A Comprehensive Security Assessment Toolkit for HealthCare Systems
|
|
|
- Maud Doyle
- 9 years ago
- Views:
Transcription
1 Colonial Academic Alliance Undergraduate Research Journal Volume 4 Article A Comprehensive Security Assessment Toolkit for HealthCare Systems Subrata Acharya Dr. Towson University, [email protected] Michael Terry Towson University, [email protected] Ogbeide Derrick Oigiagbe Towson University, [email protected] Follow this and additional works at: Recommended Citation Acharya, Subrata Dr.; Terry, Michael; and Oigiagbe, Ogbeide Derrick (2015) "A Comprehensive Security Assessment Toolkit for HealthCare Systems," Colonial Academic Alliance Undergraduate Research Journal: Vol. 4, Article 6. Available at: This Article is brought to you for free and open access by the Journals at W&M Publish. It has been accepted for inclusion in Colonial Academic Alliance Undergraduate Research Journal by an authorized administrator of W&M Publish. For more information, please contact [email protected].
2 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems 1. Introduction In the year 1996, The Health Insurance Portability and Accountability Act (HIPAA) established standards for how individually identifiable health information is received, maintained, and stored in electronic form for any given healthcare organization. In the year 2009, the Health Information Technology for Economic and Clinical Health (HITECH) Act also set standards, implementation specifications and other criteria for the maintenance of Electronic Health Records (EHR) [2]. At the time of HIPAA s creation, the healthcare industry was transitioning from a paper based information system to an electronic information system. Health records were being transformed into a digital format, and the industry began to rely heavily on the use of electronic systems to conduct business [3]. Prior to HIPAA, there were no security or privacy rules defined for the protection of a patient s electronic healthcare information. HIPAA created two important guidelines. The first rule, the Security Rule, warranted that entities (health plans, healthcare clearinghouses, healthcare providers who transmit any health information in electronic form) must ensure the confidentiality, integrity, and availability of all electronic protected health information (e-phi) they create, receive, maintain or transmit. This includes identifying and protecting against reasonably anticipated threats to the security (or integrity) of the information, and protecting against reasonably anticipated, impermissible uses or disclosure while ensuring compliance by their workforce [4]. The second element created, the Privacy Rule, assuring that the information maintained within one s electronic health records are kept secret while flowing from one healthcare entity to another. More specifically, if a patient s electronic health records are disclosed, the individually identifiable health information (i.e. a patient s past, present or future physical or mental health) should not be associated with the individual [5]. Despite these efforts by the federal government, a survey by the Ponemon Institute in found that there has been a severe lack of security countermeasures [6]. The Ponemon Institute found 60% of healthcare providers had severe critical security breaches in the past two years. Moreover, the average breach cost healthcare entities over $2 million each. The United States Department of Health and Human Services [7, 8] also discusses and identifies the increased trend of security breaches in this area. Furthermore, half of the healthcare entities that were interviewed revealed they had little faith in their information technology (IT) personnel to protect patient s data. This report suggests an alarming situation and needs immediate attention by the industry. Efforts to learn from other IT fields on how to provide security and privacy measures have proven that there is a lack of completeness in the tool sets available to the healthcare industry. Published by W&M Publish,
3 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Therefore, we aim to achieve four goals while developing our tool set: Comprehensiveness: The tool set needs to be comprehensive enough to scan the entire domain of an information system. It not only needs to detect misconfiguration on servers (i.e. database servers, web servers, servers, etc.) and network devices, and find missing patches on hosts, but it must also have the capability to detect vulnerabilities within new and upcoming services such as VOIP (e.g. eavesdropping) and virtual infrastructures (e.g. misconfigured virtual networks and virtual hosts). Automation: Any comprehensive assessments take time to complete, and if an IT professional has to do one manually, it can take substantial time to complete the task. Moreover, a manual, comprehensive assessment of a Healthcare Information System (HIS) can be long and tedious. IT professionals performing the assessment may skip steps in the assessment to save time and resources. By automating a comprehensive assessment, healthcare IT professionals will save time and resources. Likewise, they will be confident in their assessment results. Health IT Compliance: Our third objective is ensuring our derived assessment tool set will provide Health IT compliance in regards to The Security and The Privacy rule. Mitigation Strategies: Finally, we aim to achieve mitigation strategies with complete assessments. Our mitigation technique will differ from current techniques in that our strategy will be real-time and automated rather than offline and delayed. By integrating the above goals into our derived tool set, we aim to address the security and privacy concerns of healthcare entities and to restore faith in their electronic information systems. Hence to achieve the goals of this research we will do the following: We will survey commercial and open source tools in the areas of networks, databases, applications, and infrastructure security. We will then identify the best-fit open source tools to be integrated into a tool set. When the best-fit open source tools have been identified, we will then build the comprehensive, assessment tool set and modify it to meet federal compliance of security and privacy regulations in the healthcare industry. 2
