Threat Modeling for Secure Embedded Software
|
|
|
- Blanche Adams
- 9 years ago
- Views:
Transcription
1 SECURITY INNOVATION & KLOCWORK WHITE PAPER JUNE 2011 Threat Modeling for Secure Embedded Software As embedded software becomes more ubiquitous and connected powering everything from home appliances and cars to aircraft and mission-critical systems organizations must take additional steps to ensure that the code produced is both secure and reliable. Embedded software, however, presents a unique set of challenges for application development and engineering teams. To combat embedded software threats, teams are turning to strategies such as threat modeling, static analysis and penetration testing to secure their embedded code. Google Confesses Android Security Breach, Rolls Out Fix Sony Announces PS2 Bank Security Breach Microsoft Warns Xbox Live Users of Security Threat RSA Offers to Replace Tokens After Attack Software developers greatest challenges in producing secure embedded code are rooted in the nature of the devices that run the software: They are resource-constrained and have less room to compensate for CPU- or memory-robbing attacks. As a result, they are easily susceptible to denial of service attacks. Their performance can be slowed by cryptography. To speed performance, embedded developers do not include secure networking protocols on embedded devices as often as they do on their desktop counterparts. Their firmware can be changed. Knowledgeable users can swap out existing embedded fi rmware and replace it with an operating system of their choice. They are only intermittently connected to a network. Inconsistent network connections reduce the likelihood that security patches will be kept up-to-date, and increase the chance that the device will access an unsecure network. They are easy to steal due to their small physical size. In theory, an attacker could swap one embedded device for another and load malicious information into a system. This paper will examine threat modeling and explain how it can be used in concert with secure development best practices, including automated source code analysis, peer code reviews, and penetration testing to both identify and mitigate embedded software threats.
2 Threat Modeling A Brief Overview By helping development teams to identify and understand potential threats, threat modeling provides the essential information needed to plan an embedded software security strategy. Threat modeling is a security engineering activity that documents the key assets found in an application or system and purposely exposes risks to those assets in a thorough and disciplined manner. The goal of a threat model is to shine a light upon hidden security risks that may not be obvious or anticipated by the design team. This information can then be used to develop a risk management strategy and provide a roadmap for future security engineering activities. By identifying an application s potential vulnerabilities, threat modeling helps development teams to understand and prioritize the array of risks for which the software is susceptible. With the results of a threat model in hand, development teams can ensure that they are concentrating their design, development and testing techniques on the risks that matter most. Benefits of Threat Modeling Threat modeling is one of the most powerful security engineering activities because it focuses on actual threats, not simply on vulnerabilities. A threat is an external event that can damage or compromise an asset or objective, whereas vulnerability is a weakness within a system that makes an exploit possible. Vulnerabilities can be repaired, but threats can live on indefinitely or change over time. Threat modeling facilitates a risk-based software development approach by uncovering external risks and encouraging the use of secure coding practices. In particular, threat modeling helps development teams to: Assess the probability, potential harm, and priority of attacks Prioritize security efforts according to true risk Shape an application design to meet security objectives Identify where additional security resources are required Weigh security decisions against other design goals Improve the security of an application by implementing effective countermeasures Understand attack vectors for penetration testing Understand the conditions under which an attack may be successful By helping development teams to identify and understand potential threats, threat modeling provides the essential information needed to plan an embedded software security strategy. Caveat to Threat Modeling It is important to note that threat modeling is not an attack plan, a test plan, a formal proof of system security, or a design review. Threat modeling informs those plans and reviews by offering deep insight into the methods attackers could use to manipulate embedded software. Threat modeling is therefore a key contributor to design review and test planning, but should not be considered a substitute for those activities. Creating a Threat Model Developing a threat model is a team effort, but works best when the modeling exercise is led by a designer with security expertise. The following activity overview outlines an efficient and repeatable procedure for modeling threats to embedded software. Step 1: Identify Security Objectives First, the team must clarify the desired level of security. Is the goal to prevent any and all security breaches? Are certain attacks permissible? Preventing every possible attack may not be possible or cost-effective, so it is important to develop realistic objectives that balance security, cost and effort. Threat Modeling for Secure Embedded Software Klocwork White Paper 2
