Software & Hardware Security
|
|
|
- Dina Higgins
- 10 years ago
- Views:
Transcription
1 Software & Hardware Security Erik Poll Digital Security group Radboud University Nijmegen The Netherlands
2 Nijmegen 2
3 Digital Security group Rigorous & formal methods to design & analyse secure ICT systems Incl. societal impact, esp. on privacy Also looking at concrete applications
4 software security attacks buffer overflows in C(++) web problems: SQL inj, XSS, CSRF,.. hardware security smartcards & RFID attacks defenses security testing static analysis for Java & C bank cards e-passport online privacy & cybercrime 4
5 The problem
6 pre-history of hacking In 1950s, Joe Engressia showed the telephone network could be hacked by phone phreaking: ie. whistling at right frequencies In 1970s, before founding Apple together with Steve Jobs, Steve Wozniak sold Blue Boxes for phone phreaking at university 6 sw s1
7 Slammer Worm (2003) Pictures taken from The Spread of the Sapphire/Slammer Worm, by David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver 7
8 Slammer Worm (2003) Pictures taken from The Spread of the Sapphire/Slammer Worm, by David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver 8
9 9
10 Top secret NSA slides leaked by Edward Snowden More info at leaksource.info and
11 11
12 12
13 Security problems of past days To get an impression of the scale of the problem, have a look at
14 Quiz What do laptops, tablets, mobile phones, wifi access points, network routers, bank cards, e-passports, eid cards, smartphone apps, web sites, web browsers, web servers, operating systems, firewalls, intrusion detection systems, cars, and airplanes have in common? Why can all these things be hacked, if we are not very careful? There is SOFTWARE inside them! 14
15 Software (in)security Software is the main source of security problems. Software is the weakest link in the security chain, with the possible exception of the human factor Software security does (did?) not get much attention in other security courses, or in programming courses, or indeed, in much of the security literature! Computer security courses traditionally focus on cryptography f be solve by cryptography, you do not understand cryptography and you do not understand your problem [Bruce Schneier] 15
16 if you think your problem can be solved by cryptography, then you do not understand cryptography and you do not understand your problem [Bruce Schneier] 16
17 Superficial analysis of the problem 17
18 Observation 1 All these problems are due to (bad) software Namely software in the Linux/Windows/Mac operating system (OS) web servers web browsers the router software... Because of these software bugs constant patching of system is needed to keep them secure 18
19 Observation 2 All these problems are due to bad software that can be executed/addressed over the network eg. in case of Slammer worm executes on (untrusted) input obtained over the network or both With ever more network connectivity, ever more software can be attacked. 19
20 Changing target of attacks Traditionally, focus of attacks was on operating system and network Solutions regular patching of OS firewalls virus scanners Increasingly, focus on web applications web browser mobile devices smartphones, tablet, that pass through firewalls embedded software software in cars, factories, infrastructure... and targetted attacks on specific organisation or person (known as ATP = Advanced Persistent Threat) 20
21 Changing nature of attackers Traditionally, hackers were amateurs motivated by fun publishing attacks for fame & glory attacks creating lots of publicity Increasingly, hackers are professional attackers go underground zero-day exploits are worth a lot of money Attackers increasingly include organized crime with lots of money and (hired) expertise government agencies: with even more money & in-house expertise 21
22 stuxnet attack Malware (by US and Israel?) attacking nuclear enrichment facility in Iran 22
23 No silver bullets! Software (in)security: crucial facts crypto or special security features do not magically solve all problems Security is emergent property of entire system just like quality (Non-functional) security aspects should be integral part of the design, right from the start 23
24 We focus on software security now, but don t forget that security is about people (users, employees, sys-admins, programmers,...), and their laziness, mistakes, stupidity, incompetence, confusion, software, bugs, verification, hackers, viruses, testing, operating systems, networks, databases, hardware, access control, passwords, smartcards, biometrics, cryptology, security protocols, security policies & their enforcement, monitoring, auditing, risk management, complexity, legislation, persecution, liability, public relations public perception, conventions, standards,.. 24
25 The causes of the problem 25
26 Quick audience poll How many of you learned to program in C or C++? How many had it as a first programming language? How many of your C(++) courses warned you about buffer overflows? explained how to avoid them? Major causes of problems are lack of awareness lack of knowledge irresponsible teaching of dangerous programming languages 26
