Securing Database Servers. Database security for enterprise information systems and security professionals
|
|
|
- Jerome Ramsey
- 10 years ago
- Views:
Transcription
1 Securing Database Servers Database security for enterprise information systems and security professionals
2 Introduction: Database servers are the foundation of virtually every Electronic Business, Financial, and Enterprise Resource Planning (ERP) system, and frequently include sensitive information from business partners and customers. In spite of the importance of preserving data integrity and security on these systems, databases typically have not been subjected to the same level of security scrutiny as operating systems and networks. Data integrity and improper access can be compromised by many factors, including complexity, insecure password usage, misconfigurations, and unrecognized system backdoors, making imperative regular use of an adaptive database security solution. Why is Database Security Important? To protect access to an organization s sensitive information and digital assets. A large majority of any organization s electronic digital assets are stored in off-the-shelf relational database products. Businesses and government organizations use these database servers for personnel information such as employee payroll and medical records for which they have responsibility for privacy and confidentiality. Database servers hold sensitive financial data, past and future, including trading records, business transactions, and accounting data. Strategic or classified information such as proprietary technical and engineering data - even marketing plans - must be guarded from competitors and unauthorized internal access. Database servers also include detailed customer information including financial accounts, credit card numbers, and the trusted data of business partners. Databases are extremely complex systems and difficult to correctly configure and secure. Database server applications can be amazingly complex to master on a level that rivals that of the operating systems they run on. Database systems such as Oracle, Sybase, and Microsoft SQL Server include the following features: user accounts and passwords, auditing systems, privilege model and specific permissions for control of database objects, built-in commands (stored procedures/packages), unique scripting and programming languages (usually vendor specific derivatives of SQL), middleware, network protocols, patches and service packs, and powerful database management utilities and development tools. Most DBAs have a full time job administering the complexities of these systems. As a result serious security vulnerabilities and misconfigurations frequently go unchecked or completely undetected. Therefore, just as the traditional security community has mostly ignored the topic of database security, database professionals usually don t consider security as one of their primary responsibilities. The philosophy of Adaptive Network Security viewing security as an ongoing process instead of a onetime checklist has not yet been embraced by many database administrators. Securing Database Servers Page 2
3 Securing the network and operating system on a database server is critically important, but insufficient to protect that database server. This is a common misconception among experienced security professionals, who assume that, once they have assessed and locked down critical network services and operating system vulnerabilities, all applications on those servers will also be secured. Modern database systems have a wide array of features and capabilities that can be misused or exploited to compromise the confidentiality, availability, and integrity of data. To begin with, all modern relational database systems are port addressable, which means that anyone with readily available query tools can attempt to connect directly to the database, bypassing security mechanisms used by the operating system. For example, Oracle 7.3 and 8 can be accessed via TCP/IP on their default ports of 1521 and Most database systems also have well-known default accounts and passwords, which provide varying levels of access to database resources. These two simple data points combined could probably compromise an embarrassingly large number of critical database systems. Unfortunately, the opportunities to compromise database security does not end there for knowledgeable intruders. Poor Database security not only compromises the database, but the server operating system and other trusted systems, too. This is another not-so-obvious reason why database security is important a database system may itself provide the mechanism to compromise an entire network s security infrastructure. As an example, a company may have a database server that keeps an inventory of all technical manuals, documentation, and white papers. The information in the database is not considered mission critical, so its security is not a priority. Even running on a well-secured operating system, an intruder could use access to the database to gain access to the local operating system through powerful built-in database features such as extended stored procedures. These procedures can give Administrator-level command line access to the underlying operating system and full access to all of its resources. If this particular database system has trust relationships with other servers, the intruder could potentially compromise the security of the entire network domain. Databases are foundation of new Electronic-Business, Enterprise Resource Planning (ERP) and other critical business systems. While much of the focus of E-Commerce and E-Business is on Web servers, Java, and other emerging technologies, it is important to remember that the vast majority of these consumer-oriented and business-to-business systems are based on relational databases behind the Web servers. Security in these systems is directly related to systems availability, data and transaction integrity, and confidentiality. Downtime and lack of system availability can be damaging not only to a business, but also to a company s reputation. By necessity, these systems are more open to the dangers of intruders, yet the responsibility for confidentiality of business partners and customers sensitive information has never been greater. In addition, ERP and management systems such as SAP R/3 and PeopleSoft are built on these same standard database systems. Unmanaged security vulnerabilities have a direct correlation with costly downtime, system integrity issues, and customer confidence. Securing Database Servers Page 3
