Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
|
|
|
- Shawn Robertson
- 10 years ago
- Views:
Transcription
1 Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center for Risk Management of Engineering Systems, University of Virginia This Appendix is prepared for the Institute for Information Infrastructure Protection (I3P) and the sponsors 15 January 2014 Implementation and Experimentation with OpenStack Cloud Computing System Introduction: Cloud Computing Technology (CCT) can exist in many forms and is fundamentally a complex system-of-systems. In PART II of this report, we proved theoretically through a fault tree analysis that users of cloud computing systems are more at risk than users of non-cloud computing systems, given similar system configurations. In PART III, we demonstrate the above conclusion with a physical mini-cloud computing system. Our research approach consists of two parts: 1) building a physical mini-cloud system; 2) designing experiments on the mini-cloud system to explore vulnerabilities and test intrusion methods unique to cloud computing systems. Using a mini-cloud computing system as a case study allows us to apply general conclusions on the risk to CCT associated with a specific software/hardware system that is common in industry. We implemented a small-scale private cloud computing system based on OpenStack as a case study for this project. The experimental cloud computing system is used as a case study to understand security risks of more general cloud computing systems. From an experimental perspective, we implemented a cloud cluster in our Phantom Systems Modeling Laboratory (PSML), with appropriate security software. The PSM Lab at UVA currently has six machines, on which many more virtual machines may be deployed. These PSM Lab machines have the ability to be supplemented with other desktop machines at the center. The philosophy behind PSM is that multiple perspectives are needed to model a complex system. In this case, the multiple perspectives are captured by reproducing scenarios of attacks from different sources and by different methods, with varying configurations of the OpenStack architecture and security protocols. The results of this experimentation 1
2 process demonstrate the differences between the security risks to CCT and to non-cct systems. System Description 1. System Architecture The purpose of building our own cloud was to explore vulnerabilities and develop hacking and penetration approaches specific to cloud computing systems, which is not appropriate or legal using a public environment. Also, building our own cloud allows us to become more familiar with the underlying hardware, software, and processes of a cloud computing system. We chose OpenStack because it was freely available and is a good representation of systems used in practice. OpenStack is an operating system for Infrastructure-as-a-Service (IaaS) clouds, providing Virtual Machine (VM) instances for users. A VM instance is composed of an image (which determines the configuration), a flavor (which determines the size), and (sometimes) a persistent storage block. Currently our cloud is using basic open source images. Nova and Glance can use the same VM image format (.ami files) as that used by Amazon s Elastic Compute Cloud (EC2). OpenStack supports two forms for storage: objects with Swift, and volumes (blocks) with Cinder. Volumes are persistent storage allocated to a VM instance such that the virtual machine views it as a local disk. Alternatively, object files are viewed by the VM instance using them as being on some remote disk. As an IaaS system, OpenStack VM instances are often configured and run servers in production environments. Our implementation is currently running basic opensource applications on individual VM instances for demonstration purposes. 2. Cloud Hardware The CCT system developed for this project is comprised of four computer nodes and one controller. The entire cloud currently runs on the Folsom release of Open Stack. Each node runs the Kernel-based Virtual Machine (KVM) hypervisor. The cloud system is accessible through public IP via the Ubuntu OpenStack Dashboard, Horizon, as well as through standard secure shell (SSH) connection. In addition the entirety of the cloud is connected through a secondary set of Ethernet connections creating a separate private cloud. Upon connecting to the cloud system, users are able to load virtual machines from various images with a variety of formats. While not all of these selections are available to the public cloud, they are all available to the private cloud. The cloud system does not support persistent storage. As an alternative to persistent storage, users are allowed to save snapshots of current images, then load into those snapshots much the same as a user would load into an image. The cloud system described above consists multiple interdependent subsystems, including user, cloud infrastructure (storage, computing, and network) and hypervisor, security, and cloud provisioning and management. These subsystems constitute a complex interconnected system of systems, which implies, from the Phantom System Models theory, that they share states. Furthermore, two subsystems that share one or 2