27 Quick audience poll How many of you have built a web-application? in which programming languages? What is the secure way of doing a SQL query in this language? (to avoid SQL injection flaws) Major causes of problems are lack of awareness lack of knowledge 27
28 1. Security is always a secondary concern Security is always a secondary concern primary goal of software is to provide some functionality or services; managing associated risks is a derived/secondary concern There is often a trade-off/conflict between security functionality & convenience where security typically looses out more examples of this later... 28
29 29
30 Functionality vs security Functionality is about what software should do, security is (also) about what it should not do Unless you think like an attacker, you will be unaware of any potential threats 30
31 Functionality vs security: Lost battles? operating systems (OSs) with huge OS, with huge attack surface programming languages with easy to use, efficient, but very insecure and error-prone mechanisms web browsers with plug-ins for various formats, javascript, ActiveX, Ajax... clients which automatically cope with all sorts of formats & attachments.. 31
32 Functionality vs security : PHP "After writing PHP forum software for three years now, I've come to the conclusion that it is basically impossible for normal programmers to write secure PHP code. It takes far too much effort.... PHP's raison d'etre is that it is simple to pick up and make it do something useful. There needs to be a major push... to make it safe for the likely level of programmers - newbies. Newbies have zero chance of writing secure software unless their language is safe.... " [Source 32
33 2. Weakness in depth interpretable or executable input eg paths, filenames,.doc,.xls,.pdf,.js,... programming languages webbrowser with plugins application platform eg Java or.net operating system middleware libraries system APIs sql data base hardware (incl network card & peripherals) 33
34 2. Weakness in depth Software runs on a huge, complicated infrastructure OS, platforms, webbrowser, lots of libraries & APIs,... is built using complicated languages & formats programming languages, but also SQL, HTML, XML,... using various tools compilers, IDEs, preprocessors, dynamic code downloads These may have security holes, or may make the introduction of security holes very easy & likely 34
35 Problems are due to lack of awareness Recap of threats, but also of what should be protected lack of knowledge of potential security problems, but also of solutions compounded by complexity software written in complicated languages, using large APIs, and running on huge infrastructure people choosing functionality over security 35
36 Security concepts & goals
37 Security Security is about regulating access to assets assets can be information, functionality, or physical assets Software provides functionality eg on-line exam results This functionality comes with certain risks eg what are risks of on-line exam results? (Software) security is about managing these risks 37
38 Starting point for ensuring security Any discussion of security should start with an inventory of the stakeholders ie. who is involved their assets, and the threats to these assets by possible attackers employees, clients, script kiddies, criminals Any discussion of security without understanding these issues is meaningless: You have to know what you want to secure, against what type of attacks, and against who 38
39 Security concepts Goal of security is to reduce risks to acceptable levels, Security is never 100% So you have to know what you want to secure, against what type of attacks, against who, and at what cost 39
40 Security Objectives: CIA Confidentiality unauthorised users cannot read information Integrity unauthorised users cannot alter information Availability authorised users can access information ie. preventing DoS (Denial of Service) attacks Non-repudiation or accountability authorised users cannot deny actions 40
41 Security objectives Integrity nearly always more important than confidentiality Eg think of your bank account information your medical records all the software you use, incl. the entire OS 41
42 How to realise security objectives? AAAA Authentication who are you? Access control/authorisation control who is allowed to do what this requires a specification of who is allowed to do what Auditing check if anything went wrong Action if so, take action 42
43 How to realise security objectives? Other names for the last three A's Prevention measures to stop breaches of security goals Detection measures to detect breaches of security goals Reaction measures to recover assets, repair damage, and persecute (and deter) offenders 43
44 Try to prevent, but also detect and react Never think that good prevention makes detection & reaction superfluous. Eg. breaking into house or office is often easy; only detection & reaction seriously deters burglars. Detection of digital break-in is harder who noticed a break-in on his computer recently? Reaction (incl. prosecution) is even harder how to find the person responsible, somewhere on the internet?
