CONNECTED CAR SECURITY THREAT ANALYSIS AND RECOMMENDATIONS

Size: px
Start display at page:

Download "CONNECTED CAR SECURITY THREAT ANALYSIS AND RECOMMENDATIONS"

Transcription

1 CONNECTED CAR SECURITY THREAT ANALYSIS AND RECOMMENDATIONS Version: 1.00 Author: Sławomir Jasek SecuRing Date: This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

2 This document was originally created by the SecuRing team. Current version will be available at SecuRing web page. If you have any comments, change requests, want to provide feedback or help with future versions of this document, please don t hesitate to contact me at slawomir.jasek@securing.pl Sławomir Jasek - 2 -

3 CONTENTS 1. Introduction Attack vectors and threat agents Telematics connection SMS API Cloud : web interfaces, mobile APIs, data collection Mobile applications Infotainment Firmware upgrades (OTA, USB, Bluetooth, mobile app...) Wireless interfaces (Wi-Fi, Bluetooth) External sensors Wireless key entry External devices connected via OBD Vehicle-to-vehicle, autonomous etc References

4 1. INTRODUCTION A contemporary car is composed of at least a dozen electronic control units, connected via several dedicated buses, and exchanging thousands of messages processed in real-time. As more and more of crucial car functionality is managed by software rather than hardware, the complexity of software grows exponentially. Unfortunately, this often leads to vulnerabilities, especially as testing all possible attack scenarios before shipment is in fact beyond reach. Additionally, the current trend of development areas in infotainment, smartphone link, telematics, diagnostics and autonomous car implicates dynamic progress of car's components integration with external systems and applications. This exposes cars to serious, until now inapplicable threats. Adding the fact that cars are a very attractive target of malicious attacks, security implications are inevitable. Patching process of car's firmware for security vulnerabilities revealed after releasing millions of units may be very difficult and expensive (not to mention damage to reputation). That is why it is so important to implement security mechanisms correctly from the beginning, starting in the design phase. In this article we will try to categorize and describe most notable threat agents to contemporary car systems, sample attack scenarios, publicly disclosed vulnerabilities, and some recommendations for countermeasures which should be taken into consideration during development

5 2. ATTACK VECTORS AND THREAT AGENTS The most significant attack vectors are pictured below: Threat agents and their main goals: Thief - a thief who wants to steal the car, or just open it and steal its contents. Proximity intruder - an intruder who is in a short, limited range from the car or the owner. Owned mobile device - an intruder who takes over mobile device (malware, temporal access, stealing,...) Malicious media - a malicious media, data, files... Attacker from internet - anonymous attacker from the Internet. Spying attempts - an individual attempting to spy on a user (e.g. his location or driving habits). Hostile intents - an adversary with hostile intents - for example to cause an accident, scare the user etc

6 2.1. Telematics connection Threat agents: Thief Proximity intruder Attacker from internet Spying attempt Attack scenarios: The most obvious attack scenario applies to intercepting telematics traffic. The assumption that GSM or satellite communication medium is difficult to intercept is not up-to-date in face of current availability and possibility to create a GSM intercepting device (IMSI catcher). In the simplest form the attack would consist in passive sniffing of unencrypted traffic, but with above-mentioned hardware it is also possible to actively intercept the connection. Such scenario would allow to mount so called Man-in-the-Middle attack, which may abuse improper authentication and encryption in order to inject malicious commands into traffic. Less obvious attacks include direct connection to exposed services - adversary acting at remote IP connection could directly attack excessive services available on IP address of telematic unit from external network. Examples of publicly known attacks: As it has been disclosed in [5] the GSM transmission of telematics unit was not properly secured, and in effect it was possible to take remote control over the car. The issue affected - 6 -

7 about 2.2 millions of cars. Excessive service available on IP address of telematic unit from external network has been abused to remotely attack cars, as described in [1]. It was possible to connect to vulnerable service on a dedicated TCP port from the same GSM operator's network. The issue affected about 1.4 million cars. Recommendations: Data transmission between car and backend servers should be properly encrypted. Both sides of the transmission should authenticate each other. The IP address of telematics unit should not disclose any external services