3 more states are more vulnerable to the same threat than a system that has no shared states, and thus they are more at risk, because an intruder would have more than one path to penetrate the CCT system of systems. 3. Cloud Software OpenStack software is open-source software that is developed, maintained, and managed by the OpenStack Foundation, which is composed of a multitude of large and small corporations in the cloud industry. The version of OpenStack that we are using is called Folsom. Figure 8: Schematic of OpenStack Software Functionality OpenStack has a number of key software modules, referred to as services. The following is the Nova administration manual description of each service: Object Store (codenamed "Swift") provides object storage. We have not used any object storage in our cloud, though it would be possible to do so. Compute (codenamed "Nova") provides virtual servers upon demand. What the documentation refers to as servers are just virtual machines, which do not need to function as servers in the strict sense. Dashboard (codenamed "Horizon") For our cloud, this interface can be accessed by directing any browser to /horizon, allowing users to launch instances from the web. Identity (codenamed "Keystone") provides authentication and authorization for all the OpenStack services. It also provides a service catalog of services within a particular OpenStack cloud. This manages both human users and services, which it treats like human users. Keystone characterizes identity in three ways: o User this is the most basic form of identity, and currently there is a user designated for each service as well as demo and admin users. 3
4 o Role each user can take on multiple roles, but roles are handled automatically and are not noticeable in normal operations. o Tenant each user belongs to one or more tenants. The current tenants are: demo, invisible_to_admin, service, and admin. Because every instance exists within a particular tenant (which was formerly referred to as a project ), a tenant must be selected on the dashboard when working with instances, as shown in Figure 2. The tenants demo and admin are the only ones that are applicable to us, and demo is the only one we have actually been using. Figure 9: Dashboard screenshot indicating where tenant (project) is selected Figure 10 provides a visual explanation of these software modules and how they interact. 4
5 Figure 10: Interactions Between OpenStack Software Modules, from the OpenStack Nova administration manual ( Vulnerabilities and Intrusion Methods Unique to CCT One of the major difficulties in identifying weaknesses in cloud computing security is finding a form of attack that is unique to cloud computing. That is, almost any attack on a cloud system has some analog in conventional computing. For example, VM images with a public IP address can be hacked using the same tools and techniques used against conventional hosts. However, many cases cannot be evaluated in such a clear way, since the definition of cloud computing itself is only expressed in loose qualitative terms. For the purposes of experimentation, however, two weaknesses that can be considered germane to cloud computing are those found in cloud management consoles and VM images. Cloud management consoles: Since one of NIST s key characteristics of cloud computing is Broad Network Access, a cloud by definition can be controlled remotely through some form of client, which is often browser-based. These management consoles constitute a significant source of security risk because attackers can take advantage of common weaknesses such as cross-site scripting (XSS) and cross-site request forgery (CSRF) to gain access to a victim s cloud. This problem is exacerbated by the increasing use of mobile devices and the so-called Bring Your Own Device (BYOD) movement. With more disparate points of access to the cloud, there are more opportunities for the attackers to find security flaws and for legitimate users to make mistakes in managing the 5
6 security of their system. For example, the security tokens used to access a VNC console for a VM instance are, by default, sent in plain text, that is, unencrypted. Anyone on the network who captures the appropriate packet will then be able to access the VNC console login page, bypassing the normal authentication required for OpenStack Horizon. Though remote access is used in conventional computing environments, this source of risk can be considered to be germane because of how fundamental it is to cloud computing. VM images: Because images are the configuration templates from which virtual machines are created, their security and integrity is critical. However, many images come from open-source communities, where attackers can potentially make malicious modifications. Furthermore, the images need not be modified maliciously to be dangerous, because benign users and creators of images can make mistakes that leave security flaws open for attackers to exploit. The management consoles can be considered a source of risk that is unique to cloud computing, because the scale and criticality of its use (even though some virtualization), is used in conventional computing systems. Other potential areas of exploration would be weaknesses in multi-tenancy, data reminisce, cryptographic protocol implementation, cloud auditing, inter-vm side channels, and many others. We have developed and experimented with ways with which to demonstrate exploitation of the weaknesses in the cloud management consoles mentioned above in our own cloud. Among the many challenges of this process is the task of identifying the specific chain (or chains) of events that