4 What types of security vulnerabilities do I need to look for? Traditional database security focuses only on user accounts, roles, and operating permissions on specific database objects, such as access to tables and stored procedures. A thorough security analysis of a database system must be much broader, assessing potential vulnerabilities in all possible areas, as broadly outlined in the categories below. Risks associated with vendor-supplied software bugs, missing operating system patches, vulnerable services and insecure choices for default implementations and configurations. Risks associated with administration security options available but not used correctly, risky default settings, improper granting of excessive privileges to users or unauthorized changes to the system configuration. Risks associated with user activity insufficient password strength, inappropriate access to critical data and malicious activities such as stealing contents of databases. These categories of risk can apply to network services, operating systems, or the actual databases themselves. All of these elements need to be considered when securing database servers. Database Security Vulnerability Areas & Examples Listed below are a few examples of the wide variety of database server vulnerabilities and misconfigurations that can exist in critical database servers. Lack of security feature maturity Most popular relational database systems have been in existence for well over ten years and are mature products with powerful feature sets and scalability. Unfortunately many features that IT and security professionals require and take for granted in operating systems and networks are simply not available in most of the popular database systems in use today. No built-in database standard security features to address: MS SQL Server Sybase Oracle 7 Oracle 8 Account Lockout Facility no no no yes Rename Admin Account no no no no Require Strong Passwords no no no yes Stale Accounts no no no no Password Expiration no yes no yes Login Hours Restrictions no no no no For example, the table above lists features that most IT professionals would expect or require in an operating system, but are not present in a database server s standard security offerings. Since these databases are port addressable, the core operating system security mechanisms are not applied to direct network connections to the database. Some products, such as Microsoft SQL Server, allow the more powerful Securing Database Servers Page 4
5 Windows NT security mechanisms to address some of the shortcomings listed above. However, the majority also run MS SQL Server standard security for backward compatibility in environments that are not 100% Windows NT. Implementation is another concern. If an organization is implementing Oracle 8, how does the administrator know if security features are actually being used? Are they being consistently implemented across the organization? The combination of several of these features makes the implications even more serious. Since System Administrator accounts ( sa for SQL Server and Sybase, and system and sys for Oracle ) can t be renamed, and if there is no password lockout available or configured, intruders can launch brute force dictionary login attacks against the database server with nothing to prevent them from patiently and persistantly trying to break into the server at the highest level access. Database Password Management In the standard security provided by most database systems, there is no mechanism to ensure that individual users are choosing strong or any passwords. This fundamental security issue requires careful monitoring. There is also the additional issue of managing and securing a whole list of additional system passwords. For example, Oracle database systems have over ten specific default user accounts and passwords, and additional unique passwords for managing critical database operations such as booting the Oracle database, access to the network listener process and remote database access privileges. If compromised, many of these system passwords would give an intruder full access to the database system, yet they are stored in ordinary text files on the operating system. A few examples: Oracle Internal Password the Oracle Internal password is stored in clear text within the following file strxxx.cmd, where XXX is the Oracle System ID or SID, which defaults to ORCL. The Oracle Internal Password is used for Oracle database start-up processes, and gives complete access to database resources. This file needs be properly secured for Windows NT based Oracle implementations. Oracle Listener Process password Password used to start and stop Oracle listener process, which routes all incoming traffic to appropriate Oracle instances on a system. A strong password needs to be chosen for this value to replace the system default, and the permissions must be secured on the listener.ora file, where the password is stored for all Oracle implementations. Improper access to this password could allow an intruder to create a Denial of Service attack on an Oracle based electronic business site. Oracle Internal Password orapw File Permission Control Oracle Internal password and passwords of accounts granted the SYSDBA role are stored in the orapw text file. Privileges to this file should be restricted on Unix and Windows NT implementations of Oracle even though it is encrypted. If accessed, the encrypted file is potentially vulnerable to brute force attacks. These are just a few examples of how critical administrator and system passwords and accounts can be compromised in unexpected ways. Please note that password management security issues are by no means unique to the Oracle database environment, and apply to virtually all major database vendors Securing Database Servers Page 5
