on a Global Scale
Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This
CUSTOMER PRIVACY STATEMENT
CUSTOMER PRIVACY STATEMENT For Cable Television, High-Speed Internet, and Phone Services Looking for our website privacy statement? Click here. Summary of this privacy notice This privacy notice applies
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
DropSmack: How cloud synchronization services render your corporate firewall worthless
DropSmack: How cloud synchronization services render your corporate firewall worthless Jake Williams [email protected] Please complete the Speaker Feedback Surveys. Feedback Surveys This will help
SI/SAO Export Compliance Training 1/9/2014
1 Why Compliance Matters Risks and Responsibilities Export Controls are Complex Understanding the Regimes and Agencies we must comply with What processes we are putting in place at SI to comply Identifying
Commercial Internet Banking Agreement and Disclosures
Rev. 4/2015 Commercial Internet Banking Agreement and Disclosures 1. Coverage. This Agreement applies to your use of our commercial Internet Banking Service, which permits you to access your accounts with
How To Comply With The Pci Ds.S.A.S
PCI Compliance and the Data Security Standards Introduction The PCI DSS, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
