Threat Analysis for Hardware and Software Products using HazOp

Size: px
Start display at page:

Download "Threat Analysis for Hardware and Software Products using HazOp"

Transcription

1 Threat Analysis for Hardware and Software Products using HazOp Burzin Daruwala, Salvador Mandujano, Narasimha Kumar Mangipudi, Hao-chi Wong Security Center of Excellence Intel Corporation 2111 NE 25 th St, Hillsboro, OR USA {burzin.daruwala, salvador.mandujano, narasimha.kumar.v.mangipudi, Abstract: - These days, hardware and software products must be designed with security in mind and threat modeling is a fundamental step towards properly securing sensitive areas on the system. The task of identifying all relevant threats, however, is not an easy challenge. Even though use cases may be properly documented and routinely used during the development cycle for elicitation of functional requirements, nonfunctional requirements, such as security, are often neglected due to the priority new functionality receives over other aspects of the product, as well as the complexity of analyzing and planning for the unexpected. Better methods are necessary to protect computing technologies whose complexity and attack surface keeps expanding with more and more features. In the field of process safety, a variety of techniques have emerged to assess and mitigate risk. Since the domains of safety and security share multiple similarities, various authors have suggested that safety techniques might find application in computer security. Actual applicability of these techniques to existing technologies, however, was yet to be demonstrated. This paper takes one such technique, HazOp, and applies it to Intel hardware and software shedding some light on the mechanization of use-case-based threat analysis. It shows how HazOp can be employed on a diverse range of technologies to correctly identify deviations from use cases that may represent a violation to the security objectives of the product. We document the advantages of this method over more traditional ones with regard to efficiency, extensibility and efficacy. The reader will also learn how to apply and, potentially, adapt HazOp to accelerate the discovery of system threats as well as the derivation of test scenarios for purposes of security evaluation. Key-Words: - HazOp, software security, hardware security, threat modeling 1 Introduction Product teams at Intel use a Security Development Lifecycle (SDL) [1] to drive the creation of more secure products. A fundamental component of the SDL framework is threat identification, which can be divided into two parts: first, given a technology, determine what areas need protection; and, second, once the system has been implemented, assess the strength of the protections and identify any security holes that need to be closed. Both require an analysis of the different means an attacker could use to compromise the system. Having a methodology that provides consistency and repeatability to this analysis is key to the success of any threat modeling effort. A number of techniques exist that help identify and address security risks. One of them is the Hazards and Operability analysis approach, also known as HazOp [2, 3]. Unlike software-centric approaches, HazOp was originally created in the process industry, but has been applied to computer systems as well. We have obtained outstanding results applying HazOp to Intel software and hardware technologies. This paper documents our experiences with HazOp, describes lessons learned and details examples of how to use this method to perform threat modeling. 1.2 Motivation & Importance Security is an increasingly severe problem in all sorts of computing platforms. As we carry out more and more of our regular activities online, significant gains, ultimately financial, can be obtained by hackers from attacking these computer systems. With electronic systems and information services becoming more ubiquitous every day, and with the volumes of sensitive information available online, malicious parties are even more motivated to find vulnerabilities and exploit them. To retain customer loyalty and competitive advantage in the marketplace, it is essential that the makers of computer hardware and software ensure that their products are as secure as possible. Aware of this business requirement, Intel has been making security a top priority and an important design vector. Many product teams are creating secure-by-design products using the SDL framework, which adds a number of checkpoints along the Product Lifecycle (PLC) [4] to evaluate the security of the product at ISSN: ISBN:

