Dedicated and Distributed Vulnerability Management
|
|
|
- Phyllis Cameron
- 10 years ago
- Views:
Transcription
1 Dedicated and Distributed Vulnerability Management December 2002 (Updated February 2007) Ron Gula Chief Technology Officer
2 Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 THE NEED FOR VULNERABILITY ASSESSMENT... 3 MANUAL VULNERABILITY ASSESSMENT... 3 ADVANTAGES OF DEDICATED VULNERABILITY ASSESSMENT... 5 ADVANTAGES OF DISTRIBUTED VULNERABILITY ASSESSMENT... 8 CONCLUSIONS... 9 ABOUT THE AUTHOR... 9 ABOUT TENABLE NETWORK SECURITY
3 Introduction It has become best practice for organizations with large networks to conduct vulnerability assessments. These assessments produce a list of network computers which have security problems that may allow information to leak out unauthorized, or possibly allow an intruder to enter a computer illegally. Typically, these vulnerability assessments are conducted on a periodic basis, by a select group of people specifically responsible for computer security within the organization, or by a third party such as a consultant group on a periodic basis. Unfortunately, this manual approach is too slow to keep up with the fast pace that vulnerabilities are disclosed to the general public. It is also the wrong approach to provide information to all of the system administrators within a large organization whose job it is to secure the detected vulnerabilities. This paper will outline the need for a dedicated approach to conducting vulnerability assessments and also address many of the advantages of distributed vulnerability scanning. We will describe how a dedicated solution to conduct vulnerability assessments can approach the type of solution to effect real vulnerability management. The Need for Vulnerability Assessment Every year, the Computer Emergency Response Center ( publishes more and more vulnerability disclosures. These disclosures come from product vendors, security research companies, and many other sources. In 2000, CERT reported 1,090 vulnerabilities. In 2001, this number rose to 2,437 vulnerabilities, and by Q3 of 2002, over 3200 have been reported. Of course, each one of these vulnerabilities are not present on every network, and each vulnerability is not as serious as the next one, but there is no way to know the impact of the vulnerabilities on a given network without looking at how they affect the given network directly. For example, a simple vulnerability in a web service application which allows the remote browsing of the contents of a directory may seem innocuous, but combined with a server that processes credit card information, this vulnerability could disclose end-user private information. The challenge of the security professional, whose job it is to assess a network for each of these potential vulnerabilities, is also quite daunting. To do this, automated tools are used to catalog each of the computers on a network, and then to interrogate the discovered computers for any known vulnerabilities. Typically these automated tools are run from a single computer and have a database of the top 1000 vulnerabilities. When run, they produce reports about the types of computers discovered, and lists of the potential vulnerabilities found. Once the vulnerability assessment is completed, the information is communicated to those who can fix the problems discovered. This starts a feedback loop of scanning, patching, and then re-scanning to discover new vulnerabilities, or vulnerabilities which were known and yet to be mitigated. Manual Vulnerability Assessment 3
4 The process of having a security professional conduct an automated vulnerability scan is referred to as a manual vulnerability scan. Even though the tool used is highly automated, the process of scheduling a scan, selecting the network targets and producing a report is highly subjective and may change from scan to scan. Typically, there may be a longer time between scans associated with this approach due to scheduling, availability of consultants, and maintenance windows. Advantages Lest the reader conclude that the author is against professional security testing, we will now point out the many advantages of this approach. Please keep in mind that our goal is to illustrate the differences between a manual scan and dedicated vulnerability assessment. 1. Manual scans are typically more thorough When compared with a solution that simply checks for a large number of vulnerabilities on a regular basis, a manual scan is much more likely to discover unique vulnerabilities. Although you may hear about how a particular vendor s vulnerability scanning solution emulates a hacker, the truth is that these solutions do not stand up to the types of information that can be discovered by an experienced penetration tester. It is also much more likely that a manual penetration test will be able to chain together many smaller vulnerabilities to uncover a major security flaw. 2. Manual scans can investigate human and physical weaknesses Typically, a manual scan (most normally associated with an outside consultant) will also include an investigation into the practices of the IT and network engineering staff, as well as an evaluation of the security policy, physical security and possibly even incident response procedures. 3. Manual scans can be very unbiased A manual scan that is conducted by a third party is also much less likely of being biased. This can include tainting of the report to reflect more or less seriousness of discovered vulnerabilities. It can also be advantageous when discovering systems on a network. For example, someone that is familiar with a network may assume that just because a target machine has the IP address of the laser printer, that it is indeed the laser printer and not try more exhaustive attacks. 4. Manual scans can identify architectural flaws in security Limitations An experienced security auditor should be able to make generic recommendations that have extremely high impact to reduce the overall security exposure. This may include subtle changes to the security policy, firewall policy, maintenance of systems, education of network users, and so on. Although the manual approach has many advantages, in practice, many networks continue to fail security audits and contain high numbers of security flaws. The point of a dedicated vulnerability assessment solution is to address many of these shortcomings. 1. Manual scans can be painfully slow 4