8 2.2. SMS API Threat agents: Thief Proximity intruder Atacker from internet Spying attempts Attack scenarios: Several systems implement SMS commands - for example during turned off engine, initialization, or network connection problems. It should be taken into consideration, that SMS can be intercepted and spoofed, e.g. using similar techniques as described above ("IMSI catcher"). Therefore SMS whitelisting is not enough to perform remote authentication. The telephone number associated with the SIM card also cannot be regarded confidential, as well as the SMS command format (e.g. possible to sniff, reverse firmware). An attacker may try to send specially crafted text messages directly to the device. Examples of publicly known attacks: In [8] researchers proved, that by sending carefully crafted SMS messages to one of external devices connected to the dashboard of a car, they were able to transmit commands to the car s CAN bus, for example to enable or disable its brakes

9 Recommendations: Remote SMS administration should use an additional form of authentication (and preferably also encryption) on top of SMS. Given the difficulty of properly securing communication in this medium, it should be considered to disable administrative commands available via SMS API

10 2.3. Cloud : web interfaces, mobile APIs, data collection Threat agents: Attacker from internet Spying attempts Hostile intents Thief Attack scenarios: Some telematics systems allow to be monitored via a dedicated web interface. An attacker may try to create account associated with particular car only by knowledge of VIN number (which should not be considered confidential), or somehow abuse the pairing process. External web interfaces or mobile APIs are affected by problems typical to web applications, known for many years but unfortunately still captured in the wild even in risk-critical applications. For example access control, brute-force, malicious injection, server-side misconfiguration, unpatched software etc. The data collected by telematics system is a profitable target, and in order to attack it an intruder may utilize sophisticated, targeted methods against internal staff workstations. Examples of publicly known attacks: At the time of writing this article there are no publicly known attacks on remote car "backend interfaces. But there are publicly known hundreds of examples of successful attacks on similar interfaces in risk-critical applications - e.g. in internet banking. Recommendations: The secure software development practices should be implemented, and enforced especially during development of publicly exposed services (e.g. web application, mobile API). This applies to all phases of development and includes proper threat modeling, secure design and external assessment. The backend system, administrative access and supporting infrastructure should be properly secured. According to least privilege principle (as well as existing and forthcoming regulations), the system should not collect or process excessive data, overwrite or anonymize historical ones

11 2.4. Mobile applications Threat agents: Owned mobile device Proximity intruder Spying attempts Malicious media Attack scenarios: The main two groups of mobile apps, with different risk applied are infotainment and remote control applications. Infotainment applications The majority of infotainment (e.g. social media, music streaming, phone sync) mobile applications are by design connected only to "infotainment unit" - radio/navigation/display, which often hosts additionally its own native applications. The risk involved may be overlooked - an intruder's goal may be simply to scare the driver and cause an accident, or just spy on him. Taking remote control over the car's radio (e.g. via vulnerable mobile application) may be more than enough for such purpose. Besides, the assumption that this unit is separated from car's control bus (and thus it is not possible to take control over the car) is not always true [see also below]

12 Remote control applications Development of applications, which allow to remotely control the car, should enforce strict secure coding requirements. The risk involved may be even higher than e.g. in mobile banking application, yet these applications are not developed with equal care. We have examined most basic security aspects of several applications from different vendors, and the conclusions are not optimistic. For example, most of tested "remote car" applications does not obfuscate the code, and can be easily decompiled. The "Lack of Binary Protections" is included in OWASP Mobile Top 10 list. Of course the security mechanisms should not depend only on the obfuscation, but the lack of it makes it much easier to analyze the application, what may help to conduct further attacks and it is generally considered as bad practice. Another concern is that no single examined application utilizes certificate-pinning, which raises the bar for attacks on SSL transmission, and is de-facto standard in high-risk (e.g. banking) applications. The most risky elements of applications (e.g. access control mechanisms on the server-side API) could not be examined without pairing with existing car. Sample attacks on mobile users include intercepting transmission between mobile application and server (abusing improper transmission protections), malware on the device (e.g. hostile application), temporary access to device or stealing, social engineering. The possibility to take control over the car's infotainment unit may be further abused to escalate the attack and get access to car s internal bus. Examples of publicly known attacks: As it recently turned out [6], the ios application of a tracking device did not verify SSL certificates properly, and it was possible to conduct "Man-in-the-middle" attack on the connection, thus taking over control of the car. Recommendations: Secure coding principles for mobile applications include implementing proper transmission encryption, avoiding of sensitive information storage on a device, and properly designing authentication

