Data Model Bugs. Ivan Bocić and Tevfik Bultan
|
|
|
- Laura Davidson
- 9 years ago
- Views:
Transcription
1 Data Model Bugs Ivan Bocić and Tevfik Bultan Department of Computer Science University of California, Santa Barbara, USA Abstract. In today s internet-centric world, web applications have replaced desktop applications. Cloud systems are frequently used to store and manage user data. Given the complexity inherent in web applications, it is imperative to ensure that this data is never corrupted. We overview existing techniques for data model verification in web applications, list bugs discovered by these tools, and discuss the impact, difficulty of detection, and prevention of these bugs. 1 Introduction Software applications have migrated from desktops to the cloud, with many benefits such as, continuous accessibility on a variety of devices, and elimination of software installation, configuration management, updates and patching. These benefits come with a cost in increased complexity. In order to reduce the complexity and achieve modularity, most modern application frameworks use the Model-View-Controller (MVC) pattern to separate the code for the data model (Model) from the user interface logic (View) and the navigation logic (Controller). Examples of these frameworks include Ruby on Rails (Rails for short), Zend for PHP, Django for Python and Spring for J2EE. Since modern web applications serve to store and manage user data, the data model is a key component of these applications. Data models are responsible for defining the data model schema, i.e., the sets of objects and the relations (associations) that describe the stored data format, and data model actions which describe the methods used to update the data. For many high profile applications such as HealthCare.gov, DMV, and consumer applications such as Facebook and Gmail, user data is the most valuable asset. Data model correctness is the most significant correctness concern for these applications since erroneous actions can lead to unauthorized access or loss of data. In this paper we discuss and characterize data model bugs in modern software applications, and the impact of such bugs using concrete examples discovered in open source applications. We show that these bugs have the potential for causing severe and potentially irreparable damage to the data. We discuss the difficulty and plausibility of recovering from these bugs, and survey the known techniques that can help in detecting and preventing these bugs from occurring. 2 Data Model Verification Methods In modern software applications the interactions between the server and the back-end data store is typically managed using an object-relational mapping This work is supported in part by the NSF grant CCF
2 ORM Configuration and/or Actions Data Model Properties Verification Engine Translation to Alloy / SMT / First Order Logic Alloy Analyzer / SMT Solver / Theorem Prover Confirmation of correctness Alerts and/or Counterexamples Fig. 1. Overview of Data Model Verification (ORM) library that maps the object-oriented view of the data model at the server side to the relational database view of the data model at the back-end data store. Since the ORM configuration defines the entity types managed by an application, and actions are implemented using the ORM library, investigation of the data model is largely equivalent to investigating the ORM. We overview the results of using three approaches to data model verification, all of which conform to the same overall architecture presented in Figure 1. Note that this is different from verification techniques that are based on formal specifications [2] which impose a semantic gap between the specification and actual source. These techniques do not ensure that the actual implementation conforms to the specification, making them less useful in detecting existing bugs and unable to verify that no bugs exist in the implementation. For example, investigating the ORM configuration is useful for finding bugs in the data model [5]. This technique translates the ORM configuration (schema) into SMT and Alloy for unbounded and bounded verification. Real bugs were found by using this technique, as well as many misuses of different ORM constructs. However, it has a more limited scope of looking at the configuration only, which allows for false positives in case an invalidation (corruption) is possible in the database, but not possible to create using the actions. We previously extended this work to include action verification as well [1]. Our technique translates the ORM schema, as well as all the actions, into first order logic. A first order logic theorem prover is then used to verify whether model invariants are preserved by the actions, assuming that actions are executed atomically and in any order (a reasonable assumption for RESTful applications). This technique has found other bugs in real world web applications. Finally, Rubicon [4] is a library for specifying generalized unit tests. These unit tests are not specified with concrete ORM entities, but with quantification over entity types instead. These tests are automatically translated into Alloy for verification. Using this technique, a security vulnerability was found in a real world web application. 3 Reported Data Model Bugs Before we proceed to discuss data model bugs in general, we will list three web applications and show examples of data model bugs that were found in them [1, 5, 4]. These bugs vary in nature, severity and potential for recovery, presenting useful background for a deeper discussion. FatFreeCRM 1 is an application for customer-relation management. It allows for storing and managing customer data, leads that may potentially become 1