5 To conduct a scan of a class B (over 60,000 potential IP addresses) can take one computer a full week to conduct a scan. This is very difficult because you may be paying for the engineer s or consultant s time to complete the scan. During this time, the topology of the network may radically change as new systems are moved, added and removed. 2. Manual scans can cause network outages Modern network applications are not as robust as you may believe. It is very easy to conduct a localized denial service attack on applications which are poorly written, or have high CPU consumption. Conducting a manual scan of a network can inadvertently cause a network crash. Also, the act of network discovery can cause stability issues with firewalls, load balancers, routers and switches. To increase performance, modern network hardware attempts to accelerate network transactions by keeping track of network sessions. When faced with large amounts of port scans, i.e. scans which launch more than 10,000 scans per second, many of these hardware and software optimizations become stressed and fail. 3. Manual scans are difficult to communicate Once a scan is completed, a worse case scenario that many Chief Security Officers face is the realization that fixing all of the detected vulnerabilities is difficult. There is ample room for system administrators to claim lack of resources, lack of patches, or in some cases, lack of direction. In some cases, it can be very difficult to find out who even owns a particular server to even have a conversation with them about patching it. As such, many reports are read and then shelved. In other cases, the security group presents the IT or network organizations with unrealistic security requirements, which creates tension and a culture of where the groups are working against each other instead of being cooperative. Advantages of Dedicated Vulnerability Assessment When we say Dedicated Vulnerability Assessment we are talking about deploying a solution for a large organization that should have the following properties: Predictable Scanning The solution should be able to scan the network at a regular interval. This should include being able to scan sensitive systems during maintenance windows or off-hours. When scans start and stop, they should notify people so that if something goes wrong, an analysis of the impact of the scan can be conducted. The same network ranges should be tested repeatedly for discovery of missing and new systems. The advantage of predictable scanning is that it becomes part of network operations. It may take time to create a culture to accept scans on a regular basis, but it is a very good way to catch new vulnerabilities in a short amount of time. Once this becomes part of the network culture, it is also less likely that network users will run unauthorized servers and applications. It can also become a very good way to prevent the use (or detect the use) of file sharing applications such as Bear Share, WinMX and Goto-My-PC. Incremental Tracking of Trends 5
6 The solution should track the trend of vulnerabilities and network information. It would be great to see over time the change in deployed operating systems for example. It is of even more use to identify which subnets are always lagging behind in patches or have the most vulnerabilities. Later we will discuss correlation with intrusion detection systems. Some organizations have drawn parallels between poor security and the number of intrusions (which should be obvious), but they have then related this to the cost of responding to incidents and used this as a justification for more resources. The direct advantages of trending vulnerabilities should be obvious to the reader. One advantage of conducting this trend that may not be so obvious is that the solution should make available, the most recent snapshot of the network s systems and vulnerabilities. This is vital to determine what the current baseline is. Typically, a manual scan may compare a scan of last quarter with one from this quarter to find differences. With a dedicated solution that kept a database, new systems can be identified as soon as they are discovered. For example, if a baseline existed and a new Windows 2000 server was added to the DMZ, this could be detected, even though it may not have any vulnerabilities on it. This would allow a security group to keep better track of what is occurring on a network. Appliance and Web Solutions Any dedicated solution should take advantage of modern network infrastructure. Deploying the vulnerability assessment solution on a dedicated platform guarantees the proper network availability, bandwidth and visibility into the scanned networks. Conducting scans from outside of the network is interesting, but is only an external scan. Placing a dedicated scanning server within the infrastructure allows for better visibility. Deploying on an appliance (or dedicated server) also provides the opportunity to harden the system and control access to it. Compared to a mobile scanning laptop, this solution is much more secure. The solution should also be able to securely publish the results of its scans via a web interface. This would guarantee that almost every system administrator would be able to view the vulnerability results for their system. Compared to systems which are only viewable on X-windows or the Windows operating system, distributing the