4 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems After all the applications have been installed, we will write scripts to automate the vulnerability assessment and penetration test for a typical HIS. Finally, after the vulnerability and assessments have been completed, we will provide a real-time, automated analysis of the logs, and provide guidance on how to mitigate risk within the HIS. As the healthcare industry is rapidly moving towards electronic based information exchange, it has become mandatory for it to be compliant with the HIPAA, the HITECH Act, and other federal regulations and standards. This change towards electronic based information systems also requires the industry to maintain the privacy of patient information. Today s healthcare industry has experienced numerous instances of breach of information and the loss or compromise of critical patient data. According to the Ponemon Research Study, 92% of all healthcare institutions report they have experienced data breaches in recent years. If entities within this industry do not address this problem sufficiently, then it might lead to severe federal penalties along with patient privacy compromises and patient dissatisfaction. The remaining parts of this paper are split into eight more sections. First, we will discuss the research that is already being done in this field. Then we present our survey results from commercial vendors and open source organizations. In section four we will detail a risk assessment framework for the healthcare industry. Then we outline our evaluation environment and how we plan to evaluate our open source solution against a competitive commercial product. We will then present how our analysis and detection engine operates and how mitigation strategies are recommended. Finally, we will present the conclusion and future directions for this research. 2. Background Over the years there has been a considerable growth in the availability of automated vulnerability assessment solutions to assess an organization s information system. In fact, there are several solutions from commercial vendors that provide automated vulnerability and penetration testing software. Yet, none of these solutions offer industry specific compliance testing right out of the box. Most vendors require organizations to buy plug-ins in addition to their product to automate industry specific compliance testing. Published by W&M Publish,
5 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Even though the area of automated assessment is quite mature, there is still a dearth of automated approached for assessment. However, two most current open source vulnerability assessments do meet some of the goals of our research. Those tools are OpenVAS 4 [10] from the OpenVAS organization and Fast-Track [15] from Offensive Security Ltd. Relating OpenVas 4 to our research; we see that it has a comprehensive scanner used to inspect remote hosts and attempts to list all the vulnerabilities and common misconfigurations that affect the host. This tool can be used to comprehensively scan a network as well as server configurations. Yet OpenVas 4 is not fully automated and does not scan a HIS right out of the box. A healthcare IT professional must configure the scanner to scan a HIS for HIPAA compliance. If the scanner is configured correctly (to scan for HIPAA compliance), then the OpenVAS 4 tool will ensure a HIS is acting in accordance with the Privacy and Security Rules set forth by HIPAA. Additionally, it can be configured to list the vulnerabilities associated with each device/service that it scans, but the tool cannot provide any mitigation strategies for the vulnerabilities found. Likewise, the tool Fast-Track is an automated penetration suite designed to scan and penetrate databases, networks, infrastructures, and applications on an information system's domain. However, this tool s scanning capabilities is not as comprehensive as OpenVAS 4 it cannot scan wireless networks or VOIP infrastructures. Similar to OpenVas 4, the tool does not satisfy the Privacy and Security Rules defined by HIPAA. Additionally, Fast-Track does not list vulnerabilities detected or provide mitigation strategies after it has finished its assessment. There are numerous policy guidelines on how to keep healthcare entities HIPAA compliant, but there is a lack of implementation solutions (tool sets) on how to provide compliance in practice. Additionally, there is little work, if any, in using an automated assessment tool set for finding vulnerabilities in a typical HIS and provide mitigation strategies. 3. Survey of Tools In this section, we identify the tools and their capabilities in regards to assessing the four security areas of a HIS. These areas include Database Security, Network Security, Infrastructure Security, and Application Security. First, Database Security ensures that the designed tool set will be able to crawl, and/or use an SQL Injection attack on an EHR database to obtain information on patients (i.e. billing information, social security numbers, type of Healthcare insurance the patient has, etc.). The second area, Network Security means the tool set must be able to scan IP ranges of devices on a network and try to identify the operating system, manufacturer and model. Furthermore, it needs to provide the results from 4
