Top 10 Database. Misconfigurations.
|
|
|
- Donna Cunningham
- 10 years ago
- Views:
Transcription
1 Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad
2 Some Newsworthy Breaches From
3 In Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage Databases continue to be the primary target Same old attack vectors continue to yield success SQL injection here to stay? New attacks emerge Costs associated with data breaches continues to rise 3
4 Database Risks for 2012 Organizations have long focused their security efforts on the perimeter and endpoints This approach has left the data center highly vulnerable to anyone who can gain access via: 1. SQL Injection 2. Spear Phishing 3. Malware / Drive by downloads 4. Advanced Persistent Threats 5. Insider Attacks / Mistakes 6. Social Engineering 4
5 Data Breach Costs Are On The Rise $214 Over 535 million DBMS records have $204 $202 been compromised since 2008 $197 Cost per record estimated at $214- $318 for 2010 Annual losses valued at over $388 Billion $7.2 Million is the average cost of a data breach $ Cost Per Exposed Record Sources: Ponemon Institute, Symantic/Norton, Verizon Business Data Breach Report 5
6 Database Risks for 2012 Full of Holes Team SHATTER and others keep finding high risk vulnerabilities for database vendors to patch Exploit scripts posted to the web within hours of every patch release Fully patched but misconfigured databases are another easy target Database attacks bypass traditional network and host intrusion prevention mechanisms Public exploit code + slow patch cycle = High risk DBMS exposure 6
7 Already in Million Accounts 2 Fixes (only 5 in Oct 2011) 7
8 Top 10 DB Vulnerabilities and Misconfigurations 8
9 DB1: Default and Weak Passwords Default accounts are never good Not only DBMS have own default accounts, but applications install them too Weak passwords can be cracked Just google <database type> password cracker dozens of them out there Names, places, dictionary words make poor passwords Rainbow tables make anything under 7 or 8 characters weak Database login activity seldom monitored If you re not watching, an attacker can guess passwords all day 9
10 Default Account Examples User: system / Password: manager User: sys / Password: change_on_install User: scott / Password: tiger User: SA / Password: null User: db2admin / Password: db2admin User: db2as / Password: ibmdb2 User: SA / Password: null User: root / Password: null User: admin / Password: admin User: myusername / Password: mypassword User/Password the Same: DATABASE SECURITY DBSNMP NOT MY PROBLEM 10
11 Top 10 DB Vulnerabilities and Misconfigurations 11
12 DB2: SQL Injection in the DBMS Same concept as at Web App Specific functions in the DBMS are vulnerable to SQL injection Patching is needed for the fix Since the weaknesses are in the DBMS itself, vendor patches are required to remediate Typically takes 6+ months to patch a database 12
13 Exploiting SQL Injection Attack Target: Oracle 11g Privilege Level: Any Login with CREATE PROCEDURE Outcome: Access to all Database Data! Attacker can run any SQL as WMSYS Vulnerabilities Exploited: Privilege Escalation via SQL Injection in [WM]SYS.LT.ROLLBACKWORKSPACE 13
14 14
15 15
16 16
17 Top 10 DB Vulnerabilities and Misconfigurations 17
18 DB3: Excessive User & Group Privileges Theory of least privilege Great in theory; hard in practice Entitlements hard to manage Users can gain access by way of a role that is granted another role that is granted another role Often default database privilege grants are excessive and dangerous 18
19 How Did the User Get The Privilege? User Role Role Role Role Role 19
20 Exploiting Excessive Privileges Attack Target: Oracle 11g Release 1 Privilege Level: Anyone with CREATE SESSION privilege Outcome: Gain DBA access & complete OS control Vulnerabilities Exploited: Default PUBLIC privilege to execute DBMS_JVM_EXP_PERMS.IMPORT_JVM_PER PERMS PER MS 20
21 No users have ALL FILES - full OS access Attempt to execute OS command fails 21
22 Setup the JVM access control policy The attack in action. PUBLIC can import JVM permissions! 22
23 USER1 has full OS access OS commands run successfully New OS file created by our exploit 23
24 Freely Available Exploit Code! 24
25 Top 10 DB Vulnerabilities and Misconfigurations 25
26 DB4: Unnecessary Enabled DBMS Features Minimize Attack Surface Attackers will only have more to use against you Powerful Features are Good and Bad Integrated Java and other extensible languages Various levels of OS access available 26
27 Minimize Attack Surface Java UTL_FILE xp_cmdshell CREATE _ NOT _ FENCED (allows logins to create SPs) OLEDB Ad Hoc Query OPENROWSET OPENDATASOURCE xp_cmdshell Permissions on User Table (mysql.user) 27
28 Top 10 DB Vulnerabilities and Misconfigurations 28
29 DB5: Broken Configuration Management Configuration Option Overload Beginning Name the instance, choose the data storage location Now Advanced feature sets, add-on modules, specific security settings, etc. What s the right configuration? 1 st What is our current configuration? 2 nd What should be our configuration? 29
30 Misconfigurations Are Potential Threats Oracle Configuration Management (OCM) stores configuration data about sysaudits table If properly hostnames, usernames, datafile configured audit records can be lost locations, etc. TRUST_ALLCLNTS configuration parameter If set to default (which is YES) all clients attempting to connect will be considered trusted Default TCP Ports 1433 and