raw results can be difficult. Automatic Updates of Vulnerability Checks It should go without saying that a vulnerability solution that is not updatable with the latest vulnerability checks will become less and less relevant and provide a false sense of security. Almost every vendor solution includes some sort of live updates. However, a solution that can schedule the updates such that it can guarantee that the most recent checks are available is desirable. Manual updates are convenient, but make it difficult to set a policy of synchronizing every 24 hours. Keep in mind that vulnerabilities are published so fast, one update can be the difference between finding a major vulnerability which is being actively exploited today, versus finding it two or three days later. The advantages of automatic updates include the confidence that your vulnerability scanner is checking for the latest potential problems. Distribution of Results and Tasking to End-Users This is a key advantage of a permanent vulnerability assessment solution. With manual scanning, the distribution of vulnerability information can be chaotic. How do you get the vulnerability information for just one system administrator to them? A dedicated solution 6
7 can slowly build a list of end-user or system administration owners though population of a database. When it becomes a corporate requirement to use such a system, the management of system administrators will populate the system with a hierarchical approach. For example, the manager of a network may know that she has ten administrators for fifty machines and will enter each one into the system of approved endusers. Although this may seem difficult, it has two advantages. First, it provides the system with a chain of ownership. Any server can be associated with one or more end users, and the end users can be associated with specific organizations. This provides accountability. Second, when a particular system is found vulnerable, the owner can be quickly contacted. For patching systems, many solutions exist which allow security personal to task IT and network engineering personal with patching and mitigation orders. These systems typically fail in large organizations. This is because the security group rarely has a good understanding of the realities facing operating a large network and the folks that are supposed to fix these vulnerabilities do not work for the security group. What is needed is a flexible way for the security group to issue recommendations that are generally followed by the rest of the organizations. It is important for the end user system administrators to have flexibility in how they patch something. First off, it is important that any dedicated system be flexible in the recording of how a vulnerability is mitigated. For example, a web server may be found to be vulnerable, but to also be not needed at all. In this case, it should be up to the system administrator to have the flexibility to simply disable the web server. Any dedicated system should be able to record the recommendations of the security group, and the remediation actions that the system administrators undertake. The advantage of this approach is flexibility and accountability. The security group is able to issue information which is helpful. The system administrators are also able to record what they do to fix the security problems. This provides a feedback loop which can also identify problems which bring back old vulnerabilities. Scanning can be Tuned to Minimize Impact With a dedicated vulnerability assessment solution, the entire system of system administrators and security personal can provide feedback to tune the system. For example, if a certain vulnerability check crashed a DNS server, this check could be disabled until the server is protected. This can make for very efficient scanning. Also, some vulnerability checks will produce false positives in that they say a particular vulnerability exists, when in fact it does not. Working with system administrators can eliminate these false positives over time. The advantage of tuning a vulnerability scan results in better vulnerability information. With a dedicated system and scans occurring often, the scan can be modified to avoid outages and product better results. Correlation with Intrusion Detection Systems One of the last basic advantages that a dedicated vulnerability assessment solution can provide is direct correlation with intrusion detection systems (IDS). Many intrusion detection systems produce thousands, if not tens of thousands of alerts a day. A majority of these alerts are valid attacks, but are not valid compromises. Many are false positives that have 7
8 detected an attack that would not work against the target system because it is not vulnerable to the attack. By employing a solution that can correlate IDS events with known vulnerabilities, high quality IDS alerts can be obtained. It is fairly trivial to build a list of IDS events that correlate to known vulnerabilities through the use of the Common Vulnerabilities and Exposures database ( This database has cataloged the many thousands of vulnerabilities and assigned unique serial numbers to them. This allows many security vendors to maintain their own unique intellectual property of security knowledge, but reference the relevant CVE information for correlation and more information. From a vulnerability assessment standpoint, a high quality IDS event is one that we know is a real compromise or information leak. For example, if we knew that one system in a server group were vulnerable to a particular vulnerability, and we had an IDS event occur which went against that same vulnerability, we could conclude that particular IDS event had a much higher chance of being successful than other IDS events which did not go against known vulnerabilities. Put another way, IDS solutions tend to generate thousands of events, many of which are not