An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education
|
|
|
- Cornelius Adams
- 10 years ago
- Views:
Transcription
1 An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education Tom Chothia School of Computer Science University of Birmingham, UK Chris Novakovic Department of Computing Imperial College London, UK Abstract Online Capture The Flag (CTF) competitions are a popular means of engaging students with the world of cybersecurity. This paper reports on the use of a virtual machine (VM) framework that has been developed as part of cybersecurity courses offered to both second-year undergraduate and master s degree students in the School of Computer Science at the University of Birmingham; the framework features CTF-style challenges that must be solved in order to complete the courses formative assessment. As well as acquiring flags from the framework, students must also provide traditional written answers to questions and sit an examination. We analyse how well students performance on the CTF-style challenges correlates with their achievement in the remaining formative assessment and examination, thus providing evidence to show whether CTFs are effective as an assessment tool in academic cybersecurity courses. 1 Introduction Live security exercises, such as Capture The Flag (CTF) competitions, are a popular and fun means of engaging with cybersecurity topics. The aim of these events is typically for a team of participants either to defend a host running vulnerable services while simultaneously attacking other teams hosts running the same services (attack/defence-style CTFs), or to solve standalone challenges from a range of categories, such as reverseengineering, forensics and web security, without the need to directly attack other teams (Jeopardy-style CTFs). In either case, the successful exploitation of a vulnerable service or solving of a challenge reveals a flag to the victor, which scores points for the team when submitted to a flag server operated by the CTF organisers; the submission of flags for more difficult challenges scores greater This work was undertaken while the author was affiliated with the School of Computer Science at the University of Birmingham. numbers of points for the team, and the team that scores the most points over the course of the competition is declared the winner. The pedagogical benefits of academic CTF competitions the largest and longest-running of which, ictf 1, has been held annually since 2002 have been widely reported (e.g., [8, 6, 4]); amongst the most commonlyreported are students increased motivation to learn about cybersecurity, the enjoyment and satisfaction of competing, and improved practical knowledge of theoretical aspects of cybersecurity as a result of participating. It would surely, therefore, be desirable to introduce CTFs into the academic curriculum. However, there are several barriers to doing so: 1. The infrastructure underpinning a CTF is typically large and complex (e.g., [8, 4]); the computing power (and, for attack/defence-style CTFs, network bandwidth) required for the smooth operation of a CTF is usually not available for teaching purposes. 2. CTFs require continuous supervision by their organisers to guarantee the smooth running of the competition. Given that most CTFs run over a short period of time (usually hours), a pool of organisers working intensive shifts can ensure that the CTF runs successfully (although this is not always the case: our University s CTF team [1] frequently reports broken CTF challenges, which are then fixed by dedicated CTF organisers). This would not be viable in an academic teaching scenario where courses run over a period of several months. 3. CTFs inevitably involve attacking vulnerable services available on a network. We, and others [2], have found University IT support staff hesitant to allow malicious traffic to pass over any network they control. Additionally, there is a danger that stu- 1 The UCSB ictf:
2 dents attack traffic could interfere with other students or machines that are not part of the competition. We have developed a framework that enables academic cybersecurity courses to feature Jeopardy-style CTF challenges. The framework takes the form of a virtual machine (VM) containing vulnerable services and challenges devised by the course staff; they can be revealed gradually to students as the relevant cybersecurity topics are taught in lectures, allowing individual continuously-assessed exercises to feature particular challenges. Each student runs the VM locally and attempts to solve each challenge inside the VM as they are made available by the course staff. The successful completion of a challenge reveals a flag to the student, which can be submitted to an automated system controlled by the course staff for credit in the exercise; flags are unique to a particular instance of the VM, allowing for the detection of collusion between students. This framework provides the benefits of CTFs to cybersecurity students while avoiding the drawbacks listed above: students run the virtualised framework on their own hardware (e.g., their laptops), so course staff need not invest time continually maintaining a centralised infrastructure to operate the CTF, and malicious traffic is only routed inside a particular student s virtual network, eradicating the impact that an inexperienced student s actions may have on the university network. The students are not given the root password for the VM by the course staff, but since they have control of the virtual disk image they can gain root access and sidestep some of the challenges in order to obtain flags. Since it is impossible to prevent this from happening, in each exercise we aimed to make obtaining a flag by such methods more difficult than simply completing the exercise as intended, e.g. by placing the flag in obfuscated, compiled code. Our VM-based framework has been used in three iterations of our introductory cybersecurity courses, both at graduate and undergraduate level. All of the continuous assessment for these courses was based on our framework; we therefore expected students to interact with the framework for 3 4 hours per week over 11 weeks. The introduction of VM-based CTF-style exercises was popular with students, as indicated by a significant increase in student satisfaction levels reported in the endof-course feedback questionnaires. Students were required to submit not only flags, but also written descriptions akin to traditional formative assessment (e.g., detailed descriptions of the steps they took to recover a flag, suggested fixes, discussion of the security issues, etc). These written answers were marked, and feedback provided. The submitted flags were only used by markers as a sanity check for the students written descriptions; however, we can compare the overall marks the students achieved in their continuously-assessed work with the number of flags they managed to find, and therefore we can test whether the ability to acquire flags in CTF-style challenges correlates well with the marks students would achieve in traditionally-marked cybersecurity exercises. We found that for students obtaining low and medium marks there was a very strong correlation between the number of flags found and marks achieved. However, for higher-attaining students the relationship between the number of flags found and marks achieved was weaker. After further analysis, it seems that the ability to acquire flags in CTF-style challenges is an excellent indicator of students basic knowledge and technical ability, but does not accurately assess whether students have a deeper understanding of the underlying cybersecurity issues, which can be assessed with written answers. This means that CTF-style challenges are an excellent complement to the formative assessment of a taught cybersecurity course: they are better than no formative assessment at all, but should not replace written assessment altogether. In the following section we present the VM-based framework we have used in our courses, then in Section 3 we compare students performance on the CTFstyle challenges with the marks they received on their written assessment. We conclude in Section 4. The VM and example exercise sheets are available from our website 2. 2 A VM-Based Framework for CTF-Style Challenges Our design goal was to create a VM-based framework in which students could complete Jeopardy-style CTF challenges for credit, in a fun and accessible way. While the use of VM-based exercises to support cybersecurity education is common (e.g., [2, 7]), our framework includes exercises that assess the full range of cybersecurity topics taught in the course and gives students flags for completing the exercises. Our other goals were that: Students should submit flags online, and their validity should be automatically and instantly verified. To avoid duplicate submissions, flags for a single challenge should be different for every student. Students should be able to set up the VM on their own hardware and attempt to solve the challenges offline. We did not want to require students to 2 A CTF-Style VM Framework: ~tpc/seceduvm/ 2
3 have an Internet connection at all times and we have also previously observed students encountering many problems with virtual networking setups; we did not want to have to dedicate staff time to providing support for these issues. The exercises should slowly introduce students to Linux (with which many had no previous experience); beyond this, only cybersecurity knowledge taught in the course should be needed to complete the exercises. Cheung et al. [3] identify the lack of knowledge as a major barrier to competing in CTFs, so exercises should be made accessible to students. CTFs are inherently competitive, but exercises should not be perceived as a competition between students. Weaker students should not be publicly perceived as losing in a taught course; instead, each student should be able to work on exercises at their own pace, and students submitting shortly before a deadline should receive the same credit as students completing exercises well ahead of it. Finding flags by sidestepping the challenges (e.g., by disassembling binaries, or by mounting the virtual disk image and manually searching the file system for flags) should be more time-consuming than solving the exercise as intended. 2.1 The Framework Our framework is based on a single VM that students download at the start of the course and import into the open-source VirtualBox virtualisation software 3. This VM runs a Linux operating system containing several services, such as a web server, database server, and daemons running purpose-built insecure protocols, as well as many user accounts and complex, flawed access control configurations. When the VM boots for the first time, a program runs that generates the flags. These flags are written to particular locations (e.g., into the source code of a service which is then compiled, or into a password-protected MySQL database). The startup program sets appropriate permissions on the generated files and binaries, and deletes the source code it compiled before deleting itself. The startup program generates a random VM identifier, intended to be unique for each VM. To generate a flag, this VM identifier is combined with exercise number and question number identifiers and is then encrypted with a static 128-bit AES key chosen by the course staff; the resulting ciphertext can be represented as a string of 32 hexademical characters, and these are the flags the students are required to submit. Students submit these 3 Oracle VM VirtualBox: flags by logging into the flag submission server a website operated by the course staff using their University username and password and pasting the 32-character string into the input box for the appropriate exercise and question. The flag submission server decrypts the ciphertext and verifies that it is a valid flag for the given question by checking the identifiers contained within the resulting plaintext. The server records details of the flag submission for the markers and instantly informs the student whether the submission was successful. Students are allowed an unlimited number of flag submission attempts for a particular question. To avoid the CTF-style challenges being perceived as competitions, students cannot check whether other students have submitted flags for a particular question. An administrative page on the flag submission server shows the course staff details of all flag submissions for a given exercise and question, including the identity of the student submitting the flag, when the submission was made, and the identifier of the VM from which the flag originated. Students sometimes complete exercises using multiple copies of the VM (e.g., one on a laptop and one on a desktop computer), so we occasionally detect multiple VM identifiers for a particular student. However, students are explicitly instructed not to share their VMs with other students, so two students submitting flags with the same VM identifier is a possible indicator of plagiarism. The flag submission server does not reveal the results of this check to the student, but instead alerts the course staff of any irregularities on the administrative page; the course staff then follow this up with the implicated students individually (as we discuss in Section 3). It would be possible for good students to download a fresh copy of the VM and reverse-engineer the flag generation program, giving them the ability to generate their own flags. However, we note that doing this would be harder than completing any of the exercises, in particular the existing reverse-engineering exercises. Additionally, we require students to submit written work describing how they solved each exercise, which would be hard to do convincingly without solving the exercise as intended. A larger concern is students finding a way to gain root privileges on the VM and then finding information that makes the exercises trivial. To counter this, we have designed the exercises to, wherever possible, not rely on the secrecy of particular files (e.g., in the web security exercise, the website s PHP code is not considered secret, and students are given access to it along with the exercise sheet). 3
4 2.2 Course Mechanics We used our framework in introductory cybersecurity courses with a particular focus on technical skills and understanding. One version of the course was run for master s degree students, who were expected to have a good first degree in computer science but not necessarily any previous knowledge of cybersecurity; another version of the course was run for second-year undergraduate students with basic programming and networking skills. The latter version of the course used the same basic framework as the former, but with fewer and simpler exercises. Topics covered included cryptography, access control, network and protocol security, web security, and for the master s degree students buffer overflows and reverse-engineering of binaries. Both versions of the course ran for 11 weeks with 2 hours of lectures and 2 hours of lab sessions per week, and students were given 2 3 weeks to complete each exercise. Exercises were marked out of 100; grade boundaries were positioned at intervals of 10 marks between 40 and 70, with a mark above 70 representing high-quality work and a mark below 40 representing failure. The difficulty of the exercises was set based on experience gained from teaching previous courses and knowledge of the other courses that the students had taken. Generally, a third of the marks were awarded for a basic solution (e.g., a working attack on a protocol), another third of the marks were awarded for an optimal solution (e.g., a protocol attack with no unnecessary steps), and the final third were awarded for showing a clear understanding of the problem (e.g., a description of each line of the protocol attack, making it clear what each part of the message does, and why the attack works). Students were informed in advance of how marking would take place and were told what would be expected to receive top marks. Complete marking guides for all of our exercises are available on request. Marks were not scaled, but as shown by the figures below naturally ended up distributed across all grades. 2.3 The Exercises For all exercises, students were required to submit written answers describing the steps they took to recover flags from the VM, and where appropriate a description of what the vulnerabilities were and how they worked, and an explanation of how they could be fixed. Not all questions required the recovery of flags from the VM, and flags were not used to unilaterally prove that the student completed the exercise, but were instead intended to give the marker some degree of assurance that the students written answers were dependable. There were minor variations to the questions in the exercises for each course, both to make the second-year undergraduate version of the course easier than the master s degree course, and to prevent students from simply reusing solutions from a previous iteration of the course. Examples of the full exercise sheets are available on our website. Basic encryption. The first exercise familiarises students with the VM, Linux (since many begin the course with little or no experience of it), and performing cryptographic operations in Java. The students are given the passwords to two user accounts on the VM, alice and bob. bob s home directory contains incomplete Java source code for an encryption application; the supplied code contains methods for encrypting files using AES (in either CTR or CCM mode) and RSA using a user-defined key. The CTF-style challenges for this exercise involve decrypting AES/RSA-encrypted files in bob s home directory that each contain a flag; students are required to write the corresponding decryption methods for the application and use their compiled code to recover the flags from the encrypted files. Additionally, the startup program encrypts the message Pay Tom 1000 pounds using AES in CTR mode and writes it to a file in bob s home directory; students are not given the encryption key, but they must manually edit the bits of the ciphertext (e.g., with a hex editor) so that, when decrypted, the corresponding plaintext reads Pay Bob 9999 pounds. Students are also required to set up PGP for their account, upload their public key to a keyserver, ask their friends to sign their key, and send a signed and encrypted to a bot operated by the course staff; the bot automatically checks that the student has done this correctly and replies with feedback. Access control. The VM contains a number of files protected with flawed access controls. One flag is stored in a file hidden in an obscure location in the file system rather than given appropriately restrictive permissions; others are stored in files with a variety of insecure permissions that allow the file to be read (e.g., via a chained confused deputy attack against two insecure programs with the setuid bit set). The challenges in this exercise require students to bypass these weak access controls and recover the flag contained within each file. Protocol analysis. Students are given two keyagreement protocols in the standard Alice and Bob security protocol notation, Java source code of servers implementing these protocols, and pcap traces of clients communicating with these servers using these protocols. The protocols are vulnerable to a man-in-the-middle attack and a replay attack respectively. Students must dis- 4
5 cover and describe the attacks, implement them, and run them against the servers running on the VM; successful exploitation of each server reveals a flag. Web security. The VM runs a web server that hosts what at first sight appears to be an online furniture store; however, hidden inside this furniture store is a black market website. Students must investigate this website, find the black market interface and carry out a number of attacks. An SQL injection attack allows them to view all products stored in the backend MySQL database, including the black market products and a flag. By analysing the cookies set by the furniture store, they can discover how the hidden website authenticates its users and gain access to it. The site displays a flag from a protected file that the students can submit to show that they accessed the hidden website. A file upload attack allows them to recover the MySQL server login details used by the black market website; logging into the MySQL server using these credentials reveals another database containing a flag. A shell injection attack provides access to a shell running as the www-data user, revealing a final flag in a protected file in the file system. Non-flag questions in this exercise additionally cover XSS and CSRF attacks. Reverse-engineering. For this exercise, students must reverse-engineer four programs: two written in heavilyobfuscated Java and compiled into JDK bytecode, and two written in C and compiled into native code. All of these binaries behave as servers, and are listening on ports on the VM. Students must reverse-engineer the first three programs to recover a password expected to be entered into the program which, when entered into the copy of the program running as a server on the VM, causes the program to output a flag. The final program is an x86 binary for managing PGP keys, which also contains a backdoor; this binary listens on a port on the VM and runs as the root user. Students must find the backdoor by examining the binary in the free edition of the IDA disassembly tool 4 and use it to gain access to a root shell on the VM; a final flag is stored in a file in the /root directory. We also intended to place a buffer overflow vulnerability in one of the native-code binaries and require students to exploit it to recover another flag; however, we ultimately felt that buffer overflow exploits would be beyond the scope of either course. As an unofficial (and unassessed) sixth exercise, curious students were encouraged to discover how the VM framework works. Using the skills they learned in the course, the top 10% or so were able to deduce how the flags must have been generated, and then re-downloaded 4 IDA: Freeware Version: products/ida/support/download_freeware.shtml the VM and reverse-engineered the startup program. 2.4 Student Perception of the Courses At the end of each course, students filled in detailed end-of-course feedback questionnaires. Students stated that they spent an average of 6 hours per week working on these courses and rated them as difficult (on average the fifth most difficult of the 35 courses offered by the School); this is supported by comparing the final marks that second-year undergraduates achieved on the Spring 2014 iteration of our course with the average final marks for the other courses they took (Figure 1): the average for our course is slightly lower than the overall average. However, students also rated our courses as either the most or second-most worthwhile course they took, rated themselves as very happy with the course overall, and rated each iteration of the course as one of the top courses offered by the School. Performance on Spring 2014 course Average performance on other courses Figure 1: Second-year undergraduate students final marks in the Spring 2014 iteration of the course vs. their average marks in other courses taken that year 3 Analysis of Flag Submissions and Marks The submission of flags to a centralised course staffcontrolled flag submission server allowed us to track the identities of students submitting flags, the unique identifiers of VMs deployed on students hardware, and the frequency of flag submissions over time, across all iterations of the courses. Using this data, we wish to measure 5
6 Valid flags submitted Valid flags submitted Valid flags submitted Written continuous assessment mark Written continuous assessment mark Written continuous assessment mark (a) Spring 2014 (b) Autumn 2014 (c) Spring 2015 Figure 2: Scatter plots of students written continuous assessment marks and the number of valid flags they submitted how well a student s ability to find flags in CTF-style challenges corresponds with their performance in traditional written formative assessment, and also whether it could be possible to replace manual marking of exercises with automatic marking based solely on flag submissions. The design of our framework allows us to perform these analyses. Figure 2 shows scatter plots of each student s written continuous assessment mark and the number of valid flags they submitted, across all three iterations of the courses. Each point represents a single student; the number of valid flags submitted (on the y axis) is weighted for difficulty. The correlation between the number of valid flags submitted and written continuous assessment mark is high, as shown by Table 1. A correlation coefficient greater than 0.9 indicates a very strong relationship. However, notice that this correlation is not uniform across the entire mark range: if we divide the students into groups of those who achieved the highest grade (i.e., those with a mark of at least 70) and those who achieved lower grades, we see that the correlation is much weaker amongst students achieving the highest grade. After reviewing students written submissions, we found that all students who had submitted a valid flag for Iteration of course Spring 2014 Autumn 2014 Spring 2015 All marks Marks Marks < Table 1: The correlation between the number of valid flags submitted by a student and their written continuous assessment mark for the course a question received a good mark in their written submission for that question. The difference between students receiving good and outstanding marks was mainly due to higher-attaining students showing a deeper understanding of the cybersecurity issues involved in the question. For instance, the protocol analysis exercise requires the student to suggest fixes for the protocols, as well as exploiting their implementation and recovering the flags; only students who understood the protocols very well were able to describe adequate fixes, whether or not they had recovered the flags. We found that the widest range of marks occurred with the reverse-engineering exercise. The written submissions of all students who submitted valid flags for this exercise showed that they understood the basic concepts of reverse-engineering and were competent with the disassembly tools. The higher-attaining students, however, showed a clear and complete understanding of the operation of the binaries and the reverse-engineering process, whereas the weaker students found vulnerabilities by trial and error. Some of the best answers were provided by students who did not submit flags for all of the other questions in the exercise, meaning that students with fewer valid flag submissions sometimes scored better overall. The Spring 2015 iteration of the course was simpler than the other iterations: it did not include the reverseengineering exercise, and questions did not require students to suggest fixes for the vulnerabilities. For this iteration of the course we see a closer correlation between marks awarded for students written submissions and the number of valid flags they submitted, although the marks of the higher-attaining students still show a lower correlation than those that did not perform as well. 6
7 3.1 Discussion Flag-only continuous assessment mark Actual continuous assessment mark Figure 3: Comparison of Spring 2014 second-year undergraduate students actual continuous assessment marks and the marks they would have been awarded had they only been assessed on their valid flag submissions Figure 3 shows a scatter plot of the marks that secondyear undergraduate students achieved for the Spring 2014 iteration of the course versus the marks they would have been awarded had they only been assessed on their valid flag submissions. The mean difference in mark is 1.5, and the standard deviation is 2.5. The grade boundaries are positioned at 10-mark intervals between 40 to 70, therefore most students would have received the same overall grade; however, there are some exceptions, particularly around the highest grade boundary, with the maximum difference being 9 marks. The examinations for the other two iterations of the course have not yet taken place. In summary, our analysis shows a high correlation between a student s ability to successfully complete CTFstyle challenges and their continuous assessment marks. This suggests that flag acquisition is a useful assessment technique for academic cybersecurity courses. However, our data also suggests that assessing a student s ability to complete such challenges in isolation is not an appropriate method of assessing whether they possess a deep understanding of cybersecurity topics. Pedagogical value of written submissions and feedback. An issue that our analysis does not address is the educational value to students of writing down detailed answers to questions and receiving feedback on the answers they give; this process requires students to reflect on what they have done. Higgins et al. [5] provide evidence that students are driven by more than just obtaining high marks, and benefit from feedback that will help them engage with their subject in a deeper way. Flag-only marking would also deprive students of personalised feedback on their work: in every iteration of these courses, either the lecturer or a teaching associate would give detailed feedback on every written submission, something that students indicated was highly valued and a reason for their overall satisfaction with the course (in the end-of-course feedback questionnaires, students rated the feedback they received on average as the third-best amongst the courses offered by the School). However, after assisting students with the initial deployment of the VM, marking the written submissions and providing this feedback was the most labourintensive aspect of the courses. Plagiarism. Another (unfortunate) issue raised by flag-only marking is the potential for plagiarism. Across all three iterations of the course, we encountered three cases where groups of students submitted flags containing identical or inconsistent VM identifiers (which are intended to remain constant across the entire life of a single instance of the VM). In the first case, a group of four students submitted the same flag and very similar written answers for a particular question. When interviewed, they admitted copying from each other; they were given a warning and were awarded 0 marks for the entire exercise. In the second case, two students submitted the same flag but different written answers; when interviewed, it was found that they were both using low-spec tablet PCs to attempt the challenges and were sharing a single instance of the VM on an external hard drive. Both students were given words of guidance. In the final case, it emerged that, upon being the first to solve one of the more difficult challenges, a student posted a screenshot of his flag on Facebook to show off to his friends, from where one of his friends duly transcribed the flag and submitted it to the flag submission server before him. The students were penalised for their lack of foresight and lack of ethics respectively. We also encountered a case in which two students submitted flags unique to their own instances of the VM but plagiarised their written answers; both students were penalised; this case would not have been caught had flagonly marking been used. Flag-only marking would also massively increase the reward to students for plagiarising; questioned informally, some students said that there was no benefit to plagiarising flags because of the additional requirement to accompany them with written 7
8 answers. Overall, we saw much lower rates of plagiarism on our courses than on those with similar amounts of continuous assessment contributing toward the final course mark; we speculate that having to submit flags as well as written answers was a deterrent for plagiarism, as students could no longer simply copy and paste a written answer but had to demonstrate understanding of the written answer by acquiring a flag from their own VM instance too. 4 Conclusion We have shown that Jeopardy-style CTF challenges can be adapted for an offline VM framework and used as part of the formative assessment for an academic cybersecurity course. Exercises developed as part of this framework were considered difficult by students but were also very popular. Automatic marking of flag submissions complemented by manual marking of detailed written answers provided students with instant feedback while progressing through an exercise, provided them with highly-valued detailed feedback after completing the assessment, improved student satisfaction with the course, and helped course staff to monitor and quickly mitigate incidences of plagiarism. By comparing the number of valid flags submitted by students and the marks awarded for their written answers, we have shown that the ability of students to acquire flags in CTF-style challenges is highly correlated with their overall marks, and that flag-based marking effectively assesses a student s basic skills and understanding of cybersecurity topics. However, acquiring flags is much less well-correlated with a student s deeper understanding of the underlying issues; flag-only marking may also lead to more widespread plagiarism and fail to satisfy students expectations of feedback. Therefore, we conclude that basing the formative assessment for an academic cybersecurity course on a combination of automatic flag-based marking with manual marking of detailed written answers provides a highly satisfactory student experience. We are continuing to extend our framework with additional exercises. Schreuders and Ardern [7] have developed a method of generating individual VMs for each student, which may be an alternative to our startup program. We will also continue our analysis of how well acquiring flags in CTF-style challenges corresponds to traditional educational assessment, with the aim of providing more long-term data. References [1] ANDREEA-INA RADU AND SAM L. THOMAS. Organising Monkeys or How to Run a Hacking Club. In Workshop on Cybersecurity Training & Education (VIBRANT15) (2015). [2] BURSZTEIN, E., GOURDIN, B., FABRY, C., BAU, J., RYDST- EDT, G., BOJINOV, H., BONEH, D., AND MITCHELL, J. C. Webseclab Security Education Workbench. In 3rd Workshop on Cyber Security Experimentation and Test (CSET 10) (2010). [3] CHEUNG, R. S., COHEN, J. P., LO, H. Z., ELIA, F., AND CARRILLO-MARQUEZ, V. Effectiveness of Cybersecurity Competitions. In Proceedings of the International Conference on Security & Management (2012). [4] DAVIS, A., LEEK, T., ZHIVICH, M., GWINNUP, K., AND LEONARD, W. The Fun and Future of CTF. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (2014). [5] HIGGINS, R., HARTLEY, P., AND SKELTON, A. The Conscientious Consumer: Reconsidering the role of assessment feedback in student learning. In Studies in Higher Education (2002), vol. 27. [6] MIRKOVIC, J., AND PETERSON, P. Class Capture-the-Flag Exercises. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (2014). [7] SCHREUDERS, Z. C. AND ARDERN, L. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment. In Workshop on Cybersecurity Training & Education (VIBRANT15) (2015). [8] VIGNA, G., BORGOLTE, K., CORBETTA, J., DOUPÉ, A., FRATANTONIO, Y., INVERNIZZI, L., KIRAT, D., AND SHOSHI- TAISHVILI, Y. Ten Years of ictf: The Good, The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (2014). 8
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates
How To Teach A Cyber Security Course
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Effectiveness of Cybersecurity Competitions
Effectiveness of Cybersecurity Competitions Ronald S. Cheung, Joseph Paul Cohen, Henry Z. Lo, Fabio Elia, Veronica Carrillo-Marquez Department of Computer Science University of Massachusetts Boston Boston,
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Computer Security. Draft Exam with Answers. 2009.
Computer Security Draft Exam with Answers. 2009. Please note that the questions written here are a draft of the final exam. There may be typos in the questions that were corrected in the final version
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Controls Book
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program s Book Cyber-security s Summary Council on Cyber-security Critical Security s (CSC) CSC-01 CSC-02 CSC-03 CSC-04 CSC-05 IT Asset
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
158.738. Implementation & Management of Systems Security. Amavax Project. Ethical Hacking Challenge. Group Project By
158.738 Implementation & Management of Systems Security Amavax Project Ethical Hacking Challenge Group Project By Nawed Rajeh Mansour Kavin Khan Al Gamdi Al Harthi Palanavel The Amavax project required
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Modern Binary Exploitation Course Syllabus
Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Web Applications Security: SQL Injection Attack
Web Applications Security: SQL Injection Attack S. C. Kothari CPRE 556: Lecture 8, February 2, 2006 Electrical and Computer Engineering Dept. Iowa State University SQL Injection: What is it A technique
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
SAVMDS: A Software Application Vulnerability Management Dashboard System
, July 2-4, 2014, London, U.K. SAVMDS: A Software Application Vulnerability Management Dashboard System Mauranda Elliott, Huiming Yu, Xiaohong Yuan and Justin Zhan Abstract-A vulnerability management tool,
Technical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
A Guide to Preparing for the GSM Capstone Exam
A Guide to Preparing for the GSM Capstone Exam by: Courtney Imbert, [email protected] Last update: November 11, 2015 An Overview of the GSM Capstone Exam The GSM (GIAC Security Manager) is the capstone
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Setting Up Specify to use a Shared Workstation as a Database Server
Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY
INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
VOLUME 4. State of Software Security Report. The Intractable Problem of Insecure Software
VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011 Executive Summary The following are some of the most significant findings in the Veracode State
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