3 Step 2: Create a System Overview Once its security objectives are clear, the development team should examine its software application and identify each asset of value. Assets of value are components that an attacker would value and which therefore need to be protected. Examples include: Data assets such as credit card numbers Technology assets such as intellectual property or content under Digital Rights Management Soft assets such as business reputation and customer trust. Certain attacks, such as defacement, can have a minor impact on hard assets but can dramatically reduce customer confidence in an organization s ability to develop a reliable, trustworthy product. While product developers are normally concerned with use cases, a threat model encourages the team to think about abuse cases. Step 3: Isolate and Decompose the Device s Software Design While product developers are normally concerned with use cases, a threat model encourages the team to think about abuse cases. An abuse case is an attack scenario in which a malicious user wishes to abuse, rather than use, a system. The threat modeling process helps to generate abuse cases by decomposing a device s software design to isolate the areas most susceptible to abuse. When brainstorming on abuse cases, consider: The data on the device and data in systems that can be accessed by the device. The input sources that could be used to attack the device software. These could include network data streams to the device operating system, installed applications, GPS signals, and cellular voice/data entry. Physical challenges that could arise if the device finds its way into the hands of an attacker. For instance, how would you protect sensitive data if the device is stolen? After enumerating the assets of value and decomposing the device s software design, a development team can generate a thorough list of threats that could negatively impact the device or system. Step 4: Identify Threats The goal of the threat modeling exercise is to identify as many threats as possible. To do this, development teams should use the CIA method and consider the events that would impact the Confidentiality, Integrity, or Availability of each asset. Many devices, for example, reveal geographic information about the user. The Google Latitude function on a smart phone can reveal a user s physical location, and a log of cardholder present credit card transactions can identify a user s movements. Devices with embedded software often log access to system resources. When compromised, this information can provide a blueprint of interesting and valuable information on the device. Once a development team has identified any and all threats that could compromise the confidentiality, integrity and availability of its assets, it must consider the type of attacks that could be used to realize each threat. The most efficient way to identify potential attacks is to develop an attack tree for each threat. An attack tree is a visual tool that documents threats and attacks for an asset, as shown in Figure 2. The threat is documented at the top of the tree and it is followed by a set of branches that represent potential attack methods. These branches are then further subdivided to identify the conditions or techniques that could be used in a successful attack. Threat Modeling for Secure Embedded Software Klocwork White Paper 3
4 Client/UI Threat #4: Attacker Impersonates User Spoof authentication token/transaction ID Attacker discovers another user s credentials Bypass the client application/ui to create transaction Modify the audit trail so that it appears that a different user conducted the transaction Attempt to intercept credentials during their transmission Attempt to discover credentials left in memory Figure 2 Sample Attack Tree for an impersonation threat In the above example, the threat tree not only identifies the type of attacks that are possible when an attacker impersonates a user, it also lists the conditions and techniques under which a successful attack could take place. This information can be used in the next step of the threat model to identify the specific vulnerabilities within the embedded code. Step 5: Identify Vulnerabilities A good threat tree will list all of the conditions under which an attack could be successful. Imagine that a threat model has highlighted that credit card information could be obtained from the system via a man-in-the-middle attack on a communication channel. In this case, the attack tree would show that the attack could be successful if credit card information is transmitted over the data channel in cleartext. If the development team finds that this condition is met in its system, it should develop a mitigation strategy to block the attack. If that condition is not met, an attack is not possible and the team can concentrate its efforts elsewhere. At the end of this process, the threat model will comprise a list of vulnerabilities that can be used to plan an attack mitigation strategy. Step 6: Repeat Threat models are organic documents and should be revisited frequently. Conditions change, designs change, and the threat landscape changes. The DVD world, for example, provides an excellent example of the need for continuous threat modeling. When DVD players were first created, the keys for DVD Digital Rights Management (DRM) were included in the actual DVD player hardware. Hardware players were initially tamper-proof, but the introduction of software DVD players made it much easier for attackers to reverse-engineer the keys and break the encryption. The original threat model for an early DVD player would have listed only the original threat: DVD Content is Stolen, and its mitigation: DVD content is encrypted, encryption keys are stored in tamper-proof hardware. With the introduction of software players, the threat model had to be updated to identify and mitigate the new risks. Threat Modeling for Secure Embedded Software Klocwork White Paper 4
