A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS
|
|
|
- Cecilia Thompson
- 10 years ago
- Views:
Transcription
1 A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS Kishen Iyengar Dept. of Information Systems and Operations Management, University of Texas at Arlington, Box University of Texas at Arlington, Arlington, TX-76019, Tel: Vishal Sachdev Dept. of Information Systems and Operations Management, University of Texas at Arlington, Box University of Texas at Arlington, Arlington, TX-76019, Tel: M.K. Raja Dept. of Information Systems and Operations Management, University of Texas at Arlington, Box University of Texas at Arlington, Arlington, TX-76019, Tel: ABSTRACT The argument whether open-source code is more secure than proprietary software has more or less been one of opinions and beliefs and not based on empirical tests and validation. In this paper, we empirically examine vulnerabilities data and compare closed-source and open-source operating systems. Our results indicate that although there are differences in the total number of vulnerabilities reported, there is no difference in the average risk per vulnerability between open-source and proprietary operating systems. Keywords: Open-source, Security Introduction The argument between open-source code and closed-source code has existed for many decades now. In terms of security, proprietary software and open-source software both have their own support bases who intensely advocate their point of view (Hunter 2004, Schulz 2000). The discussion has more or less been one of opinions and beliefs and not based on empirical tests and validation (Chaudri 2004). This is probably due to the fact that it is difficult to ascertain the right metrics of measuring security and collect data. The operating system is probably the most crucial piece of software that runs on any computer. Therefore it is important to examine security aspects of operating systems and compare closedsource and open-source operating systems. Bugs and Vulnerabilities in the operating system could make it at risk of attack and compromise. Such a comparison of open and closed-source operating systems could be very useful to conclude the debate on Open and Proprietary sources of software. This issue has been addressed by many researchers. (Balle 2004, Claasen 2004). Post (2003) conducted a survey of IT security professionals and found that they felt it difficult to keep up with patches for operating systems. Interdependencies of software on the operating systems have also been examined (Wang 2003.) Specifically, Microsoft has received a lot of attention and focus for security issues related to its products. Schulz (2003, 2002) specifically looks at why Microsoft gets such unwanted attention 236
2 in terms of security issues. Indeed, security seems to be a pivotal factor in the emerging popularity of Linux (Goad 2000.) Comparison of open-source versus proprietary OS security So, are Microsoft s products inherently less secure than other products? Specifically, is the Windows Operating system less secure than other operating systems such as Unix and Linux. This forms the crucial step in a better understanding and final resolution for the debate over open-source and closed-source code. In order for such a comparison to be possible, the source of data needs to be neutral and unbiased. Measures for quality are often tricky to devise. The inherent subjectivity in measurement leads to questions regarding rigor. In this study, we endeavor to compare the Windows operating system with other operating systems in order to answer the question of quality differences pertaining to security between open-source and proprietary operating systems. Data Source The United States Computer Emergency Readiness Team, or US-CERT, publishes cyber security bulletins every week. Cyber Security Bulletins provide weekly summaries of security issues and new vulnerabilities. They also provide patches, workarounds, and other actions to help mitigate risk. These bulletins are available for viewing in their website at HTUhttp:// Each of these weekly bulletins provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and Trojans. The bulletins provide information about vulnerabilities/bugs/holes that have been identified, even if they are not being exploited. The first part of the listing contains vulnerabilities identified only in the Windows Operating system. The second listing contains bugs identified only in the Unix/Linux operating systems. Vulnerabilities that affect both operating systems are tabulated under the third listing titled Multiple operating systems. Each list contains information in five columns. These five columns contain data on fields which are Vendor and Software, Vulnerability, Common, Risk and Source Risk Levels The Risk field consists of ranking the vulnerability as a High, Medium or a Low risk based on how the system may be impacted. The levels of risk are defined as follows: High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges. Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file. Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type 237