13 2.5. Infotainment Threat agents: Owned mobile device Hostile intents Proximity intruder Malicious media Attacker from internet Spying attempts Attack scenarios: Nowadays it is difficult to imagine infotainment unit completely disconnected from other car's components. The connection is required even for simple features like automatic radio volume adjustment based on current speed, not to mention more advanced applications like diagnostic information. The assumption that infotainment or diagnostics are physically separated from car's control bus (and thus it is not possible to take control over the car) is often not true. The so-called "galvanic" separation often happens to be partly in software, in a form of a microcontroller filtering allowed commands and communication directions. As it has been demonstrated in [1], the separation may be bypassed by reflashing the controller, and an intruder may gain access to internal bus for example via car's radio unit. The sample attacks on infotainment unit depend on its functionality, and may include hostile internal/mobile application (see also Mobile application 2.4), improper data improper data or access control in various components and inputs (navigation, external services, USB, radio RDS data, audio/video file...). The attack may be also mounted against used software and hardware

14 components e.g. additional services like UPNP, hotspot captive portal, embedded Wi-Fi or Bluetooth (see also Wireless - 2.7). Examples of publicly known attacks: The researchers created malicious audio, which played on the car's stereo could alter the firmware of the device, giving attackers an entry point to change other components on the car [9]. As shown in [1], it was relatively simple to gain administrative access to the infotainment unit, what was further abused to take control over internal bus. Recommendations: All external data should be treated as potentially hostile: properly validated and normalized. In design there should be implemented multi-layer protections, least privilege principle and separation of processes. The used software components should be developed in compliance with secure coding guidelines, and enable quick and secure upgrade in case of disclosure of a known vulnerability

15 2.6. Firmware upgrades (OTA, USB, Bluetooth, mobile app...) Threat agents: Owned mobile device Proximity intruder Malicious media Attack scenarios: The firmware image delivered by various media (OTA, USB, Bluetooth, mobile app ) may be intercepted and decrypted. The attacker may reverse engineer the firmware contents, what allows to understand internal device operation and may reveal stored secrets (e.g. keys, commands). In a more sophisticated scenario, an attacker may tamper the firmware image, and use it to upgrade the car s component microcontroller to change its operation. Examples of publicly known attacks: As it was proved in [1], the integrity of image was not properly validated, and it was possible to upgrade tampered one, in effect compromising security of the microcontroller. Recommendations: The security mechanisms should not rely on secrets stored in firmware (aka "snake oil security"). The firmware file image encryption is recommended security mechanism, but will not prevent skilled attacker from decrypting the image (e.g. by reverse-engineering the key from car's unit), but may slow down an adversary with analyzing the code. During upgrade, special care should be taken into proper verification of image integrity proper cryptographic sign of all the image contents

16 2.7. Wireless interfaces (Wi-Fi, Bluetooth) Threat agents: Connected Car SecurityThreat Analysis and Recommendations Owned mobile device Proximity intruder Attack scenarios: The risk involved with attacks on local wireless connections is smaller than remote attacks - because it does require physical nearness. However, an attacker could install small unit acting as a proxy between local wireless interfaces and remote adversary. We should also take into consideration, that the thief would need to get to the car eventually, so any local vulnerability that helps to unlock the car should be considered critical. Wi-Fi hotspot An excessive service available on the Wi-Fi router may be attacked, in effect giving administrative access to unit. Additional impact on risk is put by the fact that Wi-Fi access password could be broken, and the attack could be conducted by external intruder, which aim will not be just to use the free Wi-Fi connection. Similar attacks may be conducted on used software components, like captive portal, proxy etc. - for example using known vulnerabilities. Various embedded operating systems (including Linux) have history of flaws in Wi-Fi device drivers, what in some cases may allow for remote command execution

17 Bluetooth The Bluetooth stack implementation may have vulnerabilities which can be abused to attack the car. The new Bluetooth Low Energy adoption may increase the security problems, as this technology is more difficult to secure properly. Examples of publicly known attacks: An excessive service available on the Wi-Fi router was attacked as in [1], in effect giving administrative shell access to internal unit's functions. The weakness in Wi-Fi access password allowed to conduct the attack by external intruder. As it has been demonstrated in [3], the Bluetooth stack implementation may have vulnerabilities which can be abused to attack the car. Recommendations: The wireless interfaces should use verified and stable firmware and drivers, and utilize industrystandard security mechanisms (authentication, pairing and encryption). According to least privilege principle, excessive services should not be exposed on the hotspot's internal IP