45 Software security
46 warning: confusing terminology Common use of terminology can be very confused & confusing: (security) weakness, flaw, vulnerability, bug, error, coding defect... We can make a distinction between a security weakness/flaw: something that is wrong or could be better a security vulnerability a weakness/flaw that can actually be exploited by an attacker, which requires the flaw to be - accessible: attacker has to be able to get at it - exploitable: attacker has to be able to do some damage with it Eg by unplugging your network connection, some (many?) vulnerabilities become flaws. 46
47 software vulnerabilities Software vulnerabilities can be introduced at two levels design flaws vulnerability in the design bugs aka implementation flaws or code-level defects vulnerability in the software introduced when implementing a system Rough consensus: bugs and design flaws are equally common Vulnerabilities also arise on other levels (out of scope for now) configuration flaw when installing software on a machine the user unforeseen consequence of the intended functionality (eg. spam) 47
48 Typical software security vulnerabilities 17% 0% 26% 37% buffer overflow input validation code defect design defect crypto 20% Security bugs found in Microsoft bug fix month (2002) 48
49 bugs aka implementation flaws aka code-level defects There are roughly two kinds of implementation flaws 1. bugs that can be understood looking at the program itself (and understanding what it is meant to do!) eg., simple typos, confusing two program variables, off-by-one error in array access,... sometimes called logic errors, as opposed to syntax errors, or an errors in the program logic 2. lower-level problems that can only be spotted if you understand the underlying platform of the program in execution, eg buffer overflow,integer overflow,... in binaries compiled from C(++) SQL injection, XSS, CSRF,... in web-applications 49
50 The big problem of software security The bad news people keep making the same (types of) mistakes The good news people keep making the same (types of) mistakes so we can do something about it! Every advantage has its disadvantage -- Johan Cruijff 50
51 security in the software development life cycle
52 Tackling Software Insecurity Knowledge about standard mistakes is crucial in preventing them these depends on the programming language, the platform (OS, database systems, web-application framework, ), and the type of application lots of info available on this now But this is not enough: security to be taken into account from the start, throughout software development life cycle several ideas & methodologies to do this 52
53 Security in Software Development Life Cycle McGraw s Touchpoints [Gary McGraw, Software security, Security & Privacy Magazine, IEEE, Vol 2, No. 2, pp , ] 53
54 Methodologies for security in development life cycle Common/best practices, with methods for assessments, and roadmaps for improvement McGraw s Touchpoints BSIMM Building Security In Maturity Model Microsoft SDL Security Development Lifecycle OpenSAMM Software Assurance Maturity Model 54
55 Microsoft s SDL Optimisation Model 55
56 BSIMM Based on data collected from large enterprises 56
57 Spot the (security) flaws in electronic_purse.c int balance; <= should be >= void decrease(int amount) { if (balance <= amount) } what if amount is negative? { balance = balance amount; } else { printf( Insufficient funds\n ); } void increase(int amount) { balance = balance + amount; } what if this sum is too large for an int? 57
58 Different kinds of implementation flaws what if amount is negative? lack of input validation of (untrusted) user input could be a design flaw rather than an implementation flaw? more fundamental than the flaws below <= should be >= simple mistake in the program logic what if this sum is too large for an int? potential problem depending on how the underlying platform work, eg. in case of an integer overflow; lower level than the flaws above 58
59 More info Gary McGraw, Software security, Security & Privacy Magazine, IEEE, Vol 2, No. 2, pp , Check out websites for security alerts in the past week 59
BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
Software security specification and verification
Software security specification and verification Erik Poll Security of Systems (SoS) group Radboud University Nijmegen Software (in)security specification and verification/detection Erik Poll Security
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group
Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group Overview What is Application Security? Examples of Potential Vulnerabilities Potential Strategies
CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006
CSE331: Introduction to Networks and Security Lecture 1 Fall 2006 Basic Course Information Steve Zdancewic lecturer Web: http://www.cis.upenn.edu/~stevez E-mail: [email protected] Office hours: Tues.
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Fall 2008 Course mechanics Instructor: Ian Goldberg Contact info: http://www.cs.uwaterloo.ca/ iang/ Office
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.
CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Spring 2013 Course mechanics Instructor: Ian Goldberg https://cs.uwaterloo.ca/ iang/ Office hours: Thursdays
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Why Security Matters. Why Security Matters. 00 Overview 03 Sept 2015. CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1
CSCD27 Computer and Network Security Instructor: Alan Rosselet Office: IC-494 E-mail: rosselet @ utsc utoronto ca Web: http://www.utsc.utoronto.ca/~rosselet/cscd27/ 00 Overview CSCD27 Computer and Network
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1
International Conference on Informatization in Education, Management and Business (IEMB 2015) Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services [email protected]
Microsoft Security Development Lifecycle for IT Rob Labbé Application Consulting and Engineering Services [email protected] The Reasons for Secure Software There are many threats to data and systems
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
EECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX
Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
FERPA: Data & Transport Security Best Practices
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
What Every (Software) Engineer Needs To Know About Security. -- and -- Where To Learn It
What Every (Software) Engineer Needs To Know About Security -- and -- Where To Learn It Neil Daswani http://www.neildaswani.com http://www.learnsecurity.com Is the sky falling? (yet?) TJX (March 2007)