3 Operating System of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat. Data Collection Number of Vulnerabilities (%) Cumulative Risk (%) Risk per Vulnerability From the CERT website (HTUhttp:// data was gathered on the total number of vulnerabilities for Microsoft, Unix/Linux, and Multiple Operating Systems. Each risk was ranked 1, 2 or 3 depending on their risk level for Low, Medium and High Risk respectively. This enabled us to quantify the risk for better power in explanation and analysis. The Risk Rank was then summed to arrive at a total risk index value for Windows, Unix/Linux and Multiple Operating systems. Although the CERT website contains information from January 21st, 2004, data was collected only from June 9th to November 2nd 2004 because of resource constraints. Table 1 - Sample of Collected Data Although the data in the CERT website is clearly well arranged and unambiguously defined, we encountered two problems in collecting the data. The first was that although most data was weekly, two-week data prior to August 31st was grouped into one sheet. However, this problem was solved by sorting this data into each of the two weeks based on the date provided in the Week Windows Unix/Linux Multiple OS Windows Tot. Risk Unix/Linux Tot. Risk Multiple OS Risk Oct Oct 26 Source field Column. When there were multiple sources of data, the Source field had multiple dates listed. In such a situation, we used the earliest date to classify the vulnerability. A potentially more serious problem occurred in the collection of the Risk level data. Few vulnerabilities were listed in the database as High/Low. We ran our analysis without such items and found that their influence was minimal to non-existent. Since such cases were very few, less than 10 from among more than a thousand cases, and the fact that they introduced no bias in the analysis, we decided to retain them in the analysis. Instead of resorting to list wise deletion of such vulnerabilities, they were averaged out and given a Risk rating of Medium. Analysis The tabulation below shows the distribution of vulnerabilities (or bugs/holes) over a period of five months. A total of 1271 vulnerabilities were listed, with Unix/Linux (Open-source) Operating system the highest at 45.55%. Multiple OS and Windows Operating systems (Proprietary) were similar with 28% and 26% respectively. The results for cumulative risk were similar to the number of bugs for each operating system. Unix/Linux was highest at 44%, followed by Multiple OS(29.51%) and Windows(26.44%.) The average risk per vulnerability was highest for Multiple OS with a score of 2.37, followed by Windows at Unix/Linux was the lowest at
4 Windows 331 (26.04%) 766 (26.44%) 2.31 Unix/Linux 579 (45.55%) 1276 (44.04%) 2.20 Multiple OS 361 (28.40%) 855 (29.51%) 2.37 Total 1271 (100%) 2897 (100%) Table 2 - Distribution of Vulnerabilities The data was further reduced to three fields, type of software, No of Bugs and Risk, in order to run an Analysis of Variance. First, ANOVA was run with Type of Source as the independent grouping variable with number of bugs as the dependent continuous variable. Secondly, Another ANOVA procedure was run with number of Bugs as the independent variable and Risk levels as the dependent variable. Finally, the average risk per vulnerability was used in the third ANOVA procedure. The results are tabulated below. Procedure Dependent Variable F-Ratio(sig. level) ANOVA 1 Number of Vulnerabilities 6.93(p-value<.001) ANOVA 2 Cumulative Risk 5.51(p-value<.001) ANOVA 3 Risk per Vulnerability 0.29 Table 3 - ANOVA A Tukey-Kramer multiple comparison procedure was ascertain the differences between the three groups in terms of the number of vulnerabilities and the cumulative risk. Results indicate that open-source OS have more vulnerabilities and risk associated with them than proprietary, and multiple OS systems. There were no differences between proprietary and multiple OS systems. Conclusions and Limitations From our analysis, there appears to be a difference between the number of vulnerabilities reported for Windows and Unix operating systems (0.01 level.) However these differences do not exist between Open source and multiple OS systems. Similarly, there is a difference between Windows OS and Unix OS in terms of cumulative risk, but not between Windows and Multiple OS. Any conclusions about the relative quality of open-source versus proprietary software should however be tempered by caution. The differences may just be an artifact of source code availability, and also the fact that there are more individuals examining open-source software, than those examining proprietary software. The average risk per vulnerability seems to be the same between all types of operating systems. The ANOVA procedure detected no differences between groups. Since the average risk per vulnerability is considered, this measure may lead to more robust conclusions about the relative quality of software. Our analysis leads us to conclude that there are no inherent qualitative differences between Windows and other operating systems. That is, the type of vulnerabilities in open and proprietary systems, are similar to each other in terms of the average risk associated with them. 239
5 APPENDIX Vulnerabilities Data Sample Windows Operating Systems Only Vendor & Software Vulnerability - Impact Patches - Workarounds Attacks Scripts Common Risk Source Abyss Abyss Web Server X1 An input validation vulnerability exists, which could allow a remote malicious user to crash the target service. It is reported that a remote user can submit an HTTP request for a URL containing a MS-DOS device name (e.g., CON, PRN, AUX) in the 'cgi-bin' directory to cause the web service to crash. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. Abyss Web Server MS- DOS Device s Processing Low SecurityTracker Alert ID, , October 20,
6 UNIX / Linux Operating Systems Only Vendor & Vulnerability - Impact Software Patches - Workarounds Attacks Scripts Apple Safari A cross-domain vulnerability exists when multiple windows are open, which could let a remote malicious user spoof web page functions. No workaround or patch available at time of publishing. There is no exploit code required; Proof of Concept exploit has been published. Common Apple Safari Cross-Domain Dialog Box Spoofing Multiple Operating Systems - Windows / UNIX / Linux / Other Risk Medium Source Secunia Advisory, SA12892, October 20, 2004 Vendor & Software Vulnerability - Impact Patches - Workarounds Attacks Scripts Common Risk Source America OnLine America Online Webmail A Cross-Site Scripting vulnerability exists in the 'msglist.adp' script due to insufficient input validation, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. AOL Web Mail 'msglist.adp' Cross-Site Scripting High SecurityTracker Alert ID, , October 20, 2004 REFERENCES Balle, Jakob. The big picture on big holes. Network Security, May2004, Vol Issue 5, p18, 3p Chaudri, Abida; Patja, Ville. Windows v Lindows have Microsoft won the battle only to lose the war? Computer Law & Security Report, Jul2004, Vol. 20 Issue 4, p321, 3p 241
7 Claassen, Pieter. The state of the hack. Network Security, Apr2004, Vol Issue 4, p12, 2p Goad, G. Pierre; Holland, Lorien. China joins Linux bandwagon. Far Eastern Economic Review, 02/24/2000, Vol. 163 Issue 8, p8, 4p, 2c Hunter, Philip. Linux security: separating myth from reality. Network Security, Aug2004, Vol Issue 8, p8, 2p Post, G.; Kagan, A Computer security and operating system updates. Information & Software Technology, Jun2003, Vol. 45 Issue 8, p461, 7p Schultz, E. Eugene. Why can t Microsoft stay out of the InfoSec headlines? Computers & Security, May2003, Vol. 22 Issue 4, p270, 3p Schultz, E. Eugene. Windows 2000 security: A postmortem analysis. Network Security, Jan2004, Vol Issue 1, p6, 4p Schultz, Eugene. Microsoft security issues again in the news. Computers & Security, 2002, Vol. 21 Issue 8, p679, 2p Wang, Huaiqing; Chen Wang. Taxonomy of Security Considerations and Software Quality. Communications of the ACM, Jun2003, Vol. 46 Issue 6, p75, 4p 242
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
MWR InfoSecurity Security Advisory. pfsense DHCP Script Injection Vulnerability. 25 th July 2008. Contents
Contents MWR InfoSecurity Security Advisory pfsense DHCP Script Injection Vulnerability 25 th July 2008 2008-07-25 Page 1 of 10 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Running head: USING NESSUS AND NMAP TOOLS 1
Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Figure 9-1: General Application Security Issues. Application Security: Electronic Commerce and E-Mail. Chapter 9
Figure 9-1: General Application Application Security: Electronic Commerce and E-Mail Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Executing Commands with the Privileges
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Web Vulnerability Assessment Report
Web Vulnerability Assessment Report Target Scanned: www.daflavan.com Report Generated: Mon May 5 14:43:24 2014 Identified Vulnerabilities: 39 Threat Level: High Screenshot of www.daflavan.com HomePage
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Why Should You Care About Security Issues? SySmox WEB security [email protected]. Top seven ColdFusion Security Issues
SySmox WEB security [email protected] Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Taking a Proactive Approach to Linux Server Patch Management Linux server patching
Taking a Proactive Approach to Linux Server Patch Management Linux server patching In years past, Linux server patch management was often thought of in terms of we don t patch our servers unless there
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
The Electronic Arms Race of Cyber Security 4.2 Lecture 7
The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues
Basic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Vulnerability Disclosure Guideline for Software Developers
Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5 Contents 1. Introduction 2 2. Vulnerability Information: Provide
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal)
SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) Publishing Date 2012-01-24 Last Update 2012-01-24 Current Version V1.5 CVSS Overall Score 8.7 Summary: Multiple vulnerabilities
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Information Security Organizations trends are becoming increasingly reliant upon information technology in
DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: [email protected] Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
12 Security Camera System Best Practices - Cyber Safe
12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction
SSDP REFLECTION DDOS ATTACKS
TLP: AMBER GSI ID: 1079 SSDP REFLECTION DDOS ATTACKS RISK FACTOR - HIGH 1.1 OVERVIEW / PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that
ADC Survey GLOBAL FINDINGS
ADC Survey GLOBAL FINDINGS CONTENTS Executive Summary...4 Methodology....8 Finding 1: Attacks Getting More Difficult to Defend... 10 Finding 2: Attacks Driving High Costs to Organizations.... 14 Finding
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Cyber Security Trend - Annual Review 2014
Cyber Security Trend - Annual Review 2014 - Organizations are Centrally Aware of Only 50% of Their Own Website(s); Call for Reconsidering Inventory Management- Executive summary... 2 1. Threats to websites
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