6 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems the scanner(s) with minimal false positives, and offer exploits available from the scanner results. The third security area, Infrastructure Security implies that the tool set needs to deliver client side endpoint attacks to test the infrastructure (operating systems security and services reliability). Finally, for the fourth area, Application Security, the tool set must offer application testing in regards to endpoint attacks on applications (buffer overflows, cross site scripting attacks, etc.). Additionally, the derived tool set needs to be comprehensive enough to provide the capabilities for various types of assessments. The first assessment, External Network Vulnerability Assessment Testing, involves finding unknown vulnerabilities from outside a HIS s network through poor network design and backdoors. One should not be able to access private areas of the HIS from outside the network. If there is a vulnerability detected, the tools set will try to penetrate the network in order to prove data can be accessed. The second assessment, Internal Network Vulnerability: Assessment Testing deals with finding unknown vulnerabilities from inside a HIS s network. The tool set will assess the electronic assets (EHR database, application servers, file servers, web server, etc.) of the HIS, and if there is a vulnerability detected, the tool set will try to exploit the vulnerability in order to prove data can be accessed or a service can be degraded. The next assessment, Web Application Assessment Testing, ensures the tool set will test web applications by simulating attacks to gather information on their flaws and vulnerabilities. More specifically, the tool set will need to test for the following types of vulnerabilities (but not limited to): cross-site scripting, SQL injection, input validation, and buffer overflows. In the fourth assessment, Dial- In/RAS Security Testing, the task includes testing dial-in/remote access entry point connections that employees or healthcare partners use and identifying exploits that can be used against the system. In the following assessment, DMZ or Network Architecture Designs/Reviews, the tool set will verify data stores are not located publicly or in the DMZ. Furthermore, an adversary should not be able to bypass the firewall by piggybacking off a connection from a mail server located outside the internal network. Wireless Network Assessment Testing incorporates the capability for the tool set to be comprehensive enough to detect misconfigurations in wireless access points and exploit them if vulnerabilities arise. Additionally, if enough packets are analyzed, the tool set will try to crack the WEP and WPA-PSK keys. In Virtual Infrastructure Security Assessments we see the tool set identifying and mitigating virtual infrastructure risk by checking the configurations of virtual machines, networks, and storage mediums. For the next capability, Server Configuration Published by W&M Publish,
7 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Reviews, the tool set will review common network service misconfigurations, local password policies, file shares, and file share permissions. Firewall and Router Configuration Reviews ensures the tool set will check a HIS s network perimeter to ensure each firewall is properly configured in order to allow verified network traffic into the HIS's network. In addition, VPN Configuration Reviews will verify a VPN is configured correctly and there are no vulnerable entries into the network. A hacker should not be able to view sensitive information flowing from location to another. Finally, for Voice over IP Assessments, the tool set will be analyzing a HIS's network to see if it is vulnerable to the following vulnerabilities: SIP-based phone call on eavesdropping, and SIP-based phone call hijacking. The results from our commercial tools surveys are detailed in the table 1-1 and 1-2. Included in the table is how each vendor s solution s capabilities contribute to the goal of our research. In table 1-1, the commercial tools survey, we could infer that eeye Digital Security s Retina Enterprise Edition is the best choice. We found Core Impact Pro was not a vulnerability scanner, but rather an automated penetration tester solution that records successful and unsuccessful attacks and generates vulnerability reports based on those penetration tests. Therefore, Core Impact Pro may miss a vulnerability that a vulnerability scanner may be able to detect. In addition, we discovered Retina Enterprise Edition could also perform penetration attacks using a built in hacker module [9]. Moreover, Retina and Core Impact Pro could be configured to assess for HIPAA compliance (Security & Privacy Rules); however, each vendor charges extra fees to provide this functionality. As far as the other tools in this survey, we found that they were not as comprehensive as Retina or Core Impact Pro. WebInspect is geared strictly to finding vulnerabilities in web applications; Foreground Security did not offer any products, but rather vulnerability assessment and penetration testing services. As far as SAINT, information was rather scarce. We did not find as much information on SAINT as with Retina. Comparing the two solutions we were more confident with Retina's Enterprise solution. Additionally, Retina's solution was the highest rated network vulnerability assessment scanners in the industry. Furthermore, our results from the open source survey are listed in table
8 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems Tool Database Network Infrastructure Applications eeye Digital Network Scanner Database Web application Retina Enterprise Edition scanning scanning eeye Retina Network security scanner identifies known and zero day vulnerabilities to protect an organization s networked assets. The Retina Scanner supports security risk assessment and regulatory audits. External network vulnerability Assessment Internal network Assessments Wireless network assessments VOIP Assessments Network architecture Designs Firewall Configuration Reviews Server configuration reviews Virtual infrastructure security assessment HP WebInspect HP WebInspect performs Web application and Web service security testing and assessment of complex web applications. WebInspect also provides automated penetration tests. Core Impact Enterprise Edition An automated security testing and measurement solution that can be used to continuously assess the security of an organization s Web applications, networks, and client-side weaknesses. The product does not scan for potential vulnerabilities, monitor for incidents, or model threats. Instead it replicates realworld attacks against systems and data, using the same offensive techniques that hackers employ to find and exploit weaknesses and expose critical data. Nessus Tenable s Nessus is an agentless, active vulnerability scanner that performs vulnerability scanning and analysis (including Web application scanning, via a plug-in), as well as compliance checking, asset discovery and profiling, configuration auditing, and sensitive data discovery. Web application scanning Database penetration testing Database scanning External network penetration testing Internal network penetration testing Wireless network assessments VOIP Assessments Network architecture Designs External network vulnerability Assessment Internal network Assessments Wireless network assessments VOIP Assessments Network architecture Designs Firewall Configuration Reviews Server configuration reviews Virtual infrastructure security assessment Web application scanning Web Application Scanning Published by W&M Publish,
