Recommended Practice Case Study: Cross-Site Scripting. February 2007
|
|
|
- Angel Pierce
- 9 years ago
- Views:
Transcription
1 Recommended Practice Case Study: Cross-Site Scripting February 2007
2 iii
3 ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber security. The author team consisted of representatives from the Department of Energy, Idaho National Laboratory. For additional information or comments please send inquires to the Control Systems Security Program at iii
4 ABSTRACT This paper is intended to support and encourage application of recommended practices for control systems security. It describes the details of an information security attack, known as cross-site scripting, that could be used against control systems and explains practices to mitigate this threat. Additional information and resources regarding recommended practices, defense in depth, and other control systems security issues are found on the Control Systems Security Program Recommended Practices Web site, Cross-site scripting presents one entry point for attackers to access and manipulate control systems networks. It takes advantage of Web servers that return dynamically generated Web pages or allow users to post viewable content in order to execute arbitrary HTML and active content such as JavaScript, ActiveX, and VBScript on a remote machine browsing the site within the context of a client-server session. This potentially allows the attacker to redirect the Web page to a malicious location, hijack the client-server session, engage in network reconnaissance, and plant backdoor programs. iv
5 CONTENTS ACKNOWLEDGEMENT...iii ABSTRACT... iv Recommended Practice Case Study: Cross-Site Scripting INTRODUCTION Aims and Objectives Key Terminology Control Systems Recommended Practice Other Definitions CROSS-SITE SCRIPTING OVERVIEW Differences between Control Systems Security and Information Technology Security for Cross-Site Scripting ATTACK SCENARIO MITIGATIONS Control systems Internet access policy Overview Objective Discussion Control systems user awareness and training Overview Objective Discussion Coordination of security efforts between corporate IT network and control systems network Overview Objective Discussion Firewall between the control system network and the information technology network Overview Objective Discussion Up-to-date patches Overview Objective... 9
6 4.5.3 Discussion Web browser and security Overview Objective Discussion Secure code Overview Objective Discussion Conclusion
7 Recommended Practice Case Study: Cross-Site Scripting 1. INTRODUCTION Recent trends in information systems security show a significant increase in Cross-Site Scripting (XSS) vulnerabilities. Due to the convergence of control systems technology and information systems technology, a determined attacker could use knowledge of XSS vulnerabilities to access a control system network. XSS involves the posting of malicious Web programming instructions to a Web-accessible location contrary to the intentions of location owners. These instructions take advantage of functionality built into Web browsers or other scriptable applications (such as applications), which view a site or handle Internet navigation causing script execution when the Web site hosting the malicious content is viewed or the malicious link is clicked. XSS can be simple to carry out; however, a successful effort to attack a control system using this vector would require time and effort in accordance with the skill and motivation of the attacker. The recommendations provided in this document not only mitigate threats of XSS, but also bolster protection against other Web-based attacks such phishing, cross-site request forgery, Trojans, and worms. 1.1 Aims and Objectives The aim of this document is to provide recommended practice principles for control systems security. Specifically, this document: Defines and describes XSS Compares the way in which XSS affects control system security and information systems security related to XSS Provides an example of how XSS could be used to attack a control system Identifies mitigation techniques to secure control systems against XSS Control Systems 1.2 Key Terminology Throughout this document the term control system is used as a generic term to cover all process control, Supervisory Control and Data Acquisition (SCADA), industrial automation, and related safety and monitoring systems Recommended Practice Recommended practice, in the context of this document, is defined as the best of industry practices such as strategies, activities, or approaches, which have been shown to be effective through research, implementation, and evaluation. The recommended practices summarized in this document are intended to be considered only as guidelines. It may not be possible to implement all of these principles for some control systems environments. Where this is the case, asset owners are encouraged to work with control 3
8 system vendors, industry information sharing and analysis centers (ISACS), and user groups to identify and implement alternative, yet effective safeguards Other Definitions Active content Cookie Mitigate Scripting Session Vector Web programming that runs on the client machine Characters passed between a client and server to track a session To diminish potential consequences Lightweight programming language suitable for Web programming The period of time in which a user is visiting or using a particular Web site Path or method of attack 2. CROSS-SITE SCRIPTING OVERVIEW XSS is a computer security attack that uses third-party Web resources to run script within the victim s Web browser or scriptable application. This occurs when a browser visits a malicious Web site or clicks a malicious link. The consequences of an XSS attack begin with access to the cookie passed between the victim and the Web server. This allows an attacker to impersonate the victim to the Web site, and is known as session hijacking. The most dangerous consequences occur when XSS is used to exploit additional vulnerabilities. These vulnerabilities may permit an attacker to not only steal cookies, but also log key strokes, capture screen shots, discover and collect network information, and remotely access and control the victim s machine. Any Web site or application that employs user input to generate Web pages may be vulnerable to XSS. These vulnerabilities will become more serious if an attacker can gain the assistance (knowing or unknowing) of an insider. In addition, attackers using XSS may gather information about potential victims prior to an attack and use to target them directly. 2.1 Differences between Control Systems Security and Information Technology Security for Cross-Site Scripting Table 1. Comparison of XSS attacks on information systems and control systems. Information System (IS) Control System (CS) Likelihood of extra/intraorganizational communication IS resources are used for accessing many accounts external to the organization. Also, external parties are likely to access accounts within the organization. Browser-based human-machine interface (HMI) from any Web-accessible location for control, monitoring, maintenance, and support is common in CS networks. 4
9 Possible consequences of successful attack Value of session hijacking Unauthorized access to and modification of data on the IS. Dissatisfied customers. Compromised accounts. Infected node on network that could be used to carry out additional attacks. Depends on the context of the hijacked session. High value information could be accessed through sessions going into and out of the IS network. Unauthorized access to and modification of data regarding processes. Possibility to control process and affect those whom the process serves. Depends on the context of the hijacked session. Hijacking a session into the CS network would be very valuable. Some accounts storing valuable information may be accessed from the CS network. 3. ATTACK SCENARIO The following is a simplified description of how an attacker might carry out an XSS attack against a control system. It is not intended to single out any vendor or product, but is merely demonstrative of possible points of attack. 1. An attacker discovers or learns of a vulnerability in a widely-used Web site utility; for example, software that is used to manage Web discussion forums The attacker crafts a suitable exploit. This involves choosing the HTML and script the attacker wants to run in the victim s browser. The attacker writes a script that exploits one of numerous known Web browser vulnerabilities. 2, 3, 4 This allows installation of a Trojan keylogger with backdoor functionality. 3. The attacker identifies online SCADA discussion forums using the vulnerable software. A simple Web search, +scada, returns 906 hits. Another search, &lr=&as_qdr=all&q=%22powered+by+phpbb%22+scada, returns 22,500 hits. 4. The attacker sorts through the likely forums to find a bulletin board that is not up-to-date on patching. The attacker establishes a membership and posts the malicious message crafted previously to a discussion topic that is generating a lot of traffic and waits. 5. Probable attack paths are shown in Figure 1. Some victims, perhaps SCADA engineers or operations staff read the poisoned posting. To some, nothing happens because scripting is disabled in their browsers. The vast majority of the browsers, however, succumb to the XSS portion of the attack. This gives the attacker access to the cookies exchanged between the browsers and the server hosting the discussion. The cookies alone may be valuable; they allow the attacker to impersonate 1. Mitre, Search Results, mitre.org/cgi-bin/cvekey.cgi?keyword=cross-site+scripting, published July 20, 2006, Web page visited July 20, Secunia, Microsoft Internet Explorer 6.x, published 2006, Web page visited July 20, US-CERT, Internet Explorer Update to Disable ADODB.Stream ActiveX Control, html, published July 02, 2004, Web page visited July 20, US-CERT, Microsoft Windows and Internet Explorer Vulnerabilities, html, published April 11, 2006, Web page visited July 20,
10 other users on the discussion board. If the attacker is clever, they might use the newly obtained false identity to communicate with other users in attempts to gain more information about their systems. With the victim s cookies, the server believes the attacker is the legitimate user, and allows the attacker to change the victim s password, which permits the attacker to log back in later. Moreover, there is always a chance the site keeps password information in the cookies (although this is not a best practice). If it does, the attacker might assume the victim uses the same password for multiple applications. This password could come in useful for the attacker later. 6. Some of the browsers viewing the poisoned post are not up to date with patches. The exploit written by the attacker takes advantage of this oversight to execute additional instructions of the attacker s choice. Compromised machines contact the attacker s server and download the Trojan. Now the attacker can watch everything that happens on the infected machines, and issue commands to them. Figure 1: Communications pathways. 6
11 4.1.1 Overview 4. MITIGATIONS 4.1 Control systems Internet access policy A written policy must expressly prohibit individuals and machines from accessing the Internet from the control system network Objective A written policy is intended to form the basis for both user behavior and technical configuration Discussion Policy represents a conscious decision to manage risk. If either the technical or the people countermeasures were to fail, the other would help to prevent the success of possible attacks. In the attack scenario above, the victim came to the exploit. A policy prohibiting this action would limit the direct effects of this attack on the control system. This mitigation prohibiting Internet access does not preclude access to appropriate remote locations (such as remote historian databases) over a secure connection through the Internet (i.e., VPN) Overview 4.2 Control systems user awareness and training Control system user awareness and training involves ensuring users understand that their actions could adversely affect the system, and that they must know, understand, and follow established policies and recommended practices in order to protect it Objective By assuring user awareness of the XSS threat and training them on security policy, users will be more likely to avoid threat propagation Discussion Awareness is a fundamental countermeasure of information security. Due to the convergence of control systems technology and information systems technology, many control systems operators may not be familiar with the security aspects of IT relating to control systems such as viruses, worms, Trojans, and social engineering. By training operators and making them aware of the threats they face and the defensive behaviors they must exhibit to mitigate those threats, users view themselves as active participants in securing their systems. Awareness and training may include readings, videos, presentations, briefings, brown-bags, and many other forms. In the attack scenario described above, an aware operator would not have accessed the Internet from the control system network. At the same time, an aware administrator would have had technical countermeasures (such as those addressed below) in place to prohibit Internet access from the control system. 7
12 4.3 Coordination of security efforts between corporate IT network and control systems network Overview Because control systems security depends in part on the security of the IT network, and responsibilities for IT security and control systems security are often separate, these two groups must work together to ensure security of the protected processes Objective Eliminate ambiguity, misunderstanding, and the vulnerabilities that exist as a result of divergent security responsibilities between information systems and control systems Discussion Coordination requires that those responsible for the security of each system gain an understanding of the risk faced by both systems. It includes an accepted scope of responsibility and dialogue about policies and resources that cross system boundaries. Examples of these issues include policies, configurations, and procurement specifications for firewalls, IDSs, Web servers, and machines that access control system information. 4.4 Firewall between the control system network and the information technology network Overview A firewall should be configured to allow only specific communications between the IT network (corporate LAN) and the control systems network. The firewall should provide Network Address Translation (NAT) or proxy capability Objective The reasoning for the tight firewall policy between these two networks is to prohibit computers on the control systems network with browser capability from accessing the Internet, even if that capability is enabled as it must be for some HMI implementations. The firewall should provide NAT so that in case a computer on the corporate LAN is compromised, that machine, under the control of an attacker, is limited in its ability to reconnoiter information about the control system network Discussion The firewall should be configured to prohibit outbound traffic to all destination addresses and ports not on a white list, which is a list of cleared or authorized network addresses and ports. Additionally, the firewall should be configured to prohibit all traffic entering the control system network except for whitelisted addresses and ports. With these rules in place, a computer on the corporate network that has been compromised via XSS (or any other means) will not be able to access the control system unless it has specifically been given that privilege. The white list needs to be kept current and the implementation managed with independent audits performed periodically. 8
13 The purpose of network address translation (or proxies) is to hide internal control system network details, such as addresses from the external environment. Hence, a computer on the corporate network will not be able to gather information about the control system network to aid in further attack Overview 4.5 Up-to-date patches After proper testing, appropriate patches should promptly be applied to browsers, readers, operating systems, and any applications known to be susceptible to attack on both the information system and control system networks Objective Appropriate patches or work-arounds for security vulnerabilities should be applied to prevent attackers from using these vulnerabilities in combination with XSS in order to craft full-compromise exploits Discussion An attacker could use XSS in combination with other vulnerabilities in hopes of gaining complete control of a targeted resource on either the IT or control system. To prevent this, patches and workarounds for all vulnerabilities should be considered and patch decisions made in accordance with vendor advice and organizational risk management policies. Applying patches to control systems without testing and approval by the control system vendor and/or on a test system could degrade system performance and even shut down the system, potentially altering the controlled processes. Applying up-to-date patches on the corporate LAN decreases the possibility of full compromise to machines that could be used as a foothold for attacks against the control system network Overview 4.6 Web browser and security Web browser security ranges from tightening security settings on Web browsers by disabling scripting and other forms of active content (such as ActiveX) to totally remove browser functionality. These changes should be made to control system machines or machines that access control systems where these settings and software are not needed. security includes turning off images and removing applications from the control system in which they are not necessary Objective The objective of this mitigation technique is to incapacitate the functionality on which XSS relies to propagate Discussion Cross-site scripting (and numerous other types of attacks such as Trojans, worms, viruses, and cross-site request forgery) rely on active content that can make the victim s computer perform tasks without the user s knowledge. Similarly, XSS attacks in the form of malicious URLs are often delivered via to the victim. By disabling active content and removing access to one vector through which XSS is spread ( ), the likelihood of a successful XSS attack on a control system is reduced. 9
14 Browsers on the IT network are typically allowed to run active content because of the functionality it provides many Web sites do not work correctly without it. As a result, when computers outside the control system firewall must use active content to access the control system network, administrators should consider dedicating those computers solely to control system access (disallowing access to the Internet from that machine). This practice would have prevented the attack in the scenario above from exploiting a control system computer. Another option is to disable client-side scripting (such as JavaScript), but leave ActiveX controls enabled. This may or may not be acceptable, depending on whether the control system browser relies on client-side scripting. This option also provides a greater level of risk when compared to disabling all unnecessary active content (i.e., JavaScript and ActiveX). This precaution would also have mitigated the attack described above for machines on the corporate and control systems networks. It should be remembered that many control systems rely on numerous ActiveX components to operate. Hence, testing should occur to assure that disabling of ActiveX components does not impact control system functionality. Following results of successful testing, ActiveX should be disabled in all browsers within the control system network that do not use them for control system functionality. Computers on the corporate LAN should only accept signed ActiveX components from trusted sources. Finally, browser functionality should be completely disabled or removed from machines on the control system network that do not require it to perform their tasks Overview 4.7 Secure code Secure coding involves techniques that prevent would-be attackers from using program functionality in unintended ways Objective Cross-site scripting is ultimately caused by programming error or omission. By using secure coding techniques, control system vendors and operators who write dynamic Web pages will prevent XSS exploits from being used against control systems Discussion In the scenario above, the vulnerability used by the attacker to target control systems users would never have existed if Web programming recommended/best practices had been followed. These practices require all input that will be displayed as part of a Web page be validated first. This means filtering, removing, or output encoding any html tags or script submitted for incorporation to a dynamically generated Web page. 5. Conclusion Cross-site scripting is a Web-based attack technique used to gain information from a victim machine or leverage other vulnerabilities for additional attacks. The fact that this technique could be used to specifically target and gain access to control system environments has been described in a detailed hypothetical attack scenario. Similar attacks may be mitigated though the application of the seven practices recommended above. These practices employ policy, people, and technology countermeasures 10
15 to protect against XSS and other Web attacks. Critical infrastructure control system asset owners are encouraged to appropriately apply these practices in their operating environments. 11
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Common Cybersecurity Vulnerabilities in Industrial Control Systems. May 2011
Common Cybersecurity Vulnerabilities in Industrial Control Systems May 2011 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
The Electronic Arms Race of Cyber Security 4.2 Lecture 7
The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Configuring Allied Telesyn Equipment to Counter Nimda Attacks
Configuring Allied Telesyn Equipment to Counter Nimda Attacks A guide to configuring Allied Telesyn routers and Layer 3 switches to protect your network from attack. What is Nimda and Why is it a Threat?
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
FSOEP Web Banking & Fraud: Corporate Treasury Attacks
FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