31 Top 10 DB Vulnerabilities and Misconfigurations 31
32 DB6: Buffer Overflows Crash or Exploit Simple: crash the server Advanced: load and run malicious code Only a vendor patch fixes the issue Like a SQL Injection vulnerability Need vendor fix 32
33 Example: Attacking DB2: Denial of Service Attack Target: IBM DB2 LUW 9.1 Fix Pack 8 Privilege Level: Any database user Outcome: Crash database server Vulnerabilities Exploited: Heap buffer overflow in built-in scalar function REPEAT Patched by Database Vendor: IBM DB2 LUW 9.1 Fix Pack 9 33
34 Connect to the database Run the exploit. No privileges needed! 34
35 No more database. 35
36 Freely Available Exploit Code 36
37 Top 10 DB Vulnerabilities and Misconfigurations 37
38 DB7: Privilege Escalation I am now DBA Vulnerabilities can lead to low- privileged users becoming DBA Only a vendor patch fixes the issue Risk management when considering patch rollout 38
39 Exploiting Privilege Escalation Attack Target: Oracle11g Release 2 Pi Privilege il Level: CREATE PROCEDURE and EXEC on MDSYS.RESET_INPROG_INDEX Outcome: Full control of the database (assume DBA role) Vulnerabilities Exploited: Privilege escalation in MDSYS.RESET_INPROG_INDEX Patched by Database Vendor: Oracle January 2011 CPU 39
40 The Attack Step by Step 1. Setup a) Create procedure myproc containing code to grant my account DBA b) Create function myfn containing code to create a trigger in the system schema 2. Exploit a) Exploit the vulnerability, causing MDSYS to run myfn. Creates the trigger. 3. Reap Rewards a) Use PUBLIC privileges to run a SQL statement that causes the trigger to fire. System runs the trigger, which calls myproc which grants my account DBA. 40
41 Create a new user (user1) and grant privileges. 41
42 Setup step 1: Create attack code (myproc) to grant DBA privileges to user1 42
43 Setup Step 2: Create a function (myfn) that creates an evil trigger that calls the attack code (myproc) 43
44 Run the exploit. Causes MDSYS to run myfn and create the evil trigger. Insert statement causes the evil trigger to run myproc and grants DBA 44
45 Attacker is now DBA 45
46 Google Told Me All About It.. 46
47 Top 10 DB Vulnerabilities and Misconfigurations 47
48 DB8: DoS Remember the SQL Slammer Worm? 75,000 victims in 10 minutes Microsoft had the patch 6 months prior Again, patch management for DBMS is crucial 48
49 Exploiting Denial of Service Attack Target: IBM DB2 LUW 9.7 Fix Pack 1 Privilege Level: Anyone on the network Outcome: No access to DB2 database Vulnerabilities Exploited: Denial of Service in the Tivoli DB2 monitoring agent Patched by Database Vendor: IBM DB2 LUW 9.7 Fix Pack 2 49
50 DB2 Monitoring Agent has crashed. Run the exploit. No database login needed! 50
51 Attacking DB2: Denial of Service Outcome: DB2 9.7 Database is unavailable Vulnerabilities Exploited: DoS in the Tivoli DB2 monitoring agent How Did We Do It? Freely available exploit code Google: KUDDB2 remote denial of service 51
52 Top 10 DB Vulnerabilities and Misconfigurations 52
53 DB9: Unpatched Database Vulnerable the day the patch is released Exploit/POC code emerges quickly What s the difference compared to a zero-day vulnerabilities? What do we patch first? Citi Critical lbusiness systems??low risk systems? 53
54 Top 10 DB Vulnerabilities and Misconfigurations 54
55 DB10: Unencrypted Data At Rest and In Motion Data at Rest File system encryption Transparent Data Encryption (TDE) Data In Motion SSL Oracle ASO Kerberos 55
56 Top 10 DB Vulnerabilities and Misconfigurations 56
57 DB11: Not Doing Anything Reliance on Perimeter Protection Only Does Not Work Sony, Epsilon etc. Who s responsible for DB Security? Who are the stakeholders? DBA? Security? 57
58 Database Security Tips for Devise a Database Security Plan 2. Locate Sensitive e Information 3. Minimize Attack Surface 4. Fix Default, Blank and Weak Passwords 5. Regularly Patch Databases 6. Implement Least Privileges 7. Encrypt Sensitive Data in Rest and in Motion 8. Train and Enforce Corporate Best Practices 58
59 Database Security Tips for 2012 Devise a Database Security Plan Start with an established DBMS checklist DISA STIG is an excellent starting point DISA publishes detailed guidelines on how to secure and configure MS SQL server and Oracle Customize to meet your orgs needs. There may be industry regulations to follow PCI, SOX, HIPAA Once a DBMS security policy is established, build a roll-out out plan Pick one or two of the highest priority issues to remediate first As you progress, layer on additional checks and tests 59
60 Database Security Tips for 2012 Locate Sensitive Information Determine where all sensitive info resides Secure those databases first Minimize Attack Surface The DBMS ships with many features that are not used Some of these features have functionality that render a DBMS vulnerable to attack Where possible, disable unused DBMS features 60
61 Database Security Tips for 2012 Fix Default, Blank and Weak Passwords Ensure all databases require complex passwords Eliminate default, blank and weak passwords Use different passwords for each system External authentication systems can be a great option Regularly Patch Databases Critical patches insure that vulnerabilities are remediated on a regular basis Patching in conjunction with auditing and monitoring increases DBMS protection 61