9 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Tool Database Network Infrastructure Applications Saint Enterprise Edition Database Server Web application penetration configuration penetration testing reviews testing A toolkit designed for vulnerability scanning, assessment, and validation on various targets including network devices, operating systems, databases, and desktop applications. The SAINT toolkit not only identifies vulnerabilities, but also ways to mitigate those vulnerabilities. In addition, the toolkit can exploit vulnerabilities to demonstrate the scope of damage done by vulnerability. External network vulnerability Assessment Internal network Assessments Wireless network assessments VOIP Assessments Network architecture Designs Table 1-1 Commercial Tools Survey Database Network Infrastructure Application Wapiti Wapiti is an open source and web-based tool that scans the web pages of the deployed web applications, looking for scripts and forms where it can inject data. It is built with Python and can detect: 1) File handling errors 2) Database, XSS, LDAP and CRLF injections. 3) Command execution detection. This tool can be used to scan the databases as well scan web applications for vulnerabilities. e.net/readme SQLMap SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL OpenVAS 4 OpenVAS Security Scanner is a security auditing tool made up of two parts: a scanner and a client. The scanner, openvassd is in charge of the attacks, while the client OpenVAS interfaces with the user. The scanner, the most critical part, inspects remote hosts and attempts to list all the vulnerabilities and common misconfigurations that affect the host. This tool can be used to scan the network as well as the server configurations (infrastructure) of an organizations health information system. Kismet Kismet is an layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw OpenVAS 4 OpenVAS 4 Wapiti 8
10 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems injection flaws and taking over of back-end database servers. It comes with a broad range of features, from database fingerprinting to fetching data from the DB and even accessing the underlying file system and executing OS commands via out-ofband connections. Needless to say this will aid in fingerprinting and exploiting a database. qlmap/trunk/sqlmap/ Wfuzz [19] Wfuzz is a tool for brute forcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforcing GET and POST parameters for different kinds of injections (SQL, XSS, LDAP, etc.), bruteforcing form parameters (user/password), fuzzing, and more. p/wfuzz/downloads/list monitoring (rfmon) mode, and (with appropriate hardware) can sniff b, a, g, and n traffic. Kismet also supports plugins which allow sniffing other media. et/download.shtml Aircrack Aircrack is a suite of tools for a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. The suite comprises over a dozen discrete tools, including airodump (an packet capture program), aireplay (an packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). Wfuzz Published by W&M Publish,
11 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 MSSQL Brutter (Fast- Track) MSSQL Bruter is a Fast-track tool that tries to identify SQL servers with weak "sa" passwords in order to inject payloads into the system. The tool implements this task by brute forcing the SQL server password. e- security.com/metas ploitunleashed/mssql_b ruter UCSniff UCSniff is a VoIP & IP Video Security Assessment tool that integrates existing open source software into several useful features, allowing VoIP and IP Video owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. UCSniff supports Arp poisoning, VLAN Hopping, VLAN Discovery via CDP, it has a sniffer capabilities and more. UCSniff can operate in 2 modes: 1) Monitor mode Should be used on a shared media where the IP phones connected to i.e. a HUB, wireless access point, it can be also be used in a switched environment by setting up a SPAN sessions on a Cisco switch. 2) Man in the middle mode This mode has 2 additional modes which are Learning Mode Targeted Mode s/ucsniff/files/ Skipfish [20] Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully nondisruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments. Source: pfish/ SQL Pawnage (Fast- Track) Scans SQL web applications for vulnerabilities. Source: nsivesecurity.com/metasploit -unleashed/ MSSQL Injection (Fast-Track) A tool that uses SQL techniques in order to ultimately gain full unrestricted access to the underlying system. curity.com/metasploitunleashed/ SQL Pawnage Table 1-2 Open Source Tools Survey 10