5 Threat Modeling - Activity Summary Table Input Step Output Business requirements Security policies Compliance requirements Deployment diagrams Use cases Functional specifications Deployment diagrams Use cases Functional specifications Step 1: Identify security objectives Step 2: Create a system overview Step 3: Isolate and decompose your device design Common threats Step 4: Identify threats Common vulnerabilities Step 5: Identify vulnerabilities Key security objectives Whiteboard-style diagram with end-to-end deployment scenario Key scenarios Roles Technologies Application security mechanisms Trust boundaries Entry points Exit points Data flows Threat list Vulnerability list Figure 3 Threat Modeling Activity Summary Table Putting it into Practice: Identifying & Mitigating Vulnerabilities in Code While threat modeling can uncover the broad threats and vulnerabilities of an embedded system, it cannot mitigate those threats. To do so, development teams must practice defensive coding, engage in frequent code reviews, and perform penetration testing. Code Defensively Defensive coding is a form of design that aims to ensure the continuing function of software and source code in spite of misuse or abuse. While a threat model can identify vulnerabilities due to design, a certain percentage of vulnerabilities will always result from coding flaws. Developers often find that many of the vulnerabilities identified in the threat model result from only a handful of coding errors. One simple insecure coding technique that is performed repeatedly can contribute to dozens of vulnerabilities. Hackers frequently exploit the best-known vulnerabilities, so developers that code defensively and eliminate the most common coding flaws can substantially reduce the risk of a successful attack. Moreover, threat modeling often uncovers threats that can only be mitigated through good coding practices. If, for example, an organization has identified a threat that requires a centralized input and data validation strategy, it will require code-level fixes to accomplish the validation. These principles might include validating all input for length, range, format and type. By following defensive coding practices most notably, the use of automated tools to identify weak coding practices and uncover vulnerabilities development teams can dramatically reduce the frequency and impact of bad code. Threat Modeling for Secure Embedded Software Klocwork White Paper 5
6 Most developers are not security experts, but source code analysis tools can help to inform and educate developers of the most common security issues. Automated Source Code Analysis Automated source code analysis (SCA) tools provide a high return on investment for any software development organization by helping to eliminate bugs early in the development cycle. Industry estimates hold that the cost of addressing a code defect after a build is 10 times higher than addressing it during development. While automated programs do not remove the need for manual code testing, they can dramatically reduce the time spent on code reviews and focus manual tests on the most important and hardest-hitting issues. Static analysis tools, for example, can identify hundreds if not thousands of coding problems. These include: Common vulnerabilities such as buffer overflows, uninitialized data, use of dangling pointers, injection flaws and known insecure APIs and libraries. Secure coding guidelines such as CWE, CERT, DISA and OWASP, as well as any custom checks or guidelines that would be unique to your code base. Reliability-related concerns such as memory leaks, memory allocation, resource management and more. Long-term maintainability concerns such as architectural violations, dead code, unused local variables, and other coding style best practices. By incorporating automated static analysis tools organizations can simplify existing peer review processes and automate a number of code review activities. Moreover, by running this analysis early in the software development process, developers can eliminate simple mistakes before they make it into the code stream. In fact, static analysis tools are ideal for educating developers about the coding problems listed above. Most developers are not security experts, but source code analysis tools can help to inform and educate developers of the most common security issues. By examining static analysis results, developers can identify the frequent problems and, over time, make improvements in their processes to avoid them. It is important to note, however, that static analysis can only identify specific coding problems. It is up to the development team to decide whether those problems need to be addressed. That decision depends on established trust boundaries and the costs/benefits associated with the repairs. Development teams can speed these decisions by consulting the threat trees established during the threat modeling process to determine whether the vulnerabilities represent true threats to the system. Engage in Frequent Code Reviews Security code reviews are critical in the development of secure code. They unveil vulnerabilities that are difficult to discover through testing processes since they examine the source code directly and review code paths deep inside an application. Through a focused and iterative approach to code review that consists of both manual and automated inspection, code reviews can be performed as often as every check-in to discover bugs before they make it into the build. These frequent code reviews not only identify additional vulnerabilities, they also allow developers to gain experience and learn collectively from their mistakes. To perform an effective code review: 1. Identify code review objectives. Consult the threat model to prioritize risks and identify the most important vulnerabilities. 2. Perform a preliminary scan. Use both control flow and data analyses to step through logical conditions in the code, understand the conditions under which each block will be executed, and trace data from the points of input to the points of output. Threat Modeling for Secure Embedded Software Klocwork White Paper 6
