NV: Nessus Vulnerability Visualization for the Web
|
|
|
- Isaac Adams
- 10 years ago
- Views:
Transcription
1 NV: Nessus Vulnerability Visualization for the Web Lane Harrison Evan Downing Riley Spahn John R. Goodall Mike Iannacone ABSTRACT Network vulnerability is a critical component of network security. Yet vulnerability analysis has received relatively little attention from the security visualization community. This paper describes nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow security analysts and systems administrators to discover, analyze, and manage vulnerabilities on their networks. In addition to visualizing single Nessus scans, nv supports the analysis of sequential scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv operates completely in-browser, to avoid sending sensitive data to outside servers. We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiplenode testbed and data from the 2011 VAST Challenge. Categories and Subject Descriptors H.5.2 [Information Interfaces and Presentation]: User Interfaces Graphical user interfaces (GUI); D.4.6 [Security and Protection]: Information flow controls General Terms Security, Human Factors Keywords security visualization, vulnerability visualization, security analysis, information visualization, cyber security The manuscript has been authored by a contractor of the U.S. Government under contract DE-AC05-00OR Accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes. c 2012 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only. VizSec 12, October , Seattle, WA, USA Copyright 2012 ACM /12/10...$ INTRODUCTION In order to assess the security posture of the servers and workstations on their network, security analysts and systems administrators use vulnerability assessment tools such as Nessus 1. Such tools probe machines to determine which network ports are open, what services are running on the ports, and, most importantly, what versions of those services are running. Identifying the services and the versions enables these tools to match them with known vulnerabilities. Nessus and similar tools can produce an overwhelming amount of data for large networks. Traditional reporting tools present the data tabularly, often with color coding to attempt to provide an overview of each vulnerability s severity. But this data can be very large, with little support for comparing individual or logical groupings of machines. Further, it can be difficult to determine whether the overall vulnerability state of a network has changed between scans at different points in time. Nessus Vulnerability Visualization (nv) was developed to support the discovery, analysis, and management of vulnerabilities in both individual and sequential Nessus scans. The visualizations in nv consist of treemaps and histograms, which facilitate the exploration of vulnerabilities in large networks (see figure 1). Several interactions are provided to help uncover pertinent information to the administrator as they manage large networks. Nv also allows analysts to specify logical groupings that reflect analyst s situated knowledge [4]. Additionally, nv enables analysts to capture and manage criticality scores for individual and groups of machines in their network. This information is then used to affect size and other visual features in the treemap, which helps ensure that high-value machines receive the most attention. Specifically, our contributions to the field of security visualization are as follows: A visualization tool that supports security vulnerability awareness, analysis, and tracking; and A framework for building web-based visualizations that avoid sending sensitive data to servers. In the following section, we discuss related work in vulnerability analysis and visualization. Afterwards, we discuss the 1
2 Figure 1: One of the main use cases of nv is to compare two Nessus scans to analyze fixed (green), open (orange), and new (purple) vulnerabilities. Nv runs on the client side and does not require Nessus data to be sent to an outside server. design of nv and then present several case studies involving Nessus scans from two different test networks. We conclude with a brief discussion on web-based security visualization tools and on our future plans for nv. 2. RELATED WORK While there has been little research examining ways to depict and explore vulnerabilities, there has been much research in computer vulnerability analysis using graph-based techniques to model the state of the system. Such research addresses a different problem than we are attempting to solve with nv; we are not trying to address identifying all possible paths through a network, but providing an overview of the security state of a network and a means to compare how state changes over time. However, this prior work has somewhat influenced our approach in understanding use cases related to vulnerability analysis. One such technique is known as Topological Vulnerability Analysis (TVA) [6]. TVA uses the network state and attack vectors between machines to create an attack graph that will model all possible attack paths in a network. To generate these attack graphs TVA uses information from vulnerability assessment tools such as Nessus. These graphs generated by TVA tend to be large, so it introduces an aggregation and visual analysis element to make the models easier to comprehend by an analyst [8]. One aggregation method used by the TVA visualization is to aggregate machines based on their ability to access other machines. A group of machines will be aggregated if each node in the group has access to every other node in that group. These groupings are then aggregated into a single node in the visualization. We also believe that grouping nodes into aggregates is critical to scalability, but our approach relies on analysts situated knowledge of their networks to create groupings that mirror their own mental models. Similar to TVA, NAVIGATOR also uses vulnerability assessment data to create and display attack graphs [3]. Like TVA, a central challenge in displaying attack graphs to users is how to aggregate the data. NAVIGATOR utilizes strip treemaps to aggregate machines within each subnet, connected by links displaying potential attack paths through a network. Researchers have also used model checking tools to manipulate graph representations of a network where each node is a state of the network and each transition represents