12 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems From the open source survey table above, we can infer the best choice tools for the open source toolkit would be: OpenVas 4: A vulnerability analysis tool that can scan multiple targets concurrently with its supported 20,000 vulnerability test. In addition, the tool consolidates many tools into its scanner (i.e. Nikto, Nmap, and w3af), expanding its reporting capabilities. [10] Kismet: A wireless network detector, sniffer, and intrusion detection system that can sniff b, a, g, and n traffic. Kismet works by passively collecting packets; which can lead to detecting hidden networks over time. [11] Aircrack: A tool designed to assess the security of a wireless network using various WEP and WPA cracking algorithms. Once this tool has captured enough packets from a wireless network, it can begin analyzing those packets and try to break the wireless network s encryption methods [12]. UCSniff: An application to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. This tool was developed for current and next generation VOIP infrastructures, so it will aid healthcare entities keep their HIS HIPAA compliant. [13] SQLMAP: A tool designed to automate the process of detecting and exploiting SQL injection flaws and taking over database servers. Not only can the tool fingerprint databases and fetch data from them, but it can also be used to execute command on the operating system. [14] Fast-Track: An automated penetration suite designed to scan and penetrate databases, networks, infrastructure, and applications of an information system's network. Some of its various tools include the Nmap scripting engine, SQL Pawnage, and MSSQL injection. [15] Wapiti: A tool designed to audit the security of web applications through 'black-box' scans looking for scripts and forms where it can inject data. Some of its capabilities include Cross Site Scripting injection, LDAP injections, and file handling errors. [16] Published by W&M Publish,
13 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 These tools working cohesively, in a toolkit, will address the concerns of developing a toolkit that will be comprehensive enough to ensure a Health Information System (HIS) stays HIPAA compliant. 4. Risk Assessment Framework The purpose of this section is to offer a framework for describing how the assessment engine (the derrived tool set) interacts with our data set (a replica healthcare information system). Figure 1: Risk Assessment Framework for a HIS The framework is illustrated in figure 1. After the assessment engines have received data from the HIS components, it pipes their data to the master assessment engine. Here at the master assessment engine, an analysis and detection engine analyzes the data to detect anomalies and vulnerabilities within the HIS. Once the analysis is complete and there are vulnerabilities detected, it will send its analysis to the mitigation engine. The mitigation engine then develops mitigation strategies from the analysis and sends its recommendations 12
14 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems back to the assessment engine. Finally, the assessment engine presents assessments to the user in the form of reports. 5. Experimental Setup The environment we chose to implement our open source tool set was Backtrack 5 configured as a Virtual Machine (VM). We chose this environment simply because six of the seven tools were already installed in this Linux operating system. Once we configured the VM, we installed Nessus HomeFeed (version 5). In this way any custom scan polices will serve as the baseline for testing our open source solution. Afterwards, when we completed and tested our open source tool set, we could then compare the results with the Nessus Homefeed results. Additionally, to develop the open source tool set, we subdivided the HIS domain into 4 areas. The tool set focuses on the 1) network, 2) databases, 3) applications, and 4) infrastructure of a HIS. Figure 2: Assessment Engine In the following 4 subsections, the paper discusses how each open source tool surveyed will enable the derived toolkit to achieve its objective. Together, these tools integrated into a toolkit have the potential to provide comprehensive, automated assessments for any healthcare organization. Network: In order to ensure the toolkit was comprehensive enough to provide detailed network assessments, four tools were selected to determine the Published by W&M Publish,
15 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 associated risk of exploitation to a HIS s network. The first tool, OpenVAS 4, is a network scanner that audits network host and list the vulnerabilities and common misconfigurations that affect the host. The second tool Kismet, is a tool that was selected based on its capabilities to detect and sniff out wireless networks. However, the tool did not provide Wireless network penetration testing; Therefore, Aircrack was needed to deliver WEP and WPA penetration testing. Lastly, the toolkit needed to test for unauthorized VOIP eavesdropping. To provide this type of assessment, UCSniff was preferred as it can quickly test for unauthorized VOIP eavesdropping. Database: To assess the security of a HIS s database, two tools were chosen, SQLMap and Fast-Track. Both tools provide penetration testing against databases. However, each tool excelled at one area of database scanning and penetration testing whereas the other tool excelled in another area of database scanning and penetration testing. First, SQLMAP excels at fingerprinting a database, a feature that Fast-Track lacks. The tool can also be a means of taking over back-end database servers and even access the underlying OS. On the other hand, Fast-track is an automated penetration suite that uses Metasploit to enhance its library of attacks against a given database. By pipelining the fingerprinting results of SQLMap into Fast-Track, we can fully assess the security of a database. Applications: The tool chosen to scan for web applications within a HIS was Wapiti. This tool was chosen because it is able to detect the most vulnerability (i.e. Cross-Site Scripting, LDAP injection) and act like a fuzzer to inject payloads to see if scripts within web applications are vulnerable. Infrastructure: To assess the configuration reviews of the servers and desktop host on a HIS, there was only one open source option available - OpenVAS 4. Using server configuration reviews from the scan, we can pipeline the results into Fast-Track and create automated penetration test against a HIS. Figure 2 illustrates the synergy of the tools chosen to be integrated into the tool set. Together, these tools make up the framework for the assessment engine. As one can see, the tools within the tool set are in constant communication with the apparatuses of the HIS. If the assessment engine detects malicious activity within the HIS, it will signal the apparatus of the HIS to send data back to it at shorter time intervals. 14