will contribute to the final event of interest. For this final event, we have decided to focus on loss of confidentiality, which by its nature, must be coupled with consideration of the loss of integrity. It should be noted that it would be equally worthwhile to consider risk of denial of service (i.e., loss of availability) in the cloud. This process is facilitated by the wide availability of penetration-testing software. For example, we experimented with a software package called WireShark for some web management console attacks. Exploring And Experimenting Potential Security Issues Of Cloud Computing Technology Our current research focused on exploring potential security issues of CCT, especially in OpenStack, which is being used by our experiments.. The issue with VM images arises from the fact that every VM instance is created from an image, which essentially determines the operating system, applications, and overall configuration of the instance. Images can include a wide variety of security weaknesses both intentionally and accidentally introduced (Dhanjani et al. 2009). This is especially problematic since images are shared online and consequently have uncertain provenance. Through monitoring this transfer of images in setting up a VM instance on a given node, the potential exists for an attacker to capture these packets and reconstruct another user s VM on their own machine. 6
7 The issue with VM images reduces the security of the cloud computing infrastructure because a user with illegal administrator privileges is able to collect valuable information and send it to a remote location, while only having access to a cloud computer during a single session. To demonstrate the possibility of this type of attack, we posit that someone with prohibited administrator access (the insiders) is able to install a program in a VM image that runs as a background process in a VM instance to collect and send information to a remote computer or address. To implement and test this idea, we inject a key log and program into a VM image that will run unnoticed on one of the cloud virtual environments. This background process will track all the keystrokes a user makes and will record that information in a text file. That text file will be ed to a specific address at timed intervals. We have taken a few approaches to try and achieve this objective of collecting and sending information to a remote computer. The first approach attempted to utilize a user created key log system from the Linux app center. Furthermore, instead of trying to use a Linux app from the app store, we moved to a lower level key log program that is written in C code, which is compiled and capable to run on any machine. The C code is a collection of files stored in a single folder on the computer. In order to have the code log the keystrokes, first the code must be compiled, and then the program must be started. The program is able to log keys and it even runs in the background, which is a huge improvement over the last method (as demonstrated below). No matter what the user is doing, anything they type is automatically logged to a specific file. Conclusions Our implementation of a mini-cloud computing system enriched our knowledge about the architecture, hardware, and software of a typical cloud computing system and helped us to identify commonly shared resources among subsystems such that unique forms of cyber attack are explored and tested. We discussed potential vulnerabilities of two major types of these forms of cyber attack: cloud management consoles and VM images. Another implication of our implementation of the mini-cct is that CCT is a mature technology with many commercial systems implemented by open source software and similar architecture. This implies that a potential hacker or intruder is able to find detailed technical resources and gain significant knowledge about a target system. This is another source of risk on CCT compared to other proprietary non-cct systems. Our experimentation of the mini-cloud computing system demonstrated that exploiting vulnerabilities in CCT is feasible and it takes different forms, although a certain level of knowledge of system structure, security protocol, and programming is required. A cloud user s security cannot be ensured since the virtual machine provided by the cloud provider may have been compromised in the first place. A cloud user has to understand and have established protocols to safeguard this source of risk when deciding to choose between cloud computing and non-cct proprietary system. 7
OpenStack Introduction. November 4, 2015
OpenStack Introduction November 4, 2015 Application Platforms Undergoing A Major Shift What is OpenStack Open Source Cloud Software Launched by NASA and Rackspace in 2010 Massively scalable Managed by
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Introduction to OpenStack
Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa [email protected] Cloud Computing - Definition Cloud Computing is a term coined to refer
Mirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems
RH413 Manage Software Updates Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems Allocate an advanced file system layout, and use file
Project Documentation
Project Documentation Class: ISYS 567 Internship Instructor: Prof. Verma Students: Brandon Lai Pascal Schuele 1/20 Table of Contents 1.) Introduction to Cloud Computing... 3 2.) Public vs. Private Cloud...