an exploit [1]. This type of attack graph allows an analyst to focus efforts on patching exploits (edges) that create the largest disconnects in the graph. This type of analysis is convenient because we already have graph algorithms that can efficiently perform such analysis. Ou, Govindavajhala and Appel take a different approach to security analysis in their MulVAL project [7]. They attempt to model the interactions between known vulnerabilities and software bugs, configurations and permission policies. In their approach an analyst will specify the system and policies in a logic language that is a subset of the Prolog logic programming language and vulnerabilities in the Open Vulnerability Assessment Language. After the systems, policies, and vulnerabilities are defined the MulVAL system uses a two-phase algorithm to simulate both attacks and policy checking. The system generates all possible attacks based on the vulnerabilities and then compares those with the defined policies to detect violations. These tools attempt to model and visualize all potential
3 attack paths through a network. While these systems are powerful and integrate much data, they do not attempt to solve the common, straightforward problem of understanding vulnerabilities within large networks. Given enough data, they can solve the problem of tracing potential paths through a network based on those vulnerabilities, but the first step of visualizing vulnerabilities within a network remains an open problem. Additionally, one limitation mentioned by Chu et al. is the need for a tool that compares vulnerability assessments (e.g. what has changed, what has been fixed). We address this directly in nv by allowing users to specify two scans, which are then processed to detect various changes. Although there has been no visualization research related to visualizing network vulnerabilities, there has been some prior work in related areas. Rather than looking at vulnerabilities that are present within an operational network, some prior work has tackled the problem of code vulnerability analysis [5]. Code vulnerability analysis has several similarities with network vulnerability analysis, the most notable of which is a severity score which can be propagated through functions, classes, and other programming constructs. Similarly, attributes of Nessus scans can be aggregated from vulnerability identification number to port, IP, and any number of higher groups. As such, nv is similar to this work in that it uses hierarchical techniques to visualize data, as well as multiple coordinated views to navigate the data space. The data and use case is very different, however. Rather than focus on software developers, nv targets security analysts; rather than target the development process, nv supports network operations. Rasmussen et al. explicitly visualize the criticality of systems in a network in [9]. Nv is similar in that it allows the administrator to define groups in the hierarchy and assign either groups or machines a criticality score. This score is then used in the visualization. While these approaches provide a detailed assessment of the accessibility of vulnerable targets, our goal was to create a more widely applicable system. Nessus is the de facto standard for vulnerability assessment. Rather than build an entire system, we wanted to leverage data that is already commonly used in the security community. This approach increases the potential adoption and value to the security community. In addition to leveraging data that analysts already use to encourage adoption and use, we wanted our system to be usable without installing any software, so our approach is web-based, but does all processing of potentially sensitive data on the client within the browser. 3. SYSTEM DESIGN The goal of nv is to support security analysts and systems administrators in understanding the security posture of their networks by displaying vulnerabilities on their systems. Nv inputs the results of a vulnerability assessment tool (we use Nessus scans) and (optionally) user defined groupings and criticality of machines in their network to create an interactive visualization. This visualization is designed to support common workflows in vulnerability discovery, analysis, and mitigation. These are described in the Case Studies sections. This section covers the visualization and interaction design. 3.1 Data The results of a vulnerability assessment tool provide significant detail about the state of all machines on the specified network. This information includes the port the vulnerable service is running on, what service and what version is running, what other versions of this software share this vulnerability, and a general description of the vulnerability. These results also indicate whether this is an actual vulnerability or just a general security notice, and it also provides a severity score and several unique identifiers related to this vulnerability, which can be used to find additional information. The results also often give information about how this vulnerability can be patched or otherwise mitigated. The following shows an example; this particular example is from the VAST Challenge 2011 data set. results cifs (445/tcp) Security Hole Synopsis : The remote Windows host contains a font driver that is affected by a privilege escalation vulnerability. Description : The remote Windows host contains a version of the OpenType Compact Font Format (CFF) Font Driver that fails to properly validate certain data passed from user mode to kernel mode. By viewing content rendered in a specially crafted CFF font, a local attacker may be able to exploit this vulnerability to execute arbitrary code in kernel mode and take complete control of the affected system. Solution : Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista, 2008, 7, and 2008 R2 : technet/security/bulletin/ms mspx Risk factor : High / CVSS Base Score : 9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C) Plugin output : - C:\\WINDOWS\\System32\\Atmfd.dll has not been patched Remote version : Should be : CVE : CVE BID : Other references : OSVDB:65217,MSFT:MS Use Case The primary goal of nv is to support an understanding of the vulnerabilities within a network to assist decisionmaking in determining how to allocate and prioritize limited resources to reduce the security vulnerability of high-value targets within their network.