16 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems 6. Evaluation and Inferences Dataset: As hinted throughout this paper, our data set will consist of electronic health data. The data is both real world and emulated data set from Google health data. Figure 3: Google Health Record Published by W&M Publish,
17 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Generally speaking, a personal health record contains physical and/or mental information about a patient. To illustrate an electronic personal health record, figure 3 is a sample electronic Google personal health record from Google s healthcare service [17]. This service allowed individuals to create a profile derived from their individual health records so that they can see the risk and benefits of the current treatment they are receiving. In this record, we see individual identifiable information such as the patient s name, date of birth, ethnicity, and blood type (information that needs to be protected in order to prevent unlawful disclosures). In addition, there are five additional fields (along with their attributes) within the record. The first field, the Wellness field, contains the patient s height and weight. The second field, the Problems field, holds information related to illnesses the patient has been diagnosed with to date. The third field, the Allergies field, lists the patient s allergies. The next field, the Procedures field, details the procedures the patient has undergone. Finally, the last field, the Immunizations field, lists the immunizations the patient has received. By the same token, we will test our data on real world electronic health record data from a HIMMS healthcare organization. In addition to EHRs, the other major data set used in our research will be the firewall. More specifically, the configuration of the firewall is important because it is the first line of defense against hackers. To clarify, the firewall sits between the Internet and internal healthcare information system, and its main job is to filter connections based on policies set by the administrators. If a connection is allowed by the policy, the firewall will allow the connection into the internal HIS, If not (because of security reasons), then the firewall will drop the connection. Figure 4 illustrates a firewall policy created by an IT professional. In general, a firewall policy rule works by analyzing the source of an incoming connection, the destination of the incoming connection, and the type of service running on that connection. Once the firewall has this information, it checks the information against the rules set forth by the administrator. If the connection meets the requirements, then it is allowed into the firewall. If not, then the connection is denied. As an example, we can take a look at the first row of the firewall configuration policy illustration. The host is allowed to make a samba connection to host Likewise, the firewall uses this same process to deny connections. 16
18 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems Source Destination Protocol Action Samba Allow Ssh Allow ldap Deny dns Allow ntp Deny Figure 4: Firewall Configuration Policy Results: Real world HIMSS 6 Healthcare Dataset: Our results are based on emulated assessments of a HIS network and an EHR database. More specifically, The EHR database we are assessing contains 20,000 electronic medical records (EMR) from the HIMMS 6 Healthcare practice. 102% 100% 98% 96% 94% 92% 90% 88% 92% 100% 95% 97% Security Rule Vulnerabilities Detected HIMMS 6 EMR Assessment Results 95% 100% 99% 98% Privacy Rule Vulnerabilities Detected Figure 5: HIMMS 7 EMR Assessment Assessment 1 Assessment 2 Assessment 3 Assessment 4 Once we finished assessing the network and EMR database, we divided our results into two categories: privacy vulnerabilities and security vulnerabilities. Then we compared the vulnerabilities detected by the derived tool set against the actual number of vulnerabilities in the HIS. For example, there are five actual vulnerabilities in a HIS we are assessing. Our tool set only detected four vulnerabilities; therefore, our tool set was 80% effective. If the tool set detected all five then it is 100% effective. If the tool set detected all five vulnerabilities plus one, then the tool set detected a false positive. In this case, we will disregard all false positives since our results only reflect true positives. In Figure 5, we see Published by W&M Publish,
19 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 the HIMMS 6 EMR assessment. There were a total of four assessments to detect vulnerabilities against the Privacy Rule, and four assessments to assess the vulnerabilities against the Security Rule. Once we completed the four assessments within each category, we calculated the averages to find the success rate of the tool set. The average success rate for detecting security vulnerabilities against the EMR database was 96%. The average success rate for detecting privacy vulnerabilities against the EMR database was 98%. In Figure 6, we present our HIMMS 6 network assessment results. The average success rate of security vulnerabilities detected by the tool set was 98.75%. In addition, the average percentage of privacy vulnerabilities detected by the tool set was 98.50%. HIMMS 6 Network Assesment Results 101% 100% 100% 99% 99% 98% 98% 97% 97% 96% 96% 100% 100% 98% 97% Security Rule Vulnerabilities Detected 97% 99% 100% 98% Privacy Rule Vulnerabilities Detected Assessment 1 Assessment 2 Assessment 3 Assessment 4 Figure 6: HIMMS 7 Network Assessment Results: Emulated Google Health Dataset: Our results are based on assessments of a D-Link DIR-655 Xtreme N Gigabit Router (IP address ), and an ASP.NET web application database (IP address ). More specifically, the database records we are assessing contain sample information about movies. Additionally, once we finished assessing the network and database, we compared our results to the Nessus baseline scans. We found the baseline scans for the D-link router (IP address ) found 2 vulnerabilities rated high risk on UDP port 2003, one vulnerability rated medium risk on UDP port 53, and 23 vulnerabilities rated as low risk. The derived assessment scan detected one high risk vulnerability, one medium risk, and 12 vulnerabilities rated low risk. Analyzing and comparing these results, we see the toolkit did not detect the two high risk vulnerabilities 18
20 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems found in the baseline scans, but it did detect a high risk vulnerability related to SMNP Agent responding to community names, and one medium risk vulnerability related to denial of service attacks against TCP services. However, the medium risk vulnerability detected by the derived toolkit was not the same medium risk vulnerability detected by the baseline assessment. For the host (IP ) running the ASP.NET application, we found that the results were very interesting. The baseline assessment detected three medium risk vulnerabilities. When we examine the medium risk vulnerabilities further, we find two medium risk vulnerabilities are associated with the web server certificate being a self-signed certificate. The X.509 certificate should be signed from a known trusted public authority. This becomes a concern if the web server was actually placed on the Internet, then an attacker could initiate a man in the middle attack by breaking the chain of certificates on the server. The other medium risk vulnerability found was due to SMB signaling being disabled. This vulnerability could be exploited through a man-in-the-middle attack against the SMB server. In comparison, the derived assessment toolkit did not detect the three vulnerabilities the baseline assessment scan detected. The toolkit found two high risk vulnerabilities in the ASP.NET web application. One high risk vulnerability detected was because of a SQL 5.x Unspecified Buffer overflow vulnerability. This was due to the fact that the ASP.NET application did not perform boundary checks on user supplied data. According to the data logs, failed exploits can cause a denial of service on the database. The second high risk vulnerability found was for a MySQL Multiple Vulnerabilities vulnerability. This could be the direct result of the buffer overflow detected by the other high risk. As one can see the two assessments contrast greatly. Upon further research, we found that the baseline assessment software needs a plugin license to detect vulnerabilities within databases. The detailed screenshots are in Appendix A. 7. Log Analysis and Mitigating Strategies Log Analysis Detection: Because of the ever changing environment electronic information systems are being utilized in, continuous assessments and adjustments are needed to keep those systems secured and compliant with regulatory laws. This is very true in terms of healthcare information systems. In order to provide mitigation to the vulnerabilities found during scans, we will conduct a review of the logs recorded during assessments. For this we will use four techniques to review the logs. Published by W&M Publish,
21 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Knowledge based: A technique where the log assessment engine will be conducting an analysis on the tool set assessment data by comparing it to a stored knowledge base (a file containing the baseline assessment scans of a HIS undergoing HIPAA compliance testing) within its engine. It will then send its analysis to the mitigation engine for recommendations. Anomaly based: A technique that involves comparing the results from the tool set assessment data with previously recorded assessment data of the HIS. From this comparison, this analysis will detect anomalies (e.g. a host is scanning the network searching for vulnerable host, a host is scanning ports of other host to find what services are running on them, host attacking another host) found within the HIS and send its analysis to the mitigation engine. From these analyses the mitigation engine will provide a means to mitigate the vulnerabilities found. Reputation based: This technique involves analyzing the behavior of each component of an HIS to determine the trustworthiness within the domain of the HIS. To determine the trustworthiness of a host, the analysis and detection engine will form its own opinion about the host in question, and incorporate how other host s view it s trustworthiness to form a selected host s reputation. Hybrid Based The hybrid technique embraces the previous three techniques processes for forming analysis on a host. Once it has finished its analysis, it sends the analysis to the mitigation engine. Because of this technique s complexity, it requires more time and resources then the previous techniques. Mitigating Strategies To illustrate how mitigation strategies work, we will use the example of an unencrypted database found within a HIS by our tool set. In this scenario, the analysis and detection engine has reviewed the logs and discovered the tool set 1) successfully exploited a database containing EHRs, and 2) the toolkit can search through the database without limitations. Since the EHRs on the database are unencrypted, any hacker would be able to exploit the data. The analysis and detection assessment engine would identify this vulnerability and send its analysis to the mitigation engine. The mitigation engine would then recommend using a data encryption solution such that even though the hacker is able to gain access to the data, it is not able to view the encrypted information without possessing the correct decryption keys. One such encryption solution is the open source framework Charm-Crypto [18]. Charm is a framework for rapidly prototyping advanced cryptosystems. Its library includes public key encryption schemes, 20