3 customers, contacts, campaigns for marketing etc. It spans lines of code, 30 model classes and 167 actions. Using action verification [1], we found two bugs in FatFreeCRM that we reported to the developers, who confirmed them and immediately fixed one of them. In future discussion we refer to these two bugs as F1 and F2. Rubicon [4] is a tool for verification of Ruby of Rails applications that translates abstract unit tests to Alloy [3], with the goal of ensuring that these tests would pass when given any set of concrete objects. Bug F3, related to access control, was detected using this technique. Bug F1 is caused by Todo objects, normally associated with a specific User, not being deleted when their User is deleted. We call these Todo objects orphaned. Orphaned Todo objects are fundamentally invalid because the application assumes that their owner exists, causing crashes whenever an orphaned Todo s owner is accessed. Because of the severity, this bug was acknowledged and repaired immediately after we submitted a bug report. Bug F2 relates to Permission objects. Permission objects serve to define access permissions for either a User or a Group to a given Asset. Our tool has found that it is possible to have a Permission without associated User or Group objects. This bug is replicated by deleting a Group that has associated Permissions. Although similar to F1 in causality, the repercussions of this bugs are very different. If there exists an Asset object whose all Permission objects do not have associated Users or Groups, it is possible to expose these assets to the public without any user receiving an error message, and without any User or Group owning and managing this asset. Bug F3 is an access control bug that exposes a User s private Opportunity objects to other Users. This bug is exploited by registering a new User in a way that it shares some of the target User s Contacts, giving access to private Opportunity objects through these Contacts. This bug was caused by a false assumption by the developers that all Opportunity and Contact objects that belong to the same person will have the same Permissions. This bug was reported and acknowledged by the developers. Tracks 2 is an application for organizing tasks, to-do lists etc. This application spans lines of code, 11 model classes and 70 actions. We identify four bugs in Tracks, which we refer to as T1, T2, T3, and T4. Bug T3 was detected using data model schema verification [5]. Bugs T1, T2 and T4 were discovered using action verification [1], and were reported to and, since, fixed by the developers. Bug T1 is related to the possibility of orphaning an instance of a Dependent class. This bug is similar to bugs F1 and F2, except that the orphaned objects cannot be accessed by actions in any way. Therefore, this bug does not affect the semantics of the application. However, it does present a memory-leak like bug, affecting performance by unnecessarily populating database tables and indexes. Bug T2 is very similar in nature to T1. When a User is deleted, all Projects of the User are deleted as well, but Notes of deleted Projects remain orphaned. These orphaned Note objects are not accessible in any way, however, the orphaned Todos take up space in the database and inflate indexes. 2 getontracks.org
4 Bug T3 is caused by deleting a Context without correctly cleaning up related RecurringTodo objects. This is similar to bug F1 because the orphaned RecurringTodo objects are accessible by the application and cause the application to crash. We found bug T4 when the action verification method [1] reported an inconclusive result within the action used to create Dependent instances between two given Todos. Semantically, there must not be dependency cycles between Todos; this is a structural property of the application. Our method could not prove or disprove that cycles between Todos cannot be created. Upon manual inspection we found that, while the UI prevents this, HTTP requests can be made to create a cycle between Todos. The repercussions of this bug are potentially enormous. Whenever the application traverses the predecessor list of a Todo inside a dependency cycle it will get stuck in an infinite loop, eventually crashing the thread and posting an error to the User. No error is shown when the user creates this cycle, only later upon accessing it. This creates a situation when repairing the state of the data may be impossible, as discussed in Section 4. LovdByLess 3 is a social networking application. It allows people to create accounts, write posts and comment on posts of other users, upload and share images etc. It contains lines of code, 12 model classes and 100 actions. Data model schema analysis [5] was used to find bug L1 where the Comments of a User were not cleaned up properly when a User is deleted. The orphaned Comments, however, remain