2 each phase of its development e.g., architecture, design, and implementation and to identify design weaknesses and other vulnerabilities that need to be corrected along the way. One of the phases of SDL is security testing, which means carrying out attacks that can be launched to compromise the target platform and its functionality. By thinking like an attacker, we try to discover vulnerabilities that need to be mitigated prior to release. Unlike functional validation, which verifies the operational soundness of a technology based on requirements and specifications, security testing is more concerned about deviations from expected behavior. For instance, if a use case indicates that the system should behave in a particular way under certain conditions, but it actually does something different than expected, there may be a security violation that may require further review (e.g., if a read-only component is enabled as read-write, data that should otherwise be protected may be exposed to unauthorized modification). Traditionally, the above analysis has been performed in an ad-hoc fashion, relying on the evaluator's previous experience and intuition. This approach has a significant limitation: intuition usually leads the evaluator from one problem area to another, often not systematically. The analysis, therefore, may lack in structure and organized coverage, and this is where HazOp helps. HazOp was originally used in the field of physical and procedural safety to enumerate all possible misbehaviors of a system and to identify hazards arising from deviations from intended behaviors. A variant of HazOp has been successfully used by product teams at Intel. The evaluation targets have included software, firmware, as well as hardware, and the method has been applied at different stages of the PLC, from analysis of data flows in architecture and design, to identification of test cases that validate a secure implementation., In one case, we also adapted HazOp to handle special requirements of the system in order to successfully identify key threats. Our goal with this paper is to share our experiences in using HazOp for security analysis and show actual applicability of the method to hardware and software technologies. After reviewing this paper, the reader should be able to employ HazOp analysis on a chosen product by following some of the examples. Additionally, the reader will also be able to understand how HazOp analysis can be adapted and tuned to fit their specific needs in order to discover threats that would otherwise be invisible to the standard HazOp method (i.e., its guidewords), and will appreciate that HazOp serves as an important guide for accelerating the discovery of vulnerabilities. 1.3 Background Work Different techniques exist in the literature to identify system threats. STRIDE [5], for instance, is a security analysis method based on decomposing the system and iteratively analyzing its parts. Once the different subsystems have been delimited and their interactions identified, they are matched against the six STRIDE vectors: spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. Each subsystem is then studied to find out whether each STRIDE vector is applicable or not (for instance, whether a potential spoofing problem needs to be analyzed for that specific subsystem). If a STRIDE vector is found to be relevant, the analyst then tries to learn how the system is protected from that threat and what attacks may be possible. Connections between modules can also be analyzed with STRIDE, as well as data flows and user interactions. However, the method relies on the proper segmentation of the system until small enough pieces suitable for analysis are found, and it does not help derive test scenarios directly, but enables rapid identification of risks. Attack trees [6] are another method that has been widely used in software. The method uses diagrams to link conditions to attacks. Root nodes in the tree represent attacks for which a number of conditions (i.e., children nodes) must be satisfied. Logic operators like AND and OR can be used to link these conditions together and help understand the feasibility of an attack. Attacks at the root are directly related to a primary threat and can have a larger number of conditions. A path on the tree links together conditions that would make the attack possible, and, depending on system size, these could be counted in the hundreds. Once the attack tree is completed, protections are designed to address the threats that are closest to the root, hereby maximizing protection coverage. The complexity of creating an attack tree using use cases as input is a daring task, as, first of all, a list of potential attacks needs to be created. Once built, an attack tree may also become too complex to support proper identification of threats and test cases given the number of nodes and edges to analyze. A software-centric tool by Microsoft called Security Development Lifecycle Threat Modeling Tool [7] allows system architects and analysts to identify protection issues and communicate their risk and potential mitigation. The tool incorporates STRIDE and concentrates on the study of software components at the design phase. Although the tool ISSN: ISBN:

3 allows for the construction of multi-level data flow diagrams, it relies on the proper decomposition of the system. The tools listed above do not help with the derivation of test scenarios and, to the best of our knowledge, none of these have been applied to hardware. Part of the motivation behind our project was to investigate threat modeling methods that can be employed to analyze hardware, firmware, and software technologies in an attempt to develop a best-known-method in the area of systematic security modeling. The methodology we chose is different from the above tools in that it is based on the creation of sentences produced from use cases and guidewords. We provide more details on HazOp in the next section. 2 HazOp Analysis HazOp analysis [2] uses two main ingredients: use cases and guidewords. Use cases (UCs) describe the interactions (verbs) between an actor (subjects) and a system (objects) with a set of conditions (clauses, intentions). These can be obtained from the product use case documents, architecture and design specifications, or by gathering information from designers, marketers and users about the actual flow of events for using the product. Guidewords (Table 1) are used to specify deviations for each of the elements of the UC: actor, action, object, and condition. When performing HazOp analysis, one needs to: 1) Define the system s Use Cases (UCs) 2) Record the Intentions for each step in the UC 3) Apply HazOp guidewords to determine Table 1: List of HazOp guidewords Element Guide Word Meaning Actor is not in the correct role Actor AS WELL AS Actor is in the correct role, but is also in another (typically more privileged) role OTHER THAN Actor in a different, incorrect role (typically a legitimate role with different goals than this role) takes the action Action Object Condition MORE LESS OTHER THAN LESS MORE AS WELL AS PART OF OTHER THAN MORE AS WELL AS PART OF OTHER THAN No action takes place The action takes place for a longer time than required The action is incomplete The action takes place for a shorter time than required An incorrect action takes place instead of the correct one The action occurs, but no object is provided The action occurs on an empty object The action occurs on an object that is too small The action occurs on an object that is too big Additional objects are acted on The action occurs on part of an object An incorrect object is used (e.g. wrong data, wrong details, wrong format, wrong button) The condition is not met The condition is not detected A quantitative condition is exceeded Additional conditions apply Only some of the required conditions are met Only some of the required conditions are detected A different, incorrect condition applies ISSN: ISBN:

4 possible deviations from each intention, feasible causes and likely consequences 4) Repeat the above process to completely eliminate or reduce the risk of deviation and/or reduce the severity of the consequences Note that for any particular UC or a step within the UC, one may not be able to apply all the guidewords. The goal of HazOp is to lead the person doing the analysis into considering all feasible deviations and determine appropriate mitigations. The key to effective use of HazOp is to facilitate thinking about deviations. Coverage completeness comes from the proper analysis of all documented UCs, as well as the security objectives that have been established for the product. The technique relies on the availability of documented UCs and is, therefore, applicable to all sorts of technology. At Intel, UCs are defined for pretty much all products (notice that UCs for certain technologies may involve internal interactions, as well as subjects and objects that represent system internals; this is no limitation to HazOp). The availability of UCs for a given technology makes HazOp an attractive method to use at Intel. In the following sections we will describe how threats and test cases were derived using this methodology. 3 Applying HazOp HazOp can be used not only as a tool to create a threat model, but also to understand the general security needs of a product. We will now show how to proceed with the application of the methodology to different product features. For readability, this section has been divided into two parts: application to software/firmware, and application to hardware Software and Firmware Example - Intel Remote PC Assist Technology (Intel RPAT) The following is an example of how to apply HazOp to software/firmware products. HazOp analysis was used to identify threats to the architecture, design, implementation and validation of Intel RPAT 2008 and 2009 [9]. Intel RPAT enables you to make a fast call for help and request remote technical assistance from a service provider if you encounter a problem with your PC, even when the OS, network software, or applications are not functioning. While the entire Intel RPAT model is comprised of more than a dozen UCs, we will illustrate HazOp with one of them, namely, the User Enrollment scenario. User enrollment is supported by flows involving interactions between software and firmware, for instance, between the RPATUI (Intel RPAT User Interface) and the Manageability Engine (ME) embedded processor [10]. As the name implies, the RPATUI allows a user to enroll and un-enroll for Intel RPAT services. This enrollment is registered with a Service Provider (SP) who offers on call, real-time diagnosis, solutions and technical assistance. Once the user is enrolled with an SP, a teardown connection from the end-user s PC to a service technician s console can be established at the wish of the end-user so that the PC can be accessed for repair. Table 2 is self-explanatory and shows parts of the HazOp analysis of the enrollment scenario. The use of HazOp guidewords helps us identify possible deviations from the UC and serves as an input for threat analysis (Table 2). For instance, an attacker may try to identify a backdoor into the system, and supply more characters than expected in the enrollment process (row 3). Additional input characters can lead to code injection exploits, privilege escalation or denial of service issues, all of which constitute threats that Intel RPAT designers have to address. Table 2: Applying HazOp to Intel RPAT User Enrollment Actor Action Object Condition Guideword Interpretation 1 User Enters Account ID, Password Not enrolled Does not enter any credentials during enrollment 2 LESS/PART OF Enters only Account ID or Password; enters only a few characters of Account ID or Password 3 MORE Enters more characters than those required in either or both Account ID and/or Password 4 OTHER THAN Enters invalid characters or encoded characters; enters an unregistered Account ID; enters a script instead of Account ID or Password ISSN: ISBN:

5 10 RPATUI Sends Account ID, Password to ME Account ID and Password were not received by ME 11 MORE Account ID and Password credentials are received by ME as well as somewhere else 12 ME Stores Account ID, Password On flash Account ID and Password not stored by ME on flash 13 LESS / PART OF Only Account ID or Password, or a part of them is stored on flash 14 MORE Account ID and Password are stored on flash and somewhere else 15 AS WELL AS ME stores Account ID and Password and reports insufficient flash space The analysis further requires the processing of these deviations and translating them into a list of threats, mapping the threats to the product security objectives (if available) and providing solutions to thwart the attacks. In the above case, stronger input validation could be built into the software in order to deter this type of attacks in the User Enrollment case. HazOp also helps define test cases. In the case of the above UC, the security evaluation team could consider tests derived from rows 1, 2 and 3 above. That is, HazOp tells us that it may be worth testing the system with null input, or input larger than the expected size, or partial input. By implementing these tests, we will be able to validate the soundness of the input validation logic that was incorporated, and we will verify absence of vulnerability to the code injection and privilege escalation threats found with the application of the guidewords. 3.2 Hardware Example Intel VT-d To the best of our knowledge, there are no reports of applications of threat modeling techniques to hardware in the literature. Given the internal interactions that need to be analyzed in a hardware system, it is counterintuitive to think that threat modeling techniques that have worked for software and firmware would work equally well for hardware. We decided to pilot the use of HazOp for a hardware product and selected Intel VT-d [11], a technology in CPU. Virtualization technologies have received significant attention from the security community. We decided to use HazOp to identify threats to our Intel VT-d hardware in CPU in order to make sure all relevant attack vectors were been addressed at the design and implementation levels. Intel Virtualization Technology for Directed I/O (Intel VT-d) [11] incorporates hardware support to isolate domains in a virtualized environment. In a platform with multiple virtual machines (VMs), a device must be assigned to a particular domain in order for a VM to have access to it (Figure 1). Intel VT-d accelerates this mapping by providing transaction remapping capabilities and hardware encapsulation of the domains. Hypervisor writers (the layer between the guest OSs and the hardware) use Intel VT-d to more effectively implement resource utilization on the platform by the VMs. Figure 1: A virtualized environment VM1 Guest OS1 Hypervisor Physical Host Hardware Device1 VM2 Guest OS2 Device2 A domain is a set of physical memory resources that are assigned to a VM. A fundamental property of Intel VT-d that must be preserved is that of domain isolation: Domains should not be able to access other domains or the resources assigned to them; similarly, a device should not be able to access other devices or domains beyond the ones granted by their existing privileges, unless the hypervisor configures Intel VT-d remapping hardware to allow this operation. A number of VM-escape attacks have been identified in the past [12]. These attacks allow guest operating systems (OSs) to alter the execution of the platform s hypervisor responsible for orchestrating the concurrent execution of VMs, and in the case of ISSN: ISBN:

6 Intel VT-d, arbitrating access to the hardware. A vulnerability in this area could allow a guest OS, for example, to interact with Intel VT-d hardware directly, and could allow malicious code to persist through system reboot. This would have obvious negative effects on the security of Intel VT-d. An important UC in Intel VT-d is the assignment of Table 3: Applying HazOp to Intel VT-d Device Assignment row 12 a potential consequence of a device being inaccessible to its legitimate domain, which might constitute a denial-of-service threat that needs to be considered and, potentially, mitigated. By taking all UCs and iteratively applying the guidewords to them, security evaluators were able to detect sensitive conditions that had to be validated in Actor Action Object Condition Guideword Interpretation 1 Hypervisor Assigns Device to Existing Device does not get assigned to domain 3 Domain MORE Device is assigned to more than one domain 4 OTHER THAN Device is assigned to a domain other than the intended one 9 Intel VT-d Reports Success/ Failure Intel VT-d does not report success/failure 10 OTHER THAN Intel VT-d reports success instead of failure, or failure instead of success 11 Domain Accesses Device Device assigned MORE Domain is able to access more devices than expected 12 to Domain AS WELL AS Domain is able to access Device and is able to remove it from the domain as well 14 Domain is not able to access the device 15 PART OF Domain is able to access the device only sometimes (at boot only, upon assignment only) devices to domains. Once a domain is created, the Intel VT-d Remapping Engine will update its tables to capture what resources are assigned to what domain. For instance, a network card may be visible to only one of the VMs on the system and Intel VT-d will be responsible for blocking unauthorized transactions from reaching the card. Table 3 shows the application of HazOp to this UC. With the use of HazOp we were able to identify various threats to Intel VT-d. For instance, row 3 identifies the threat of a device being assigned to more than one domain at the same time. A test for this scenario, for instance, could try to do device assignments on the fly in order to see how Intel VT-d handles this condition and how an error is reported or not. In the case of access authorization, row 11 above identifies the possibility of a domain being able to access devices beyond its privilege. Validation plans may already include tests that guarantee a device that has been assigned to a domain is, in fact, visible to that domain as expected. From the attacker s perspective, it is now necessary to guarantee that it is not possible for a malicious VM to eliminate this binding, or for a VM to reach beyond its limits and access devices assigned to other domains. By applying the AS WELL AS guideword to this use case, we can see in the lab. In this case, in which a hardware-based feature was analyzed, new security objectives for the analysis were also derived. Even when the method was not created to define such security objectives, our HazOp-aided analysis also served the purpose of determining what components needed protection and what the scope of those protections had to be. 4 Results and Lessons Learned 4.1 Applicability The application of HazOp is not limited to a particular product (hardware or software) or a particular phase of the SDL. HazOp can be equally applied to the evaluation of very diverse architectures, designs and implementations, and assists in the validation of a product that needs to be scrutinized in order to identify its main threats and vulnerabilities. In general, our experience shows that HazOp helps to: 1. Identify threats that need to be mitigated 2. Derive abuse test cases for penetration testing 3. Define and/or validate security objectives 4.2 Data collection One of our key learning points from applying HazOp was that, while HazOp analysis works well in identifying security vulnerabilities, the ISSN: ISBN:

7 application of the guidewords with all the permutations and combinations of actors, interactions, objects and conditions may result in large amounts of data. Having so much data may complicate the comprehension of the security properties of the system that are relevant to each UC and may slow down the creation of test cases if individuals other than those who actually performed the analysis are responsible for the testing. To address this problem, we recommend a method for consolidating data generation. The method can be summarized by the acronym DAT: 1. Decompose. Decompose the analysis into smaller steps (not necessarily with all the permutations and combinations of actors, interactions, objects and conditions, but at a level that makes sense) 2. Apply. Apply the HazOp guidewords to each step where it makes sense (comprehensible level) 3. Think. Think through on how to address the vulnerabilities exposed by the application of guidewords. Addressing the vulnerabilities comprises: a. Accept: Acknowledge the vulnerability and assess the risk with respect to the security objectives. Accept the risk of an attack if the vulnerability is beyond the scope of security objectives; otherwise thwart the attack b. Detect: Record an attack if the vulnerability gets exploited. Usually, the vulnerabilities that may fall into this category are acceptable (refer to Accept). c. Thwart: Put specific measures in place to either, completely eliminate the attack, or reduce the impact of an attack to an acceptable level 4.3 Tuning and Adaptability When applying HazOp to Intel VT-d, we determined that guidewords needed to be properly aligned with the conditions in order to correctly analyze our UCs and derive threats. We decided to create shortcuts: REPEAT PRESENT/T PRESENT Actor performs the same action multiple times Actor tries to access resources that may or may not be present on the system These shortcuts allowed us combine guidewords and conditions in a single structure. REPEAT allowed us to think about scenarios where an action is carried out multiple times consecutively (could be thought of as an extension of guideword MORE). In particular, it helped us go over two scenarios: 1) Intel VT-d tables are full and the eviction logic kicks in, and 2) a device is already assigned to a domain but the hypervisor requests the same assignment for a second time or a removed device is requested to be removed again from a domain. In the case of PRESENT /T PRESENT we captured the condition of operating on objects that may be logically present or not. For instance, a test was written that tried to remove domains that had already been removed, looking for memory handling issues. It also allowed us to define a test to create domains using the same Domain ID in order to discover potential collision problems in the hardware when Intel VT-d tables are traversed (we were in fact trying to infer, experimentally, how the hardware handled Domain IDs beyond the 8-bit limit; for instance, truncation). Through these test cases we learned how the hardware handles each identifiers in order to access Intel VT-d root tables and how an invalid Domain ID is decoded. It also helped us validate that aliasing attacks are not possible in the Intel VT-d domain that we evaluated. 4.4 Efficiency In the case of the hardware analysis of Intel VT-d in our CPUs, security objectives had not been defined. The use of HazOp allowed us to derive 15 different security objectives that guided the iterative execution of HazOp over the Intel VT-d UCs. With the use of existing validation tools, 12 security test cases were implemented, which provided coverage for 80% of the security objectives and allowed the product team to verify absence of vulnerability on an early stepping of the CPU. In a matter of days, HazOp had helped us identify security objectives, threats and penetration testing scenarios. Compared to less structured techniques used in the past, HazOp allowed us to speed up threat modeling (see Figure 2). In previous projects, like the security evaluation of HTTP and TLS stacks, the team had to brainstorm to derive test scenarios. Different online resources had to be reviewed in order to come up with the specific threats the team will consider in their testing. This approach was based on interface exposure and analysis of privilege levels. Although it allowed us to identify some vulnerabilities in the code, it was significantly time consuming and lacked organization. The Intel RPAT analysis resulted in the identification of numerous abuse-test cases for ISSN: ISBN:

8 penetration testing which provided coverage for the main threats identified with HazOp. Figure 2: Test derivation efficiency (efficiency = no. of test cases / identification time in weeks) In all instances, when compared to more traditional techniques, HazOp proved a more efficient method to perform threat modeling. The number of test cases generated (Table 4) in each project, constitutes considerable progress from the utilization of other techniques. HazOp helped us change that by showing us a step in the right direction that reduces the amount of time invested in threat modeling by 50%+, while contributing key test cases that validate the security of the product. Table 4: Applicability of HazOp Security Tests Derived Intel VT-d 17 Yes Intel RPAT 12 Yes Security Objectives Derived 5 Conclusion The role of security analysis is becoming increasingly important in the computing industry as complexity is added to platforms and product environments assume higher risks. We have shown how HazOp accelerates security analysis and is applicable to hardware as well as software and firmware technologies. We also showed that the HazOp methodology is SDL-checkpoint agnostic in that it can be used to evaluate architecture, design as well as implementation targets effectively. HazOp was applied on different projects in order to identify threats, define security requirements and generate penetration-testing scenarios by systematically matching guidewords to use cases readily available in the documentation of platforms and product features. Throughout these projects we discovered that the technique is flexible enough as to allow the incorporation of new guidewords to accommodate special product needs. This paper proposed a more rigorous approach to carrying out security analysis of software and hardware which results in the correct identification of security issues that need to be addressed before product release. The authors hope that the cases presented here will help the reader apply HazOp more effectively to the study of product security, and that this method will eventually become an integral part of the security analysis of any computing product. References: [1] Howard, M., The Trustworthy Computing Security Development Lifecycle, Microsoft Software Development Network Magazine, 2005 [2] Srivatanakul, T., Clark, J. A., and Polack, F., Writing Effective Security Abuse Cases, University of York TR YCS [3] Koornneef, F., Van der Meulen, M., HAZOP Analysis of Formal models of Safety-critical Interactive Systems, SAFECOMP 2000, vol of LCNS, Springer, 2000 [4] Galluzzo, C., The Implementation of the Product Life Cycle at Intel; An Examination in the Use of Change Agency to Achieve Cultural Change and Business Results, Mgmnt. of Eng. and Tech. 07, Portland, OR, Aug [5] Hernan, S., Lambert, S., Ostwald, T., and Shostack, A., Uncover Security Design Flaws Using the STRIDE Approach, Microsoft Development Network, November, 2006 [6] Schneier, B., Attack Trees, Dr. Dobb's Journal, Vol. 24, pp.12-16, December 1999 [7] Microsoft SDL Threat Modeling Tool, Microsoft Development Network, Security Development Center, v [8] Schwarz, B., Chen, H., Wagner, D., Morrison, G., West, J., Lin, J., and Tu, W., Model Checking an Entire Linux Distribution for Security Violations, Annual Computer Security Applications Conference, 2005 [9] Intel Remote PC Assist Technology, Intel Platform Extension Services, tepcassist [10] Intel Active Management Technology, Intel Corp. 2007, [11] Intel Virtualization Technology, Intel Technology Journal, Vol.10, issue 3, 2006 [12] Plankers, B, VM Escape & VMware Critical vmkernel Updates, SANS Newsbites Newsletter, September, 2007 ISSN: ISBN:

Security Testing. How security testing is different Types of security attacks Threat modelling

Security Testing. How security testing is different Types of security attacks Threat modelling Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making

More information

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder mohamed.abomhara@uia.no Winter School in Information Security, Finse May

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, chandram@houston.rr.com Meledath Damodaran, University of Houston-Victoria, damodaranm@uhv.edu

More information

2010 State of Virtualization Security Survey

2010 State of Virtualization Security Survey 2010 State of Virtualization Security Survey Current opinions, experiences and trends on the strategies and solutions for securing virtual environments 8815 Centre Park Drive Published: April, 2010 Columbia

More information

Development Processes (Lecture outline)

Development Processes (Lecture outline) Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

Understanding and evaluating risk to information assets in your software projects

Understanding and evaluating risk to information assets in your software projects Understanding and evaluating risk to information assets in your software projects ugh.. what a mouthful Dana Epp Windows Security MVP Who am I? Microsoft Windows Security MVP Information Security Professional

More information

Implementing Security on virtualized network storage environment

Implementing Security on virtualized network storage environment International Journal of Education and Research Vol. 2 No. 4 April 2014 Implementing Security on virtualized network storage environment Benard O. Osero, David G. Mwathi Chuka University bosero@chuka.ac.ke

More information

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

A Security Approach in System Development Life Cycle

A Security Approach in System Development Life Cycle A Security Approach in System Development Life Cycle (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. mahiconference@gmail.com (2) Dr.K.Alagarsamy,

More information

EECatalog SPECIAL FEATURE

EECatalog SPECIAL FEATURE Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Mobile Application Threat Analysis

Mobile Application Threat Analysis The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under

More information

Three Ways to Secure Virtual Applications

Three Ways to Secure Virtual Applications WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Threat Modeling. 1. Some Common Definition (RFC 2828)

Threat Modeling. 1. Some Common Definition (RFC 2828) Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Building Docker Cloud Services with Virtuozzo

Building Docker Cloud Services with Virtuozzo Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are

More information

Network Security Audit. Vulnerability Assessment (VA)

Network Security Audit. Vulnerability Assessment (VA) Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.

More information

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the

More information

KVM Security Comparison

KVM Security Comparison atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-349-7525 Fax: 512-349-7933 www.atsec.com KVM Security Comparison a t s e c i n f o r m a t i o n s e c u

More information

Penetration Test Report

Penetration Test Report Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299 1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Security Considerations in Cloud Deployments Matthew Garrett <matthew.garrett@nebula.com>

Security Considerations in Cloud Deployments Matthew Garrett <matthew.garrett@nebula.com> Security Considerations in Cloud Deployments Matthew Garrett (cloud) Computing for the Enterprise Security concerns in traditional hosting Someone hacks your system Your hosting

More information

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes cdavies@atlassian.com The Attack Vector Details report provides details of vulnerability

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Not for distribution or reproduction.