4 Specifically, the main tasks that nv seeks to support are: Identifying the individual machines that have the most severe vulnerabilities; Discovering the services that have the most vulnerabilities within their network; Identifying the exposure to vulnerabilities within groups of machines where those groupings reflect the analyst s mental model of their network; Determining the high-value machines that are vulnerable to exploitation; and Comparing point-in-time snapshots of the security state of the machines in the network, and understanding the differences between these two points. 3.3 Visualization and Interaction Nv consists of multiple coordinated views including a treemap, several histograms, and a detail-information area showing information on the selected Nessus id. Each of these are designed to support a specific aspect of the vulnerability analysis workflow. Our primary visualization is a zoomable treemap[10]. We chose to use a treemap over other hierarchical visualization methods such as network/tree-layouts for several reasons. First, our goal with nv is to support the analysis of vulnerability assessment scans on large networks. While information on the network topology is useful for vulnerability analysis, it is important to note that in large dynamic networks, a complete network topology is often either unavailable or too large to be visualized directly. The space-filling aspects of treemaps make them more scalable in this regard. The treemap allows us to easily identify machines with the most severe vulnerabilities. The administrator s eye will be naturally drawn to the largest and darkest-colored nodes in the treemap, revealing the machines with the largest amount of severe vulnerabilities. The treemap allows the user to group machines together in a way that makes sense to them personally. Oftentimes the analyst has a mental picture of how their network is laid out and benefit from using a flexible environment that lets them customize it as they see fit. Again, using custom grouping, the user can easily group high-value machines into a single group and can be monitored closely for vulnerabilities, or organize their groupings according to mission or common roles. Allowing users to compare two different points in time of their network is also crucial. They can use these snapshots to not only monitor how efficiently the network is being patched, but also see how new vulnerabilities have been introduced over a period of time. If there are more new nodes than fixed nodes, then they can assume that either attention to that group of machines has been depleted or that the group has become more susceptible to vulnerabilities over time. All of these analyses are important to security analysts and systems administrators and can help them to monitor and protect their network more efficiently and effectively. Another reason we used treemaps was for their ability to effectively make use of both size and color for encoding data attributes. Since Nessus data is not stored in a hierarchical form, it could be visualized using many multi-dimensional Figure 2: Nesting on different values gives different results. Top: splitting by vulnerability-state before splitting by IP. Bottom: the same data, but split by IP before vulnerability-state. visualization techniques, such as parallel coordinates or scatterplot matrices. However, because the scalability of the visualization and the ability to mirror users mental models were primary concerns, we opted to nest the data from individual vulnerabilities and ports up to IPs and groups of IPs. We also use data-accumulation and coloring methods to ensure that data is not obscured by the hierarchy. For instance, when comparing two vulnerability scans, nodes are colored by the maximum count of vulnerability states (fixed, open, or new vulnerabilities) in their child nodes. A potential disadvantage of this approach is that a node could contain slightly more fixed vulnerabilities than open vulnerabilities, and yet will still be colored green. To alleviate this problem, we add the option to split the nodes by vulnerability-state higher in the hierarchy; figure 2 shows splitting nodes by vulnerability-state and by IP. The advantage of separating vulnerability-states higher is that the analyst can explore only the fixed vulnerabilities or only the open vulnerabilities. However, the disadvantage of this approach is that the IPs are then separated since they can appear in any branch of the hierarchy (fixed, open, and new). To our knowledge, there exists no widely accepted visual technique that can effectively represent multiple attributes at every level in a treemap. However, we plan to explore other common approaches such as glyphs and combined color scales in future work. Since analysts can specify the criticality of both individual machines and groups of machines in nv, the treemap includes sizing by criticality as an option. The most critical machines therefore appear as larger nodes, while still being colored by severity. Other sizing options include severity (the default)