connected to the Post they belong to, and are visible from the said Post. The application previews these Comments, along with their content and other data, except for the author. The author s name field remains blank. This is not expected behavior: either the Comments are supposed to be deleted, or they are supposed to remain, in which case the author s data is lost. 4 Discussion on Data Model Bugs We identified two types of bugs: access control bugs and data integrity bugs. Access control bugs give access to data to users with insufficient privileges. Data integrity bugs are bugs that allow invalidation of the application s data. Note that we draw a distinction between bugs that allow data to be invalidated and bugs that are caused by data that has been invalidated. The latter bug is a symptom of the former. Severity. Access control policies are hard to correctly specify and hard to correctly enforce [4]. Access control bugs are severe bugs. Exposing private information is not permissible in any application that stores and manages private information, nor is allowing access to admin or root level operations. The severity of data integrity bugs varies on the specifics of the bug, spanning from benign bugs that at most cause minor performance problems, over bugs causing crashes in the application, to bugs causing data loss and corruption from which recovery is exceptionally difficult or impossible. 3 github.com/stevenbristol/lovd-by-less
5 We identified several data integrity bugs that allow invalid data to exist in the database, but in such a way that this invalid data is never used by the application. We refer to these bugs as data model leaks. They are usually caused by incorrect cleanup of related entities when an entity is deleted. This category is demonstrated by bugs T1 and T2. These bugs are hard to detect unless the leaked data accumulates to a certain point. Their impact is limited to performance, not affecting the semantics of the program. They negatively impact performance by taking up space in the database and populating indexes unnecessarily. In most cases, the corrupted data can be accessed by the application, causing the application to misbehave in some way. We identified a wide range of misbehavior severity. For example, orphaned objects may be visible to the user as empty fields on the webpage (L1), allow operations and further data updates that should not be allowed (F2), or crash the web application (F1, T3, T4). Recovery. Access control bugs allow no recovery. Once private information has been exposed, fixing the bug only prevents future threats. No measure exists to make the exposed information private again. However, data integrity bugs have recovery potential. Repairing a data integrity bug involves two steps: repairing the data and preventing future invalidation. In some cases, data is recoverable. For example, once a data model leak is discovered, leaked entities can be identified and removed. The same applies in the case of data being incorrectly deleted: bugs F1, F2, T3 are recoverable from because the original intent of the developer was to delete data. Removing the invalid data not only removes the corruption, but also brings the data store to the state that was originally expected by the developers. Data integrity bugs that do not manifest themselves through improper deletion are far more difficult to recover from. Repairing the corruption implies modifying the corrupted data into valid data, which may be impossible. T4 is an example of a bug in which valid data is not distinguishable from invalid data. Even clearly distinguishable corrupted data may be unrecoverable if, for example, invalid data has overwritten correct data. Backups can be used to recover corrupted data in certain cases. This would be a manual and error prone effort, however, and it would rollback the user s data to a previous point which may be undesirable. To make matters worse, since data integrity bugs are observable only if the data has already been invalidated, the corruption may have been backed up in the time frame between the cause of the corruption and the escalation of the bug, making backups unusable. Detection and Prevention. Data model bugs are hard to anticipate, and addressing them after being detected by users is undesirable because recovery may be extremely difficult. Detection of access control bugs is difficult since a malicious user may leave no trace when accessing restricted information. Similarly, data integrity bugs are hard to detect. They are not observed until the application accesses the invalidated (corrupted) data and misbehaves, which may not be possible (as is the case with bugs T1 and T2). If a user does access the invalidated data, the resulting faulty behavior cannot be replicated by the developer without being given access to the same invalidated data. Furthermore, even given access