22 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems identity-based encryption schemes, attribute-based encryption schemes, digital signatures, privacy-preserving signatures, commitment schemes, zero-knowledge proofs, and interactive protocols such as anonymous credential and oblivious transfer schemes. To conclude, once the tool set has assessed a HIS, we can begin to provide solutions to mitigate the vulnerabilities. We reviewed the logs, and provided mitigation strategies to address the high and medium risk vulnerabilities that we detected. Our mitigation strategies were based on recommendation from online sources such as us-cert.gov, and owasp.org. First, examining the router of the network (IP address ), the 2 high risk vulnerabilities associated with the D-link daemon, it is recommended that one implement authentication methods to mitigate the Click n Connect daemon to disallow attackers from gaining control of server functions via the D- link Daemon. Secondly, for the 1 medium risk vulnerability found on the router from DNS snooping attacks on the router, we recommend re-configuring of the DNS to stop this kind of snooping activity. When we took a look at the 1 medium risk from the derived assessment toolkit results, the TCP Sequence Number Approximation Reset Denial of Service Vulnerability, we found that it is recommended that one either implement IPSec (IP Security) to encrypt traffic and obscure TCP information available to the attacker, implement ingress and egress filtering to expected addresses, or implement TCP MD5 signature option to verify and checksum TCP packet carrying BGP data. Finally, regarding the host hosting the ASP.NET application, the 2 high risk vulnerabilities (buffer overflow), we recommend implementing Integrating boundary checking in the test application. 8. Conclusions and Future Research Directions In conclusion, our research achieves the task of fully assessing a healthcare information system domain. We accomplished this by first comprehensively assessing the databases, networks, applications, and infrastructure within the HIS domain, and then automating the comprehensiveness assessments to ensure time and resource efficiency. Furthermore, automating the comprehensive assessment ensures no steps would be skipped and that the assessment of the HIS is HIPAA compliant. Finally, in order for a healthcare entity to maintain its HIPAA compliance, we see the mitigation engine recommending solutions based on the data it receives from the analysis and detection engine. Our research was useful in that it exposed the issues facing the healthcare industry not widely publicized and makes us think about the entirety of the information healthcare entities possess that are not entirely secure within their domain. As future research we would like to test our proposed toolkit on different real world data sets. Additionally, one can use different EHR formats to test the assessment engine against. Also, we Published by W&M Publish,
23 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 would like to develop additional mitigation strategies to ensure security of EHRs in storage, access and transmission. These efforts will in turn enable the maintenance of compliance in the HIS. References [1] HIMSS Stage 6 Organization, retrieved from [2] HITECH Act Enforcement Interim Final Rule, retrieved from cementifr.html. [3] Understanding Health Information Privacy, retrieved from [4] HIPAA Security Rule, retrieved from ance.html. [5] HIPAA Privacy Rule, retrieved from [6] Ponemon Institute Study, retrieved from [7] The United States Department of Health and Human Services Breach Notification Rule, htool.html [8] FDA Safety Communication: Cybersecurity for Medical Devices and Hospital Networks, [9] Retina network, retrieved from [10] OpenVAS, retrieved from
24 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems [11] What is Kismet, retrieved from [12]What is aircrack-ng? retrieved from [13] UCSniff, retrieved from [14] SQLMAP: Automatic injection and database takeover tool, retrieved from [15] Offensive Security Ltd., Fast-Track, retrieved from [16] Wapiti: Web application vulnerability scanner/security auditor, 2006, retrieved from [17] Google Health Records, retrieved from [18] A. J. Akinyele, G. Belvin, C. Garman, M. Pagano, M. Rushanan, P. Martin and M. Green, Charm: A tool for rapid cryptographic prototyping, retrieved from [19] Wfuzz - The web bruteforcer, 2008, retrieved from [20] Skipfish: Web application security scanner, retrieved from Published by W&M Publish,
25 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Appendix A Appendix Figure 1: Configuring the Database Assessment Scanner Appendix Figure 2: Configuring the Infrastructure Scans 24
26 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems Appendix Figure 3: Configuring the Network Scans Appendix Figure 4: Configuring the Web Application Scans Published by W&M Publish,
27 Colonial Academic Alliance Undergraduate Research Journal, Vol. 4 [2015], Art. 6 Appendix Figure 5: Baseline Assessment of Appendix Figure 6: Overview Baseline Assessment of Appendix Figure 7: Toolkit Assessment Results of
28 Acharya et al.: A Comprehensive Security Assessment Toolkit for HealthCare Systems Appendix Figure 8: Overview Baseline Assessment of Appendix Figure 9: Toolkit Assessment Results of (High Risk Vulnerabilities) Published by W&M Publish,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
June 2014 WMLUG Meeting Kali Linux
June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014
1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)
CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG) Extending automated penetration testing to develop an intelligent and cost-efficient security strategy for enterprise-scale information systems CAG
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
External Network Penetration Test Report
External Network Penetration Test Report Jared Doe [email protected] C O N F I D E N T I A L P a g e 2 Document Information Assessment Information Assessor Kirit Gupta [email protected]
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Demystifying Penetration Testing
Demystifying Penetration Testing Prepared by Debasis Mohanty www.hackingspirits.com E-Mail: [email protected] Goals Of This Presentation An overview of how Vulnerability Assessment (VA) & Penetration
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
!!!!!!!!!!!!!!!!!!!!!!
Infrastructure Security Assessment Methodology January 2014 RSPS01 Version 2.1 RandomStorm - Security Assessment Methodology - RSPS01 Version 2.1-2014 - Page 1 Document Details Any enquires relating to
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