5 Figure 3: Top level view of the large VAST Challenge 2011 dataset. The prevalence of dark blue indicates numerous vulnerabilities with high severity scores on Workstation Groups 4 and 5. and by vulnerability counts. Dual encoding severity with both color and size can be useful, as the darkest colored and largest nodes appear at the top left in each level of the histogram. The color scales in the treemap were created using Color- Brewer2 2. While the primary color scales shown in the paper are designed to have semantic meanings (green for fixed, red for new, orange for open), we also follow visualization best practices by including a colorblind-safe version. Nv includes several histograms, including vulnerabilitytype (note, hole, or open port), severity (CVSS score), top Nessus note ids, and top Nessus hole ids. These histograms serve dual purposes, as both overviews of the data and as filters by which users may guide their analysis. For instance, by brushing over the highest values in the severity histogram, the appropriate nodes in the treemap are highlighted. This works by examining each child of each element in the current level of the hierarchy. Another use of the histograms is to easily highlight the most commonly occurring vulnerabilities in the network. A possible drawback of this approach is that sometimes the least common vulnerabilities can be the most damaging. However, this issue is mitigated by the fact that the treemap can be be sized and colored by severity, which makes the most damaging vulnerabilities easy to find. The histograms operate as conjunctions 2 (AND), meaning that the user can specify queries such as all vulnerabilities of type hole with severity of 5 or greater. The Nessus information area is updated when the user drills down to the level at which Nessus vulnerability identification numbers are shown. The area then updates with detailed information about the currently selected Nessus id, including a synopsis, detailed description, vulnerability family, and solution (when available). Based on this information, the user has the option to mark the vulnerability as either fixed or as a non-issue, which re-colors the node in the treemap. This functionality is intended to serve as a way for analysts to avoid revisiting vulnerabilities that have been addressed in the scan being examined. 3.4 Implementation One significant requirement for this project was to not unnecessarily disclose the vulnerability assessment scan results to any third parties; because this information would be very valuable to any attacker, the users of this tool would have an obvious concern to prevent its disclosure. To address this concern, nv runs entirely in the browser client, without relying on any server-side functionality, and without loading any non-local resources. We also developed a custom parser for the data files, and related code to compare and merge these results. We were also able to handle these tasks in the browser and maintain interactive performance. Additionally, the entire technology stack is open source, and the
6 tool itself will also be open sourced. One difficulty caused by the requirement of not leaking scan results was how to look up additional details about the results. Nessus provides an interface to access significant additional information about any specific vulnerability ID, including useful details such as related CVE and Bugtraq IDs, and information about how to patch or otherwise address each vulnerability. However, using this directly could still give an adversary significant information; if they could observe any of this traffic, then they could still learn which vulnerabilities are present. To address this, we build a local cache of this information, which the client can access offline. The main treemap and the histograms were created using the d3 library [2], which is designed for apply[ing] datadriven transformations to the Document Object Model (DOM). D3 is fast, flexible, and supports large datasets, which were our main requirements. Crossfilter 3, designed for accessing large multivariate datasets in the browser, was used to store and access our Nessus scan results and all related information about the machines and subnets on the network. This handles the data entirely in memory, and handles storage and access in an efficient manner. 4. CASE STUDIES We envision nv as being useful for two types of use cases: The first is to analyze the current vulnerability state of all machines on a network. This use case is to allow a user to prioritize maintenance based on the value of the machines and the criticality of the vulnerabilities found on those machines using data from Nessus scans. The second use case is visualizing the changes to the vulnerability states of machines on a network after a systems administrator performs maintenance to determine if the maintenance was effective at addressing system vulnerabilities. 