18 2.8. External sensors Threat agents: Proximity intruder Attack scenarios: More and more of the car's functionalities are based on various external sensors. External sensors may be spoofed and the car systems may take improper decisions based on the data. Also there are possible flaws in parsing of external data, which in some cases may allow to take control over the receiving component. The more of the car's functionality is based on sensors (e.g. autonomous car), the bigger the risk. Examples of publicly known attacks: As it has been demonstrated in [10], external sensors may be spoofed and the car systems may take improper decisions based on the incorrect data. Recommendations: The authenticity of data from external sensors should be carefully verified. The integrity of data

19 2.9. Wireless key entry Threat agents: Proximity intruder Thief Attack scenarios: The wireless key entry has been abused for several years by thieves via a very simple trick - a wireless amplifier. The thief standing by car directs antenna to the key (located for example inside the house), and creates "wireless bridge". The car receives amplified key signal, and opens the door automatically. It is abused especially by thieves stealing contents of the car (not the car itself). But the security mechanisms in wireless keys also have serious implementation problems, as has been demonstrated by several researchers [7]. The fact that the vendor delayed this publication by a court order did not resolve it. Examples of publicly known attacks: The weaknesses of a wireless key entry solution have been demonstrated by several researchers in [7]. The fact that the vendor delayed this publication by a court order did not resolve the actual problem. Recommendations: It takes a team of talented cryptographers and long independent review procedure to design completely new, solid cryptographic algorithm. It is recommended rather to use verified algorithms in a secure configuration: proper initialization, secure random, algorithm combination, key length and parameters. The wireless amplification attack may be circumvented by additional measures like second factor confirmation

20 2.10. External devices connected via OBD Threat agents: Proximity intruder Spying attempts Attacker from internet Owned mobile device Hostile intents Attack scenarios: On-board Diagnostic interface is mandatory for almost 20 years, and is present in all current vehicles. It provides information on engine, fuel consumption, battery level etc. By design it is connected to the diagnostic bus, but in many car models diagnostic bus is not separated from other buses. Vendors often also allow to reconfigure several internal functions of the car by proprietary software connected to interface, which authenticates itself using special keyed commands. The security of the process is usually based on the confidentiality of the keys and commands, which will leak eventually. As has been shown in [4], it is relatively easy to reveal the keys by reversing diagnostic software or brute-force. For example, the unauthorized services of "chip tuning" the engine or meter reversing are available for years. There are several of external devices that can be connected to OBD port. Some of them allow to track the car remotely, some even allow to unlock it. Various telematics vendors offer their devices in such external form. Such devices may have serious vulnerabilities. An attacker may want to abuse device s functionality e.g. for tracking the victim, or try to get direct access to car s bus

21 The risk and attack scenarios depend on the device functionality (e.g. connection to Internet, mobile application, tracking, remote control etc.). Examples of publicly known attacks: An example research regarding security of external telematic control units (TCU) devices was published in [8]. The researchers pointed several vulnerabilities, which in effect allowed them to take remotely full control over a car. Recommendations: Depending on functionality, the recommendations concerning above mentioned issues (e.g. telematics connection, cloud interfaces, mobile applications and wireless) apply

22 2.11. Vehicle-to-vehicle, autonomous etc. Threat agents: Connected Car SecurityThreat Analysis and Recommendations We can expect intensive development of the new car applications for collision avoidance, autonomic car, vehicle-to-vehicle communication or traffic routing [11]. So far the technology is not yet widely deployed, and there are not successful attacks publicly known. But the complexity of the software involved combined with attacker s motivation will most probably lead to disclosure of new vulnerabilities, like in the above mentioned examples. info@securing.pl Jontkowa Górka 14a, Kraków, Poland tel fax We help to achieve appropriate level of applications and systems security. Founded in Since that time we have worked for leading banks, insurance companies, telecom providers, government institutions and software houses, providing services such as: application security testing and assessment, code review, definition of security requirements, project review, education. We are focusing on application security problems. Our expertise covers different kinds of application (e.g. electronic banking, electronic payments, FOREX, e- commerce, voting, building automation, surveillance technologies, automotive, internet of things, etc.) and wide spectrum of technologies (web, mobile, WebServices, embedded, desktop)