7 3. Review for common issues. Scan embedded code for common vulnerabilities around data access, input and data validation, authentication, physical possession and replay attacks. 4. Review for unique issues. Consult the threat model and scan embedded code for vulnerabilities that may be unique to the particular system, device or application in question. Code review should be started early in the software development process and repeated until the team is satisfied with the results or until a pre-established time limit has been reached. At the end of this process, the development team will have a set of prioritized vulnerabilities and inspection questions in hand that it can use to make future reviews even more effective. Perform Security Testing Security testing should be one of the final steps performed in an embedded software security project. Through a penetration test, development teams can gain confidence that their earlier design review, threat modeling and code review activities have hardened the software against attack. If teams have followed the security best practices outlined in this white paper throughout the development lifecycle, the problems that they will identify during this final stage will typically be minor and simple to remedy. When an application is ready for a penetration test, leverage the threat model to improve the test plan. Use the threat model to determine attack vectors and conditions under which the attacks may be successful. Security vulnerabilities can be subtle, so be sure to consider all signs of a successful attack, such as an unexpected change to a file system, or unexpected network traffic. Like a code review, a security test can also use both automated and manual tools. Automated SCA tools can be used to speed analyses, and manual testing techniques can be employed to both discover and address elusive vulnerabilities. The Importance of Threat Modeling Modern embedded systems are approaching the complexity of a traditional PC while introducing additional complexities related to connectivity and resource constraints. Through the use of key security engineering activities including threat modeling, code reviews, coding best practices, and security testing, development teams can detect and address security vulnerabilities in their embedded code quickly, efficiently and prior to product release. About Klocwork and Security Innovation Klocwork offers a portfolio of software development productivity tools designed to ensure the security, quality and maintainability of complex code bases. Using proven static analysis technology, Klocwork s tools identify critical security vulnerabilities and quality defects, optimize peer code review, and help developers create more maintainable code. Klocwork s tools are an integral part of the development process for over 850 customers in the consumer electronics, mobile devices, medical technologies, telecom, military and aerospace sectors. Visit to learn more. Security Innovation is an established leader in the software security and cryptography space. For over a decade the company has provided products, training and consulting services to help organizations build and deploy more secure software systems and protect their data communications. Visit Security Innovation at Threat Modeling for Secure Embedded Software Klocwork White Paper 7
8 Appendix A: Threat Modeling Checklist 1) Create a Threat Model Identify Security Objectives Create a System Overview Isolate and Decompose the Device s Software Design Identify Threats Identify Vulnerabilities 2) Code Defensively Look for traditional vulnerabilities such as buffer overflows, uninitialized data, use of dangling pointers, injection flaws and known insecure APIs and libraries. Scan for quality-related concerns such as memory leaks, memory allocation, resource management and more. Examine long-term maintainability concerns such as architectural violations, dead code, unused local variables and others. Identify poor code styles and standards. Uncover layout issues. 3) Perform Effective Code Reviews Identify code review objectives Perform a preliminary scan Review for common issues Review for unique issues CORPORATE HEADQUARTERS: 187 Ballardvale Street, Suite A195 Wilmington, MA BRANCH OFFICE: rd Ave #400 Seattle, WA t: f: Copyright Security Innovation 2011 All Rights Reserved IN THE UNITED STATES: 15 New England Executive Park Burlington, MA IN CANADA: 30 Edgewater Street, Suite 114 Ottawa, ON K2L 1V8 t: f: Copyright Klocwork Inc All Rights Reserved
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
IT Risk Management: Guide to Software Risk Assessments and Audits
IT Risk Management: Guide to Software Risk Assessments and Audits Contents Overview... 3 Executive Summary... 3 Software: Today s Biggest Security Risk... 4 How Software Risk Enters the Enterprise... 5
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
Mobile Application Security Study
Report Mobile Application Security Study 2013 report Table of contents 3 Report Findings 4 Research Findings 4 Privacy Issues 5 Lack of Binary Protection 5 Insecure Data Storage 5 Transport Security 6
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
-.% . /(.0/.1 . 201 . ) 53%/(01 . 6 (01 (%((. * 7071 (%%2 $,( . 8 / 9!0/!1 . # (3(0 31.%::((. ;.!0.!1 %2% . ".(0.1 $) (%+"",(%$.(6
!""#"" ""$"$"# $) ""$"*$"# %%&''$ $( (%( $) (%+"",(%$ -.% Number Phase Name Description. /(.0/.1.(((%( $. 201 2,%%%% %$. %(01 3-(4%%($. ) 53%/(01 %%4.%%2%, ($. 6 (01 (%((. * 7071 (%%2. 8 / 9!0/!1 ((((($%
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Serena Dimensions CM. Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF
Serena Dimensions CM Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF Move Fast Without Breaking Things With Dimensions CM 14, I am able to integrate continuously
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Cyber Security Risk Mitigation Checklist
Cyber Security Risk Mitigation Checklist Contents Building a Risk Management AMI Program MDM Cyber Security Policy Communication Systems Personnel and Training Scada Operational Risks In Home Displays
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
Security Testing and Vulnerability Management Process. e-governance
Security Testing and Vulnerability Management Process for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
SECURITY EDUCATION CATALOGUE
SECURITY EDUCATION CATALOGUE i ii TABLE OF CONTENTS Introduction 2 Security Awareness Education 3 Security Awareness Course Catalogue 4 Security Awareness Course Builder 7 SAE Print Material 8 Secure Code
Threat Modeling. Deepak Manohar
Threat Modeling Deepak Manohar Outline Motivation Past Security Approaches Common problems with past security approaches Adversary s perspective Vs Defender s perspective Why defender s perspective? Threat
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