4.1 Case Study: Static Vulnerability State Network To test visualizing a static network, we used Nessus scan data from the VAST Challenge This data is from a simulated network for the fictitious All Freight Corporation. The VAST Challenge gives us an established network dataset to test how nv scales to a large data set that contains many vulnerabilities spread across a variety of machines and groups. This data set has more than one hundred-fifty unique IP addresses associated with various workstations in the scan. The Nessus scan shows that numerous machines on the network have some sort of security hole, such as incorrectly configured telnet client, a font driver that allows privilege escalation, and a vulnerability in an outdated version of Microsoft Excel. We split the workstations into six groups with criticality scores ranging from two to nine. The major security holes in the group are concentrated in group four with a criticality score of nine and in group five with a criticality score of two. When the security analyst looks at the groups level on the tree map it is immediately obvious where their attention is needed most. As shown in figure 3, the analyst can see that there are many high-scoring vulnerabilities that will require attention right away. Workstation groups four and five dominate the treemap in all three visualization modes and take Figure 4: Port level view of an All Freight Corporation workstation. Port 445 is shown to have numerous severe vulnerabilities. Information for selected vulnerablities is shown on the right. up more than half of figure 3. The analyst can also use the histograms at the bottom of the visualization to quickly get an overview of the network s current vulnerabilities. The histograms show that there a large number of high severity vulnerabilities that need urgent attention. When the analyst zooms into group four, they see that most of the vulnerabilities are located on two IP addresses and when they select IP address , they see that nearly all of the vulnerabilities are associated with port 445 and a Windows file sharing program. corollary 4 shows the port level view of Nv uses color gradients to make the most critical and severe vulnerabilities most prominent in the visualization. In this view the analyst sees that port 445 has numerous potential vulnerabilities that range from light blue and insignificant to dark blue and critical. After this analysis an analyst could conclude that he should focus his efforts on the Microsoft file sharing programs that utilize port 445. The analyst can also explore the other visually dominant IP address, , and see that this machine s vulnerabilities come from port 139 and NetBIOS. This exploration allows the analyst to easily discover vulnerabilities in the system and prioritize repair accordingly. It also makes it easier to view large networks because the IP addresses are aggregated into nodes that can be expanded to view the individual IP addresses contained in that group. In the VAST Challenge, these two machines become the source of much of the malicious activity on the network. Accordingly, a tool such as nv could be used to make analysts aware the state of these machines before the malicious activity begins. 4.2 Case Study: Dynamic Vulnerability State Network Another use case for nv is to make it easier for users to visualize and compare the state or a network at two points in time such as before and after performing maintenance. In this example, machines are grouped into three different categories: One group is a set of workstations split between two hundred fifty-six Fedora workstations and three hundred twenty Ubuntu workstations. The second group is a set
7 Name:Criticality Machine Count IP Addresses Time Period Security Notes Security Holes Workstations: [6 7 8].x Before Maintenance After Maintenance LAPP Servers: x Before Maintenance After Maintenance Wordpress Servers: x Before Maintenance After Maintenance Table 1: The number of security notes and security holes by grouping before and after maintenance. Figure 5: Top level view showing the user-defined IP address groups. of two hundred fifty-six machines that serve the Wordpress blogging software. The last grouping is a set of two hundred fifty-six Linux Apache PostgreSQL PHP (LAPP) servers. Initially all of these groupings contain serious vulnerabilities. The LAPP servers are running a poorly configured file transfer protocol (FTP) server and both the LAPP and Wordpress servers have simple root passwords that Nessus shows as a security hole. The majority of the workstations are properly configured except for sixty-four that contain multiple security holes. These workstations are running outdated versions of the Ubuntu operating system and have vulnerabilities such as an FTP server that allows a remote user to execute arbitrary code, an incorrectly configured Windows file sharing software, weak secure shell (SSH) keys and a Samba server that is vulnerable to buffer overflow attacks. While in the top level visualization mode the user s attention is drawn to the large LAPP server node. The size is an indication of the importance of the situation based on the number of security holes discovered, the severity of