Not for distribution or reproduction. www.pipelinepub.com Volume 12, Issue 5 Cybersecurity Goes Mainstream By Rob Marson Back to the Future I recently read an article online entitled: Virtualization is Going Mainstream. The dateline was January

More information

Management (CSM) Capability

Management (CSM) Capability CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE

More information

The Review of Virtualization in an Isolated Computer Environment

The Review of Virtualization in an Isolated Computer Environment The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

A Practical Approach to Threat Modeling

A Practical Approach to Threat Modeling A Practical Approach to Threat Modeling Tom Olzak March 2006 Today s security management efforts are based on risk management principles. In other words, security resources are applied to vulnerabilities

More information

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

Intel Trusted Platforms Overview

Intel Trusted Platforms Overview Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Cloud Sure - Virtual Machines

Cloud Sure - Virtual Machines Cloud Sure - Virtual Machines Maximize your IT network The use of Virtualization is an area where Cloud Computing really does come into its own and arguably one of the most exciting directions in the IT

More information

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,

More information

Attacking Hypervisors via Firmware and Hardware

Attacking Hypervisors via Firmware and Hardware Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor

More information

white SECURITY TESTING WHITE PAPER

white SECURITY TESTING WHITE PAPER white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...

More information

Security Technology for Smartphones

Security Technology for Smartphones Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate

More information

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization

More information

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

An Approach to Threat Modeling in Web Application Security Analysis

An Approach to Threat Modeling in Web Application Security Analysis Volume-5, Issue EICA2012-5, February 10, 2012 An Approach to Threat Modeling in Web Application Security Analysis Sreenivasa Rao B Dept. of Computer Science & Engineering CMJ University, Shillong, India

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World

More information

Microsoft STRIDE (six) threat categories

Microsoft STRIDE (six) threat categories Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Making Data Security The Foundation Of Your Virtualization Infrastructure

Making Data Security The Foundation Of Your Virtualization Infrastructure Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges

More information

About Effective Penetration Testing Methodology

About Effective Penetration Testing Methodology 보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

White Paper The Dynamic Nature of Virtualization Security

White Paper The Dynamic Nature of Virtualization Security White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,

More information

http://www.vassure.com

http://www.vassure.com Technical Case Study: Patch Management This is subsequent to Summary of Projects VMware - ESX Server to Facilitate: IMS, Server Consolidation, Storage & Testing with Production Server VAssure Virtualization

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

Functional vs. Load Testing

Functional vs. Load Testing Best Practices in Performance & Security Testing March 26, 2009 CVN www.sonata-software.com Functional vs. Load Testing Functional test Objective Functionality Example Do business processes function properly

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization

More information

Web Application Security

Web Application Security Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4

More information

UEFI Firmware Security Best Practices

UEFI Firmware Security Best Practices UEFI Firmware Security Best Practices Presented by: Dick Wilkins, PhD Principal Technology Liaison presented by UEFI Plugfest May 2014 Agenda Introduction Threats and Vulnerabilities Mitigation Guidelines

More information

This document describes the methodology used for validating the model, analysis, comments and test results from the model s application.

This document describes the methodology used for validating the model, analysis, comments and test results from the model s application. Ernst & Young LLP Security & Technology Solutions Advanced Security Center Using Attack Surface Area And Relative Attack Surface Quotient To Identify Attackability Customer Information Paper TABLE OF CONTENTS

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Threat Modeling for Secure Embedded Software

Threat Modeling for Secure Embedded Software SECURITY INNOVATION & KLOCWORK WHITE PAPER JUNE 2011 Threat Modeling for Secure Embedded Software As embedded software becomes more ubiquitous and connected powering everything from home appliances and

More information

Hyper-V R2: What's New?

Hyper-V R2: What's New? ASPE IT Training Hyper-V R2: What's New? A WHITE PAPER PREPARED FOR ASPE BY TOM CARPENTER www.aspe-it.com toll-free: 877-800-5221 Hyper-V R2: What s New? Executive Summary This white paper provides an

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account

More information

HP Client Manager 6.2

HP Client Manager 6.2 HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...

More information

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach Sponsored by: Intel John Humphreys June 2006 Tim Grieser IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Top virtualization security risks and how to prevent them

Top virtualization security risks and how to prevent them E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced

More information

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis CS 392/681 - Computer Security Module 16 Vulnerability Analysis Course Policies and Logistics Homework 5 due tonight Homework 6 posted Read Chapter 23 11/13/2003 Module 16 - Vulnerability Analysis 2 Some

More information

A Methodology for Capturing Software Systems Security Requirements

A Methodology for Capturing Software Systems Security Requirements A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information