6 to this data, the code causing this strange behavior may be correct. No trace exists on how the data was originally invalidated. Runtime validation is a commonly used technique for the prevention of potential data model integrity bugs. We define runtime validation as any runtime check that aborts the operation with the goal of preventing invalidation. In web application frameworks, validation can be done in the web application layer automatically (both Rails and Django support user definable model validators), or could be manually implemented in actions (in form of conditional branches that abort unless a specific condition is met), or in the database by defining constraints. Frequently multiple approaches are used: for example, the database may validate the integrity of foreign keys, whereas the application layer may validate that strings adhere to a given format. Runtime validation alone provides an insufficient solution to the problem. This is demonstrated by the fact that we found serious bugs in applications that heavily rely on runtime validation, and have attempted enforcing security policies. For all the bugs we found, the problem was caused by incorrect implementation. Considering the difficulty of detection, potential severity and unrecoverability of these bugs, we strongly believe that automated verification techniques should be used to prevent data model bugs. Besides ensuring that static and runtime constraints are sufficient, verification could also be used to detect unnecessary validation. Supported by verification, runtime validation can be more effective in successfully preventing data model bugs. 5 Conclusions Cloud-based modern software applications store and manipulate their data on remote servers as defined by the data model. We argue that the correctness of the data model is an essential difficulty in building modern software applications. We have demonstrated data model bugs in several open source applications. We have discussed the difficulties in detection, severity, and the potential for recovery from these bugs. Although there have been automated verification techniques proposed for detecting data model bugs, they all have their limitations. Detection and prevention of data model bugs remains to be an important research direction. References 1. I. Bocić and T. Bultan. Inductive verification of data model invariants for web applications. In Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), May A. Deutsch, L. Sui, and V. Vianu. Specification and verification of data-driven web applications. Journal of Computer and System Sciences, 73(3): , D. Jackson. Alloy: A lightweight object modelling notation. ACM Transactions on Software Enginnering and Methodology (TOSEM 2002), 11(2): , J. P. Near and D. Jackson. Rubicon: bounded verification of web applications. In Proceedings of the ACM SIGSOFT 20th Int. Symp. Foundations of Software Engineering (FSE 2012), pages 60:1 60:11, J. Nijjar. Analysis and Verification of Web Application Data Models. PhD thesis, University of California, Santa Barbara, Jan
An Integrated Data Model Verifier with Property Templates
An Integrated Data Model Verifier with Property Templates Jaideep Nijjar Ivan Bocic Tevfik Bultan University of California, Santa Barbara {jaideepnijjar, bo, bultan}@cs.ucsb.edu Abstract Most modern web
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Ruby on Rails Tutorial - Bounded Verification of Data Models
Bounded Verification of Ruby on Rails Data Models Jaideep Nijjar and Tevfik Bultan University of California, Santa Barbara {jaideepnijjar, [email protected] ABSTRACT The use of scripting languages to
Chapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For
THE WINDOWS AZURE PROGRAMMING MODEL
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson Payoff When a DBMS crashes, all or a portion of the data can become unusable, Appropriate procedures must be followed to restore, validate,
Resolving Active Directory Backup and Recovery Requirements with Quest Software
Resolving Active Directory Backup and Recovery Requirements with Quest Software By Mike Danseglio Sponsored by Table of Contents Backing Up Effectively... 1 Identifying an Incident... 2 Recovering from
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
Modular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
On the Relation between Design Contracts and Errors: A Software Development Strategy
On the Relation between Design Contracts and Errors: A Software Development Strategy Eivind J. Nordby, Martin Blom, Anna Brunstrom Computer Science, Karlstad University SE-651 88 Karlstad, Sweden {Eivind.Nordby,
Embracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
Educational Collaborative Develops Big Data Solution with MongoDB
CASE STUDY OVERVIEW Educational Collaborative Develops Big Data Solution with MongoDB INDUSTRIES Education, Nonprofit LOCATION Durham, NC PROJECT LENGTH 1 year, 5 months APPLICATION SUPPORTED Data driven
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
How Routine Data Center Operations Put Your HA/DR Plans at Risk
How Routine Data Center Operations Put Your HA/DR Plans at Risk Protect your business by closing gaps in your disaster recovery infrastructure Things alter for the worse spontaneously, if they be not altered
Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
8 POINT PLAN TO ELIMINATE PST FILES
8 POINT PLAN TO ELIMINATE PST FILES C2C Systems 2013 www.c2c.co.uk When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
How To Test A Web Based System
Testing Web-Based Systems-Checklists Testing Web-Based Systems -Checklist Overview-: Web-based testing should be RISK ORIENTED. This article describes the risks, presents the types of testing that can