6 Operating system back doors - Most database systems have powerful features that, while convenient for DBAs, are also potential backdoors into a database server s host operating system. As mentioned previously, an intruder who has compromised a Sybase or SQL Server sa password can potentially gain system rights to the underlying operating system by using extended stored procedures. By logging in as sa, an intruder has use of the extended stored procedure xp_cmdshell, which allows a Sybase or SQL Server user to run an operating system command as if that person was running a command prompt at the server console. As an example, the following SQL commands can be used to add a Windows NT account called hacker1 with a password of nopassword, and then add hacker1 to the Administrators group: xp_cmdshell net user hacker1 nopassword /ADD go xp_cmdshell net localgroup /ADD Administrators hacker1 go Now the unscrupulous intruder is a Windows NT Administrator (let s hope this SQL Server is not on a domain controller). This simple attack works because the commands are submitted to the operating system using the Windows NT account under which the MSSQLServer service runs under. By default, this is the LocalSystem account, which is the most powerful account on the local Windows NT system. Another way a hacker might use SQL Server to compromise the operating system s security is by using the stored procedure xp_regread to read the encrypted Windows NT SAM password database out of the registry. There are several free Windows NT password crackers that make it important to keep these encrypted Windows NT passwords secure. Below is an example of how an intruder can get at this information: xp_regread HKEY_LOCAL_MACHINE, SECURITY\SAM\Domains\Account, F Note that reading the encrypted passwords out of the registry is something even the local Windows NT Administrator account cannot do. SQL Server allows this data to be read from the registry because SQL Server by default runs using the LocalSystem account. Oracle database systems also include powerful features that can be used to gain direct access to the operating system s native file system. For example with proper access, the UTL_FILE package allows users to read and write files to the host operating system. The UTL_FILE_DIR profile variable can be misconfigured or intentionally set to allow Oracle users to use the UTL_FILE package to write anywhere in the file system, which also has the potential to compromise the host operating system. Auditing The depth of information and events that can be recorded by the auditing systems of relational database systems varies from basic to very granular and detailed, but auditing systems only provide valuable security and alerting information if properly used and configured. These features can provide early warning signs that intruders are compromising the security of specific database servers, and provide valuable clues for detecting and repairing any damage. Securing Database Servers Page 6
7 Trojan Horses Trojan horses in operating systems have been around for years, but Database Administrators need to be aware of the threat they pose to system stored procedures. One well-known Trojan Horse modifies the password changing stored procedure, notifying the intruder of new passwords as they are updated. For example, an individual can add several lines to the sp_password system stored procedure to log new passwords to a table, send the password in an , or write the password to an external file for later review. This procedure continually grabs passwords until the intruder catches the sa password being changed leading to the accomplishment of further break-ins going undetected. An intruder or disgruntled employee only needs to gain access to a system once to place this trojan horse and steal a stream of future passwords. Conclusion Security professionals, auditors, DBAs, and E-business architects need to be aware of database security as they deploy critical business systems. To understand your organization s security posture and potential exposure, a thorough assessment of the database servers and their host operating system should be performed before system deployment, and then reprocessed on a regularly scheduled basis. The application of information risk management principles to monitoring, detecting, and responding to security vulnerabilities should be required for all database systems While this white paper focuses primarily on database specific vulnerabilities, ISS recommends familiarity with network and host based security assessment tools for evaluating network services, operating systems, and network infrastructure devices, such as routers and firewalls. A good place to start is the ISS white paper entitled Network and Host-based Vulnerability Assessment available at: More detail on E-Business issues can be found in Secure E-Business available at: Securing Database Servers Page 7
8 About ISS ISS is the world s leading provider of security management solutions for the Internet. ISS protects digital assets and ensures the availability, confidentiality and integrity of computer systems and information critical to e-business success. Combining its best-ofbreed SAFEsuite security software, comprehensive epatrol monitoring services and industry-leading X-Force security research, ISS provides customers with complete security management solutions. Serving as a trusted security provider, ISS protects more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at or call Securing Database Servers Page 8
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
The Truth about False Positives
An ISS Technical White Paper The Truth about False Positives 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Overview In the security industry, many security analysts remark that
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
CSP & PCI DSS Compliance on HP NonStop systems
CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Application Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.
Database Security and Auditing: Leading Practices Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc. Getting to Know Database Threats and Vulnerabilities Key Objectives Understand
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
Oracle Security on Windows
Introduction - commercial slide. UKOUG Windows SIG, September 25 th 2007 Oracle Security on Windows By Pete Finnigan Written Friday, 07 September 2007 Founded February 2003 CEO Pete Finnigan Clients UK,
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access
edmz Introduces Achieving PCI Compliance for: & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC February 2010 C o p y r ig h t 2 0 1 0 e - D M Z S e c u r i t y, LL C. A l l
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Rapid Vulnerability Assessment Report
White Paper Rapid Vulnerability Assessment Report Table of Contents Executive Summary... Page 1 Characteristics of the Associated Business Corporation Network... Page 2 Recommendations for Improving Security...
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
Securely maintaining sensitive financial and
How the Guardium Platform Helped Dell IT Simplify Enterprise security By Phil Neray Addison Lawrence David McMaster Venugopal Nonavinakere Safeguarding data is critical for many organizations, but auditing
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Configuring and Monitoring Database Servers
Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