62 Database Security Tips for 2012 Implement Least Privileges Ensure employees only have access to the sensitive data required to do their jobs Map job functions to privileges on IT assets Never assign privileges il to guest accounts or PUBLIC Untangle the web of user entitlements Encrypt Sensitive Data at Rest and in Motion Never er store sensitive e data in clear text t in a DBMS where any DBA/IT staff can access it Ensure the data is encrypted and not allowed to travel unencrypted on the network 62
63 Database Security Tips for 2012 Train and Enforce Corporate Security Best Practices Ensure all employees are aware of the orgs. security best practices Create a training i program and consistently reinforce policy Extend critical protections at the network and application layer to the DBMS Perform regular DBMS audits, pen tests and misconfiguration checks Activity monitoring to ensure sensitive data is not downloaded or transferred 63
64 Last Thoughts Attackers are targeting the data center, your defenses should be focused there Most breaches in 2011 were simple attacks that exploited common flaws or the result of human error/failure Almost all were avoidable through simple controls In 2012, improve security AND improve education (re-educate) security and non- security professionals 64
65 References Team SHATTER Top 10 Database Vulnerabilities Book Security Heuristics of Application Testing Technology for Enterprise Research Practical Oracle Security By Josh Shaul CTO, Application Security, Inc. Mark Trinidad Sr. Product Manager Application Security, Inc blog.appsecinc.com 65
Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.
Database Security and Auditing: Leading Practices Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc. Getting to Know Database Threats and Vulnerabilities Key Objectives Understand
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Anatomy of a Database Attack
Anatomy of a Database Attack James Bleecker Application Security, Inc. Principal Systems Engineer June 9, 2011 Scott Campbell Application Security, Inc Regional Sales Manager Today s Agenda The Threat
Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com)
Hacking databases for owning your data Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Overview Introduction Why database security? How databases are hacked? Oracle Database Server attacks
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection
Oracle Database Security Myths
Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Implementing Database Security and Auditing
Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P
Security Solution Architecture for VDI
Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
Top Ten Database Security Threats
How to Mitigate the Most Significant Database Vulnerabilities Written by: Amichai Shulman Co-founder, CTO The enterprise database infrastructure is subject to an overwhelming range of threats. This document
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Top Ten Fraud Risks in the Oracle E Business Suite
Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Hunting flaws in Microsoft SQL Server
Hunting flaws in Microsoft SQL Server Cesar Cerrudo Independant Security Researcher Aaron Newman CTO/Founder, Application Security, Inc. www.appsecinc.com 1 Outline Collecting passwords Elevating privileges
Database Security SQL Server 2012
Database Security SQL Server 2012 Russ McMahon Associate Prof of Information Technology CECH UC 1 of only 21 ABET accredited programs in the US Jasmine Hix Senior IT (Software Dev) Helped with the slides
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
What? Me, Worry? I've Already Been Hacked. Haven't You?
What? Me, Worry? I've Already Been Hacked. Haven't You? David Maman Co-Founder, CTO GreenSQL Session ID: Session Classification: DSP-F43 General Interest #1 Global Security Challenge Sophisticated attacks:
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
GUIDE TO SYBASE SECURITY
GUIDE TO SYBASE SECURITY [email protected] Company: Network Intelligence India Pvt. Ltd. http://www.nii.co.in Date: 31 st January 2003 Guide to Sybase Security Introduction: This article provides a detailed
MySQL Security for Security Audits
MySQL Security for Security Audits Presented by, MySQL AB & O Reilly Media, Inc. Brian Miezejewski MySQL Principal Consultat Bio Leed Architect ZFour database 1986 Senior Principal Architect American Airlines
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Simple Steps to Securing Your SSL VPN
Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Hedgehog: Host-Based Database Activity Monitoring & Prevention
Whitepaper Hedgehog: Host-Based Database Activity Monitoring & Prevention Including: Introduction to database security, activity monitoring and intrusion prevention Unique benefits of host-base monitoring
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
OWASP Top Ten Backdoors
OWASP Top Ten Backdoors 1 Yaniv Simsolo, COMSEC Consulting The news about the above agreement was posted on Cisco site in mid 1998. Shortly this news was removed from Cisco website. Gradually all this
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