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
Comparing Open Source Private Cloud (IaaS) Platforms
Comparing Open Source Private Cloud (IaaS) Platforms Lance Albertson OSU Open Source Lab Associate Director of Operations [email protected] / @ramereth About me OSU Open Source Lab Server hosting for Open
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Cloud Computing using
Cloud Computing using Summary of Content Introduction of Cloud Computing Cloud Computing vs. Server Virtualization Cloud Computing Components Stack Public vs. Private Clouds Open Source Software for Private
CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie
The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login
Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect
Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Table of Contents page 2 page 4 page 6 page 8 page 9 page 10 page 11 Overview I. Sauce Labs Data
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Comparing Ganeti to other Private Cloud Platforms. Lance Albertson Director [email protected] @ramereth
Comparing Ganeti to other Private Cloud Platforms Lance Albertson Director [email protected] @ramereth About me OSU Open Source Lab Server hosting for Open Source Projects Open Source development projects
Getting Started with OpenStack and VMware vsphere TECHNICAL MARKETING DOCUMENTATION V 0.1/DECEMBER 2013
Getting Started with OpenStack and VMware vsphere TECHNICAL MARKETING DOCUMENTATION V 0.1/DECEMBER 2013 Table of Contents Introduction.... 3 1.1 VMware vsphere.... 3 1.2 OpenStack.... 3 1.3 Using OpenStack
cloud functionality: advantages and Disadvantages
Whitepaper RED HAT JOINS THE OPENSTACK COMMUNITY IN DEVELOPING AN OPEN SOURCE, PRIVATE CLOUD PLATFORM Introduction: CLOUD COMPUTING AND The Private Cloud cloud functionality: advantages and Disadvantages
Ubuntu OpenStack Fundamentals Training
Ubuntu OpenStack Fundamentals Training Learn from the best, how to use the best! You ve made the decision to use the most powerful open cloud platform, and now you need to learn how to make the most of
Research of Enterprise Private Cloud Computing Platform Based on OpenStack. Abstract
, pp.171-180 http://dx.doi.org/10.14257/ijgdc.2014.7.5.16 Research of Enterprise Private Cloud Computing Platform Based on OpenStack Jiang Yunxia, Zhao Bowen, Wang Shuqi and Sun Dongnan School of Automation,
Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack
Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack This vendor-independent research contains a product-by-product comparison of the most popular cloud platforms (along with
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Migration of virtual machine to cloud using Openstack Python API Clients
Migration of virtual machine to cloud using Openstack Python API Clients Jyoti Joshi 1, Manasi Thakur 2, Saurabh Mhatre 3, Pradnya Usatkar 4, Afrin Parmar 5 1 Assistant Professor Computer, R.A.I.T., University
An Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC [email protected]
SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager [email protected]. Product Marketing Manager djarvis@suse.
SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager [email protected] Product Marketing Manager [email protected] SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer [email protected] Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop
Design and Implementation of IaaS platform based on tool migration Wei Ding
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Nessus or Metasploit: Security Assessment of OpenStack Cloud
Nessus or Metasploit: Security Assessment of OpenStack Cloud Aleksandar Donevski, Sasko Ristov and Marjan Gusev Ss. Cyril and Methodius University, Faculty of Information Sciences and Computer Engineering,
SDN and Data Center Networks
SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. [email protected] Advisor: [email protected] Software Security Lab.