the security holes discovered, and the assigned criticality of the machines in the group, see figure 5. When zooming into the LAPP Server branch of the treemap it becomes clear that all five of the machines seem to be equally at risk. To gain further insight, the user zooms into the node for a specific machine where each node represents a port with an associated vulnerability in figure 6. At this specific port node the administrator can click on a vulnerability ID and the tool will display information about the vulnerability and potential solutions in the right-most panel of the tool. In this situation the LAPP servers all have the same untrusted SSL certificate security hole. When the user zooms back out to the group view and switches the visualization to severity mode, as in figure 6, Figure 6: After sizing by severity, the view shows vulnerabilities distributed across the LAPP Server s ports. the workstation s node grows bringing it into greater prominence. When zooming into the workstation group, they can see that a subset of the IP addresses have much larger and darker nodes than any of the other workstations. If they zoom into one of these IP addresses, they see that many of the most severe vulnerabilities are associated with ports 445 and 80. The user can examine each port node s child, seeing information about the specific vulnerabilities in the right-most panel, discovering that the machine is running a poorly configured Apache Web Server and that a Windows share that can be accessed through the network. After further exploring the network, the administrator patches the most critical vulnerabilities in the system. Table 1 shows the number of security notes and holes before and after maintenance. Nv provides functionality to compare two vulnerability assessment scans to show changes between two states, such as before and after applying patches. After patching high value systems the administrator can rescan the network, then explore and see the differences between the previous state and the newly patched system. Nv shows corrected vulnerabilities in green, the remaining vulnerabilities in orange, and any new vulnerabilities in purple, as in figure 7. The systems administrator can easily see that the major workstations vulnerabilities have been patched. Zooming into the workstation node the system administrator sees that while they were patching the most severe vulnerabilities they inadvertently opened new vulnerabilities on the two machines and did not address some of the vulnerabilities seen earlier. We simulated this use case using virtual machines (VM)
8 This work was supported by the Directed Research and Development Program of, managed by UT-Battelle, LLC, for the U.S. Department of Energy under contract no. DE-AC05-00OR Figure 7: After fixing previous vulnerabilities, subsequent Nessus scans are processed to identify open (orange), new (purple), and fixed (green) vulnerabilities. communicating through a host-only network. Using a hostonly network allowed us to use Nessus from the host to scan the VMs. We used one grouping of two different types of work station and two groupings of similar servers. Both groups of servers were using Ubuntu LTS. Ten of the Ubuntu workstations were using Ubuntu while the two workstations with the massive number of vulnerabilities were using Ubuntu 8.04 with purposely unpatched and misconfigured software. The Fedora workstations were running Fedora 15. We used the Metasploitable virtual machine image to simulate the two vulnerable workstations before they were upgraded to To reflect real-world scenarios, we did not patch all vulnerabilities in this use case. Instead, the systems administrator would only handle the most important vulnerabilities and system updates. In this simulated use case we improved the weak root passwords and corrected the poorly configured FTP server seen on the servers. We focused on updating and correcting the two most vulnerable workstations by updating them to be at the same vulnerability level as the other ten Ubuntu workstations. 5. CONCLUSION AND FUTURE WORK We have introduced nv, a Nessus vulnerability visualization system. Nv is designed to support security analysts and systems administrators in the tasks of vulnerability discovery, analysis, and management through an interactive visualization. This tool abstracts and aggregates the large amounts of data produced by vulnerability assessment tools like Nessus so as not to overwhelm the user. Nv is also designed to protect the privacy of users through client side computation, since sending sensitive data, like vulnerability scans, over a network introduces an unnecessary vulnerability and potential attack vector. We have also provided case studies, which suggest that nv is appropriate for a range of common vulnerability analysis tasks. Finally, nv will be made available online and released as open-source. 7. REFERENCES [1] P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proc. ACM Conference on Computer and Communications Security, pages , [2] M. Bostock, V. Ogievetsky, and J. Heer. D3: Data-driven documents. In IEEE Trans. Visualization and Computer Graphics, volume 17, pages , [3] M. Chu, K. Ingols, R. Lippmann, S. Webster, and S. Boyer. Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. In Proc. Symposium on Visualization for Cyber Security (VizSec), pages 22 33, [4] J. R. Goodall, W. G. Lutters, and A. Komlodi. I Know My Network: Collaboration and Expertise in Intrusion Detection. In Proc. ACM Conference on Computer-Supported Cooperative Work (CSCW), pages , [5] J. R. Goodall, H. Radwan, and L. Halseth. Visual analysis of code security. In Proc. Symposium on Visualization for Cyber Security (VizSec), pages 46 51, [6] S. Noel, M. Elder, S. Jajodia, P. Kalapa, S. O Hare, and K. Prole. Advances in topological vulnerability analysis. In Proc. Cybersecurity Applications and Technology Conference For Homeland Security (CATCH), pages IEEE, [7] X. Ou, S. Govindavajhala, and A. W. Appel. Mulval: a logic-based network security analyzer. In Proc. Conference on USENIX Security Symposium. USENIX Association, [8] K. Prole, J. R. Goodall, A. D. D Amico, and J. K. Kopylec. Wireless cyber assets discovery visualization. In Proc. Workshop on Visualization for Computer Security (VizSec), pages Springer-Verlag, [9] J. Rasmussen, K. Ehrlich, S. Ross, S. Kirk, D. Gruen, and J. Patterson. Nimble cybersecurity incident management through visualization and defensible recommendations. In Proc. Workshop on Visualization for Computer Security (VizSec), pages , [10] B. Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. on Graphics, 11(1):92 99, ACKNOWLEDGEMENTS
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
A Framework for Analysis A Network Vulnerability
A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Big Data: Rethinking Text Visualization
Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
How To Analyze And Detect A Network Attack Through A Network Graph
Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven Noel and Sushil Jajodia Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures Dr.Thaier Hamid University of Bedfordshire, UK Prof. Carsten Maple, University of Bedfordshire, UK ABSTRACT Computer networks
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Network visualization
Whether you are a security analyst, system administrator or technical manager, chances are you are confronted with an overwhelming sea of security related data. Typically, we analyze this data with textual
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Penetration Test Report
Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Running a Default Vulnerability Scan SAINTcorporation.com
SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011 Executive Summary BACKGROUND The NYS Local Government Vulnerability Scanning Project was funded by a U.S. Department of Homeland Security
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc., http://willsfamily.org/gwills
VISUALIZING HIERARCHICAL DATA Graham Wills SPSS Inc., http://willsfamily.org/gwills SYNONYMS Hierarchical Graph Layout, Visualizing Trees, Tree Drawing, Information Visualization on Hierarchies; Hierarchical
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Security visualisation
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Metasploit Pro Getting Started Guide
Metasploit Pro Getting Started Guide Metasploit Pro Getting Started Guide Release 3.6 March 7, 2011 Table of Contents Metasploit Pro... 1 Getting Started Guide... 1 Welcome... 4 About This Guide... 5 Target
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Advances in Networks, Computing and Communications 6 92 CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content Abstract D.J.Moore and P.S.Dowland
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Simplified Network Traffic Visualization for Real-Time Security Analysis
Simplified Network Traffic Visualization for Real-Time Security Analysis Matthew Dean and Lucas Vespa Department of Computer Science University of Illinois Springfield Springfield, IL 62703 Abstract Although
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
Using AI Techniques to improve Pentesting Automation
Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA Hackito Ergo Sum April 8-10, 2010 Brief presentation My
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Pattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
Visualizing the Top 400 Universities
Int'l Conf. e-learning, e-bus., EIS, and e-gov. EEE'15 81 Visualizing the Top 400 Universities Salwa Aljehane 1, Reem Alshahrani 1, and Maha Thafar 1 [email protected], [email protected], [email protected]
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER
A C a s e s t u d y o n h o w Z e n Q h a s h e l p e d a L e a d i n g K - 1 2 E d u c a t i o n & L e a r n i n g S o l u t i o n s P r o v i d e r i n U S g a u g e c a p a c i t y o f t h e i r f l
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Topological Vulnerability Analysis
Topological Vulnerability Analysis Sushil Jajodia and Steven Noel Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires
