CS 392/681 - Computer Security. Module 16 Vulnerability Analysis
|
|
|
- Beatrice Lambert
- 10 years ago
- Views:
Transcription
1 CS 392/681 - Computer Security Module 16 Vulnerability Analysis
2 Course Policies and Logistics Homework 5 due tonight Homework 6 posted Read Chapter 23 11/13/2003 Module 16 - Vulnerability Analysis 2
3 Some definitions Computer system A computer system consists of software, hardware, policies and people Vulnerability Failure or weakness in a computer system that leads to violations of its policies, procedures and integrity Exploit Use of vulnerability to violate the policies, procedures Attacker One who attempts to exploit a vulnerability 11/13/2003 Module 16 - Vulnerability Analysis 3
4 Two types of Vulnerability Testing Formal Verification: In formal verifications preconditions give the constrains of the state of the system when the program is run, and the postconditions state the effect of running the program Formal verification can theoretically prove the absence of vulnerabilities Penetration Testing: In penetration testing preconditions describe the state of the system in which hypothesized security flaw can be exploited and the postconditions are the result of testing. If the postconditions are inconsistent with the security policies the hypothesis is correct- in other words a vulnerability exists. Cannot prove the absence of vulnerabilities but can only prove their existence 11/13/2003 Module 16 - Vulnerability Analysis 4
5 Why Penetration Analysis? If formal verification can prove existence of vulnerabilities why not use it instead of penetration testing? Formal verification is applied to software components. Formal verifications do not capture flaws in the policies, procedures and people! Penetration analysis attempts to capture flaws in the whole computer system However, penetration analysis is not a substitute to rigorous design and implementation of computer systems 11/13/2003 Module 16 - Vulnerability Analysis 5
6 Penetration Testing (PenTest) Also known as Penetration analysis (PentAn) Tiger team attack Read team [Blue team] Ultimate goal of the test is to violate a site s security policies However, usefulness of the study comes from degree of penetration, documentation and conclusions of the study not from the success or failure of the attempted penetration For example: successful compromise of user data is not equivalent to privilege escalation in a computer system 11/13/2003 Module 16 - Vulnerability Analysis 6
7 Layered Model for Penetration Testing 1. External attacker with no knowledge Testers know the target exists Have enough information to identify it No access, they have to figure this out social engineering Cannot get information about security of the system Usually not part of penetration testing 2. External attacker with access to the system Attackers have access to the system Either use a access mechanism to login Usual attacks: guessing passwords, look for unprotected accounts (guest) Attack network servers Usually exploits implementation flaws 11/13/2003 Module 16 - Vulnerability Analysis 7
8 Layered model contd. 3. Internal attacker with access to system Testers have an authorized account on the system Tests involve gaining unauthorized privileges Exploits design, operational and implementation flaws 11/13/2003 Module 16 - Vulnerability Analysis 8
9 Flaw Hypothesis Methodology Penetration testing methodology springs from flaw hypothesis methodology Developed by System Development Cooperation and provides a framework for penetration studies Information gathering Flaw hypothesis Flaw testing Flaw generalization Flaw elimination 11/13/2003 Module 16 - Vulnerability Analysis 9
10 Information Gathering Design and implementation of the system is analyzed Design specifications and manuals Operating system Services Users Fingerprinting: Identifying system parameters Active fingerprinting Passive fingerprinting Testers should identify policies that govern the system 11/13/2003 Module 16 - Vulnerability Analysis 10
11 Flaw Hypothesis Testers use the knowledge gathered in previous step Identify flaws in similar systems Prior records of testing CERT documents Newsgroups Faulty configurations and defaults Hypothesize flaws in current system 11/13/2003 Module 16 - Vulnerability Analysis 11
12 Flaw Testing Prioritize the flaw hypothesis Priority is a function of goals of the test External access to system Privilege escalation Internal access Demonstrate the flaw either through analysis or proof of concept Proof of concept code segments can be found on the Internet, Newsgroups etc. 11/13/2003 Module 16 - Vulnerability Analysis 12
13 Flaw Generalization Generalize the flaws by categorization Buffer overflows Setuid flaws Etc. Different category flaws alone may be benign but a combined flaw can be devastating See Secure Programming lectures for examples Analyze the system for similar flaws or flaws of same family 11/13/2003 Module 16 - Vulnerability Analysis 13
14 Flaw Elimination Vulnerability analysis, testing usually does not fix flaws Recommendations are made to development team based on flaws and exploits 11/13/2003 Module 16 - Vulnerability Analysis 14
15 Goals of VA Develop ability to specify, design and implement information systems without vulnerabilities Develop techniques to analyze information systems for vulnerabilities Develop ability to address any vulnerabilities introduced during the operation of the information system Develop techniques to detect attempted exploits 11/13/2003 Module 16 - Vulnerability Analysis 15
16 VA Frameworks Frameworks are abstractions developed by classifiers to achieve certain goals. Frameworks present different perspectives. Frameworks we will cover Research Into Secure Operating System (RISOS) Protection Analysis Model NRL Taxonomy Aslam s Model 11/13/2003 Module 16 - Vulnerability Analysis 16
17 RISOS Goal: help information systems managers understand security issues in OS and help estimate the effort required to enhance system security Flaw Classes 1. Incomplete parameter validation 2. Inconsistent parameter validation 3. Implicit sharing of privileged data 4. Asynchronous validation 5. Inadequate authentication 6. Violable prohibition 7. Exploitable logic error 11/13/2003 Module 16 - Vulnerability Analysis 17
18 RISOS Classes Incomplete parameter validation Parameters are not checked properly before use Check parameters for type, value, access permissions and their presence or absence E.g: buffer overflows Inconsistent parameter validation Data validation is done on inconsistent data format E.g: delimiters of one routine may be data to another Implicit sharing of privileged data Failure to isolate processes and users properly E.g: password guessing on TENEX Asynchronous validation Race conditions 11/13/2003 Module 16 - Vulnerability Analysis 18
19 RISOS Classes Inadequate authentication Failure to properly authenticating users E.g: guest accounts, Trojan Horses Violable prohibition Failure to handle bounds conditions properly E.g: failure in array bound checks, pointer arithmetic Exploitable logic error Flaws that don t fall into any of the above classes 11/13/2003 Module 16 - Vulnerability Analysis 19
20 Protection Analysis Model Goal: attempted to break the operating system into smaller manageable pieces to reduce the required expertise in dealing with operating systems 11/13/2003 Module 16 - Vulnerability Analysis 20
21 Protection Analysis Model Flaw classes Improper protection domain initialization and enforcement Improper choice of initial protection domain Improper isolation of implementation detail Improper change Improper naming Improper deallocation or deletion Improper validation Improper synchronization Improper indivisibility Improper sequencing Improper choice of operand or operation 11/13/2003 Module 16 - Vulnerability Analysis 21
22 Protection Analysis Model Improper protection domain initialization and enforcement Flaws raising from initialization of the system or programs and enforcement of security requirements Improper choice of initial protection domain Bad umask values Improper isolation of implementation details Failure to provide proper abstractions Improper change Change in property bindings. E.g: access-open calls Improper naming Collisions in names of objects in a system E.g: naming a user file ls Improper deallocation Inadequate garbage collection E.g: failure to free memory 11/13/2003 Module 16 - Vulnerability Analysis 22
23 Protection Analysis Model Improper validation Improper validation of parameters and data E.g: bounds checking buffer overflows Improper synchronization Occurs when designers fail to synchronize events properly Improper indivisibility Failure to provide atomic operations Improper sequencing Inadequate logic sequences in events E.g: flaws in some one-time password schemes Improper choice of operand or operation Inappropriate or erroneous calls to functions E.g: calling rand() without seeding it! 11/13/2003 Module 16 - Vulnerability Analysis 23
24 The NRL Taxonomy Goal: a taxonomy to help designers and operators of the system enforce security. Three questions to answer How did the flaw enter the system? When did it enter the system? Where in the system is it manifest? Built three different sets of flaw classes to answer the above questions Flaw by Genesis Flaw by Time of Introduction Flaw by Location 11/13/2003 Module 16 - Vulnerability Analysis 24
25 NRL: Flaws by Genesis Malicious Trojan Horse Non-replicating Replicating Trapdoor Logic/Time Bomb Non-Malicious Covert Channel Storage Timing Other 11/13/2003 Module 16 - Vulnerability Analysis 25
26 NRL: Flaws by Time of Introduction Development Requirements Source Code Object Code Maintenance Operation 11/13/2003 Module 16 - Vulnerability Analysis 26
27 NRL: Flaws by Location Software Operating System System initalization Memory management Process management Device management File management Authentication Other/unknown Support Privileged utilities Unprivileged utilities Application Hardware Faulty APIs 11/13/2003 Module 16 - Vulnerability Analysis 27
28 Aslam s Model Goal: Group security flaws in Unix by similar faults without ambiguity to store in databases Flaw Classes Coding faults Synchronization errors Condition validation errors Emergence faults Configuration errors Environment faults 11/13/2003 Module 16 - Vulnerability Analysis 28
29 Gupta s and Gligor s Theory A formal analysis technique to detect vulnerabilities arising from failure to perform adequate checks Hypothesis Of Penetration Patterns System flaws that cause a large class of penetration patterns can be identified in system source code as incorrect/absent condition checks or integrated flaws that violate the intentions of the system designers Of Penetration-Resistant Systems A system is largely resistant to penetration if it adheres to a specific set of design properties Some properties chosen to formalize the model 11/13/2003 Module 16 - Vulnerability Analysis 29
30 Properties chosen in the model System isolation and tamperproofness User must not be able to tamper with the system System interaction must be through well-defined abstractions System noncircumventability System checks all references to objects User cannot circumvent any system checks Consistency of global objects of the system With respect to timing and storage objects are consistent Elimination of undesirable system and user dependencies 11/13/2003 Module 16 - Vulnerability Analysis 30
31 Further readings Chapter 23 A Taxonomy of Security Faults in the Unix Operating System, Tamir Aslam Vulnerabilities Analysis, Matt Bishop Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul, Eugene Spafford 11/13/2003 Module 16 - Vulnerability Analysis 31
CS52600: Information Security
CS18000: Programming I CS52600: Information Security Vulnerability Analysis 15 November 2010 Prof. Chris Clifton Vulnerability Analysis Vulnerability: Lapse in enforcement enabling violation of security
Introduction to Security
IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 9 Nov 16, 2010 Authentication, Identity Vulnerability Analysis 1 Objectives Understand/explain the issues related
(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
(General purpose) Program security These ideas apply also to OS and DB. Read Chapter 3. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
Lecture 18: More Assurance
Lecture 18: More Assurance Reviews of assurance evidence Security testing Penetration testing Slide #18-1 Reviews of Assurance Evidence Reviewers given guidelines for review Other roles: Scribe: takes
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Defect Management and Reporting Domain: Application Domain Date Issued:
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Software Asset Management (SWAM) Capability Data Sheet
Software Asset Management (SWAM) Capability Data Sheet Desired State: - Only authorized software products and executable files are installed on in scope devices - All devices are assigned or authorized
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010
Penetration Testing Getting the Most out of Your Assessment Chris Wilkinson Crowe Horwath LLP September 22, 2010 Introduction Chris Wilkinson, CISSP Crowe Horwath LLP Product Manager - Penetration Testing
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21
Computer Security CIS 5370 Evaluating Systems Chapter 21 1 Evaluation Methodology 1. Set of security functionality requirements 2. Set of assurance a requirements e e 3. Methodology to determine if the
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
CS574 Computer Security. San Diego State University Spring 2008 Lecture #7
CS574 Computer Security San Diego State University Spring 2008 Lecture #7 Today s Structure Administrivia Questions Recent News Lecture Administrivia Assignment #1 - AS1_Template.jar Alternative Tools
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
Digital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
A State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures
GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 27 A State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures Ali Abbas 1, Abdulmotaleb El Saddik 1,2, and Ali Miri
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Detecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
D. Best Practices D.2. Administration The 6 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.2. Administration The 6 th A 1 of 26 The previous section described how to improve IT security through use of better development
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Penetration testing. A step beyond missing patches and weak passwords
Penetration testing A step beyond missing patches and weak passwords June 25 th, 2012 Eirik Thormodsrud Graduated from the ISG in 2006 Employed by Ernst & Young Norway ever since (5 ½ years) Manager at
Introduction to Computer Security
Introduction to Computer Security (ECE 458) Vijay Ganesh Spring 2014 Online Resources, Books, Notes,... Books Introduction to Computer Security by Matt Bishop Computer Security: Art and Science by Matt
Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science
Taxonomic Modeling of Security Threats in Software Defined Networking Jennia Hizver PhD in Computer Science SDN Adoption Rates SDN Attack Surface SDN Threat Model Attack Examples Threat Mitigation Agenda
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
Penetration Testing. Security Testing
Penetration Testing Gleneesha Johnson Advanced Topics in Software Testing Fall 2004 Security Testing Method of risk evaluation Testing security mechanisms to ensure that their functionality is properly
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO
Does vsphere really have some major issues? Recent Cases involving VMware Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO Mitigation Techniques Future Concerns? VMware 80%
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