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise
1. What is SQL Injection?
SQL Injection 1. What is SQL Injection?...2 2. Forms of vulnerability...3 2.1. Incorrectly filtered escape characters...3 2.2. Incorrect type handling...3 2.3. Vulnerabilities inside the database server...4
Security Virtual Infrastructure - Cloud
Security Virtual Infrastructure - Cloud Your Name Ramkumar Mohan Head IT & CISO Orbis Financial Corporation Ltd Agenda Cloud Brief Introduction State of Cloud Cloud Challenges Private Cloud Journey to
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
How To Prevent An Sql Injection Attack
CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction Database security is the degree to which all data is fully protected from tampering or unauthorized acts. Security vulnerability, security threat and security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Vulnerability Disclosure Guideline for Software Developers
Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5 Contents 1. Introduction 2 2. Vulnerability Information: Provide
CS 392/681 - Computer Security. Module 16 Vulnerability Analysis
CS 392/681 - Computer Security Module 16 Vulnerability Analysis Course Policies and Logistics Homework 5 due tonight Homework 6 posted Read Chapter 23 11/13/2003 Module 16 - Vulnerability Analysis 2 Some
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Software Verification and System Assurance
Software Verification and System Assurance John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Verification
Quotes from Object-Oriented Software Construction
Quotes from Object-Oriented Software Construction Bertrand Meyer Prentice-Hall, 1988 Preface, p. xiv We study the object-oriented approach as a set of principles, methods and tools which can be instrumental
A framework for creating custom rules for static analysis tools
A framework for creating custom rules for static analysis tools Eric Dalci John Steven Cigital Inc. 21351 Ridgetop Circle, Suite 400 Dulles VA 20166 (703) 404-9293 edalci,[email protected] Abstract Code
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Getting started with API testing
Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Integrating Quality Assurance into the GIS Project Life Cycle
Integrating Quality Assurance into the GIS Project Life Cycle Abstract GIS databases are an ever-evolving entity. From their humble beginnings as paper maps, through the digital conversion process, to
An Approach for Generating Concrete Test Cases Utilizing Formal Specifications of Web Applications
An Approach for Generating Concrete Test Cases Utilizing Formal Specifications of Web Applications Khusbu Bubna RC Junit concrete test cases suitable for execution on the implementation. The remainder
DEFINING THE RIGH DATA PROTECTION STRATEGY
DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Leveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
An introduction to designing reliable cloud services
An introduction to designing reliable cloud services January 2014 Contents Overview 2 Cloud service reliability versus resiliency 4 Recovery-oriented computing 5 Planning for failure 7 Designing for and
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.
WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
WHITE PAPER. SharePoint Permissions. Management. Centralized permissions management with SPDocKit ADIS JUGO
WHITE PAPER SharePoint Permissions Management Centralized permissions management with SPDocKit ADIS JUGO Content About Adis... 2 Introduction to SharePoint Permission Management... 3 Centralized Permission
Recovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings.
Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. 2 Introduction 5 Recovering from Data Loss 6 7 Introducing Ontrack PowerControls for SharePoint
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
An introduction to creating JSF applications in Rational Application Developer Version 8.0
An introduction to creating JSF applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Although you can use several Web technologies to create
Pentesting Web Frameworks (preview of next year's SEC642 update)
Pentesting Web Frameworks (preview of next year's SEC642 update) Justin Searle Managing Partner UtiliSec Certified Instructor SANS Institute [email protected] // @meeas What Are Web Frameworks Frameworks
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
An Approach to Threat Modeling in Web Application Security Analysis
Volume-5, Issue EICA2012-5, February 10, 2012 An Approach to Threat Modeling in Web Application Security Analysis Sreenivasa Rao B Dept. of Computer Science & Engineering CMJ University, Shillong, India
Brochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
White Paper 6 Steps to Enhance Performance of Critical Systems
White Paper 6 Steps to Enhance Performance of Critical Systems Despite the fact that enterprise IT departments have invested heavily in dynamic testing tools to verify and validate application performance
Data Quality Assessment. Approach
Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
The ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
Oracle Solaris Studio Code Analyzer
Oracle Solaris Studio Code Analyzer The Oracle Solaris Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory access
Avaya Inventory Management System
Avaya Inventory Management System June 15, 2015 Jordan Moser Jin Oh Erik Ponder Gokul Natesan Table of Contents 1. Introduction 1 2. Requirements 2-3 3. System Architecture 4 4. Technical Design 5-6 5.
Semantic Errors in SQL Queries: A Quite Complete List
Semantic Errors in SQL Queries: A Quite Complete List Christian Goldberg, Stefan Brass Martin-Luther-Universität Halle-Wittenberg {goldberg,brass}@informatik.uni-halle.de Abstract We investigate classes
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
The case for continuous penetration testing
The case for continuous penetration testing By Oliver Cromwell, OccamSec Knowing your risk In an ideal world, risk management for an organization would be based on complete knowledge of all the factors
10 Point Plan to Eliminate PST Files
10 Point Plan to Eliminate PST Files Executive Summary When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present more challenges
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Understand Backup and Recovery Methods
Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows
DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
Guidelines for Effective Data Migration
Guidelines for Effective Data Migration Applies to: SAP R/3. All releases. For more information, visit the ABAP homepage. Summary Data Migration is an important step in any SAP implementation projects.
IoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]