23 3. REFERENCES ConnectedDrive html Dismantling Megamos Crypto: Research: News: 8. Paper: News: / html Icons made by Freepik from Flaticon is licensed by Creative Commons BY

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

BlackBerry 10.3 Work Space Only

BlackBerry 10.3 Work Space Only GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

OWASP Mobile Top Ten 2014 Meet the New Addition

OWASP Mobile Top Ten 2014 Meet the New Addition OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Common Criteria Web Application Security Scoring CCWAPSS

Common Criteria Web Application Security Scoring CCWAPSS Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. Fcharpentier@xmcopartners.com Releases Version 1.0 : First public release September 2007 Version

More information

PCI Security Standards Council

PCI Security Standards Council PCI Security Standards Council Ralph Poore, Director, Emerging Standards 2013 About PCI Emerging Technologies OWASP and Mobile Guidelines About PCI About the PCI Council Open, global forum Founded 2006

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Enterprise Apps: Bypassing the Gatekeeper

Enterprise Apps: Bypassing the Gatekeeper Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that

More information

BYPASSING THE ios GATEKEEPER

BYPASSING THE ios GATEKEEPER BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY

More information

OWASP AND APPLICATION SECURITY

OWASP AND APPLICATION SECURITY SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly

More information

Web Engineering Web Application Security Issues

Web Engineering Web Application Security Issues Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

BYOD Guidance: Good Technology

BYOD Guidance: Good Technology GOV.UK Guidance BYOD Guidance: Good Technology Published 16 March 2015 Contents 1. About this guidance 2. Summary of key risks 3. Architectural components 4. Technical assessment 5. Other considerations

More information

Mobile Application Security

Mobile Application Security Building security into the development process Rajneesh Mishra Senior Consultant - Secure Mobile Mobile devices have outnumbered PCs and laptops to become the primary medium for accessing content & services.

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox fox_james@bah.com Shahzad Zafar zafar_shahzad@bah.com Mobile applications

More information

Security Implications Associated with Mass Notification Systems

Security Implications Associated with Mass Notification Systems Security Implications Associated with Mass Notification Systems Overview Cyber infrastructure: Includes electronic information and communications systems and services and the information contained in these

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Mobile & Security? Brice Mees Security Services Operations Manager

Mobile & Security? Brice Mees Security Services Operations Manager Mobile & Security? Brice Mees Security Services Operations Manager Telenet for Business Agenda Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion Agenda Mobile Trends Where to start?

More information

Rational AppScan & Ounce Products

Rational AppScan & Ounce Products IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

AMI security considerations

AMI security considerations AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms

More information

of firms with remote users say Web-borne attacks impacted company financials.

of firms with remote users say Web-borne attacks impacted company financials. Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this

More information

E-Book Security Assessment: NuvoMedia Rocket ebook TM

E-Book Security Assessment: NuvoMedia Rocket ebook TM E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Mobile Device Management:

Mobile Device Management: Mobile Device Management: A Risk Discussion for IT Decision Makers Mobile Device Management (MDM) software provides IT organizations with security-relevant capabilities that support the integration of

More information

Web application security

Web application security Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Security Best Practices for Mobile Devices

Security Best Practices for Mobile Devices Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Who is Watching You? Video Conferencing Security

Who is Watching You? Video Conferencing Security Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Independent Security. Prepared for:

Independent Security. Prepared for: Independent Security Report (isr) Prepared for: isec Partners Final Report Independent Security Report (isr) Page 2 of 10 2014, isec Partners, Inc. Prepared by isec Partners, Inc. for Wickr. Portions of

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques

More information

OWASP Top Ten Tools and Tactics

OWASP Top Ten Tools and Tactics OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com Agenda Current State of Web Application Security Understanding

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Securing VoIP Networks using graded Protection Levels

Securing VoIP Networks using graded Protection Levels Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn Andreas.Schmidt@bsi.bund.de Abstract

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems IAG U/OO/814639-15 13 October

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014 1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Cloud Security is a First Principle:

Cloud Security is a First Principle: Cloud Security is a First Principle: Elements of Private Cloud Security Table of Contents Why the Security Minded are Drawn to Private Cloud Deployments....2 Security is the Driver Behind Private Clouds...3

More information

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services Whitepaper Executive Summary The mobile application space has experienced an unprecedented growth in recent years, and it

More information

Using Remote Desktop Clients

Using Remote Desktop Clients CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and

More information