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS [email protected] Advisor: [email protected] Software Security Lab. Motivation The era of cloud computing Motivation In the
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Introduction to Openstack, an Open Cloud Computing Platform. Libre Software Meeting
Introduction to Openstack, an Open Cloud Computing Platform Libre Software Meeting 10 July 2012 David Butler BBC Research & Development [email protected] Introduction: Libre Software Meeting 2012
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open
How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist [email protected] Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions
Security in the Sauce Labs Cloud
SAUCE LABS REPORT Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Overview It s impossible to deny that in this day and age internet security should
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
OpenStack Alberto Molina Coballes
OpenStack Alberto Molina Coballes Teacher at IES Gonzalo Nazareno [email protected] @alberto_molina Table of Contents From public to private clouds Open Source Cloud Platforms Why OpenStack? OpenStack
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Automated Configuration of Open Stack Instances at Boot Time
Automated Configuration of Open Stack Instances at Boot Time N Praveen 1, Dr. M.N.Jayaram 2 Post Graduate Student 1, Associate Professor 2, EC Department, SJCE, Mysuru, India Abstract: Cloud Computing
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Déployer son propre cloud avec OpenStack. GULL 18.11.2014 François Deppierraz [email protected]
Déployer son propre cloud avec OpenStack GULL [email protected] Who Am I? System and Network Engineer Stuck in the Linux world for almost 2 decades Sysadmin who doesn't like to type the same
How To Install Openstack On Ubuntu 14.04 (Amd64)
Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking
RED HAT INFRASTRUCTURE AS A SERVICE OVERVIEW AND ROADMAP. Andrew Cathrow Red Hat, Inc. Wednesday, June 12, 2013
RED HAT INFRASTRUCTURE AS A SERVICE OVERVIEW AND ROADMAP Andrew Cathrow Red Hat, Inc. Wednesday, June 12, 2013 SERVICE MODELS / WORKLOADS TRADITIONAL WORKLOADS Stateful VMs: Application defined in VM Application
Installation Runbook for Avni Software Defined Cloud
Installation Runbook for Avni Software Defined Cloud Application Version 2.5 MOS Version 6.1 OpenStack Version Application Type Juno Hybrid Cloud Management System Content Document History 1 Introduction
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA
PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA Who cares about network printers? Why should anybody care about securing the printers when there
Mirantis www.mirantis.com/training
TM Mirantis www.mirantis.com/training Goals Understand OpenStack purpose and use cases Understand OpenStack ecosystem o history o projects Understand OpenStack architecture o logical architecture o components
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Comparison of Open Source Cloud System for Small and Medium Sized Enterprises
, pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
An Intro to OpenStack. Ian Lawson Senior Solution Architect, Red Hat [email protected]
An Intro to OpenStack Ian Lawson Senior Solution Architect, Red Hat [email protected] What is OpenStack? What is OpenStack? Fully open source cloud operating system Comprised of several open source sub-projects
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
OpenStack. Orgad Kimchi. Principal Software Engineer. Oracle ISV Engineering. 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
OpenStack Orgad Kimchi Principal Software Engineer Oracle ISV Engineering 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended to outline
158.738. Implementation & Management of Systems Security. Amavax Project. Ethical Hacking Challenge. Group Project By
158.738 Implementation & Management of Systems Security Amavax Project Ethical Hacking Challenge Group Project By Nawed Rajeh Mansour Kavin Khan Al Gamdi Al Harthi Palanavel The Amavax project required
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
Guide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
SYNNEFO: A COMPLETE CLOUD PLATFORM OVER GOOGLE GANETI WITH OPENSTACK APIs VANGELIS KOUKIS, TECH LEAD, SYNNEFO
SYNNEFO: A COMPLETE CLOUD PLATFORM OVER GOOGLE GANETI WITH OPENSTACK APIs VANGELIS KOUKIS, TECH LEAD, SYNNEFO 1 Synnefo cloud platform An all-in-one cloud solution Written from scratch in Python Manages
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration
MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration Hoi-Wan Chan 1, Min Xu 2, Chung-Pan Tang 1, Patrick P. C. Lee 1 & Tsz-Yeung Wong 1, 1 Department of Computer Science