applicable or have no chance of succeeding. Only alerting on the events which targeted vulnerable systems can greatly reduce the signal to noise ratio of IDS alerts. One last advantage of IDS correlation with known vulnerabilities is to assess the intent of what a hacker may be attempting when targeting a vulnerable server. The server may indeed have other vulnerabilities that the hacker had tried to exploit which were not detected by the IDS. If a targeted system has many vulnerabilities and is attacked, it raises the importance that the machine be secured and vulnerabilities mitigated. Advantages of Distributed Vulnerability Assessment Although we have been discussing some of the advantages of dedicated vulnerability assessment solutions, deploying a distributed vulnerability detection system still has more advantages. Some of these are discussed below: Speed When scanning a large network, the speed of the scan is paramount. Slow scans can take days if not weeks to scan very large networks. It is quite common for manual scans to break up a large network by subnet and scan them individually. By distributing the scan across many nodes, parallel scanning can occur. When scanning in parallel, the list of vulnerability checks and target IP addresses is split up between each node. Since vulnerability scanning is a combination of CPU intensive checks, and a good deal of time waiting for responses from target machines, splitting up the effort can greatly decrease the time it takes to scan a network. Typical scans sweep the target network to find the active hosts, sweep the hosts to find the active ports, and then interrogate each port to find active vulnerabilities. This process involves a lot of checks which send specific packets or queries and then wait for the reply. In some cases, the scanner never gets a reply and it has to wait 30 seconds or so to time out. For example, checking a host to see if it is alive may require 3 seconds. For 60,000 hosts this can be done in parallel by a single computer, but only so many hosts (possibly 8
9 100) can be done at the same time. Splitting this among 5 or more scanners can allow scans to proceed much quicker. An advantage of speed is that an organization can quickly access its network structure and build a topology without having to wait 24 hours or longer. If a new security flaw is discovered and it is a priority to find all of the servers who have this problem, accessing a very large network for it can occur in a matter of minutes with a distributed solution. Minimal Network Infrastructure Impact Even though we have more systems conducting scans across a network with a distributed approach, there can be less impact to the network infrastructure. By placing scanning agents closer to their target networks, the port scans and other probes do not flow across the core router and switching fabric. This causes less network outages and performance degradation, rather than pumping 15,000 packets or so per host against up to 60,000 hosts. As was discussed in a previous section, modern networking equipment is over-optimized to accelerate network transaction on a per-session basis. When these devices are presented with high new-session rates, or simply high numbers of sessions, there can be problems. Also, networks scans can produce large numbers of packets designed to exercise their targets. These odd packets can stress switches and routers. If network equipment is not robust, the simple act of carrying an attack from one side of the network to the other may be enough to crash a router or server. Another advantage of placing scanner agents closer to the target networks is that the scans may take place behind a firewall. Having to reconfigure a firewall to let a security scan in can be a troublesome security task. Likewise, scanning a network protected by a firewall will let you see how the external world to the network sees it, but many internal vulnerabilities can go undetected. Conclusions Large networks should deploy dedicated vulnerability assessment systems to truly participate in the benefits of vulnerability discovery. They should also continue to conduct manual vulnerability assessment solutions as well. In essence, corporations should take the next step and participate in vulnerability management and create a culture through their organization of minimizing vulnerabilities About the Author Ron Gula is a Founder and Chief Technology Officer of Tenable Network Security. Tenable is a company that produces the Lightning Proxy for high-speed Nessus vulnerability scans and the Security Center (formerly Lightning Console) for correlating IDS data with vulnerability data and making it available to multiple people in multiple organizations. Previously, Mr. Gula was the original author of the Dragon IDS and CTO of Network Security Wizards which was acquired by Enterasys Networks. At Enterasys, Mr. Gula was Vice President of IDS Products and worked with many top financial, government, security service providers and commercial companies to help deploy and monitor large IDS installations. Mr. Gula was also the Director of Risk Mitigation for US Internetworking and was responsible for intrusion detection and vulnerability detection for one of the first application service providers. Mr. Gula worked for BBN and GTE Internetworking where he conducted security assessments as 9
10 a consultant, helped to develop one of the first commercial network honeypots and helped develop security policies for large carrier-class networks. Mr. Gula began his career in information security while working at the National Security Agency conducting penetration tests of government networks and performing advanced vulnerability research. 10
11 About Tenable Network Security Tenable, headquartered in Columbia, Md., USA, is the world leader in Unified Security Monitoring. Tenable provides agent-less solutions for continuous monitoring of vulnerabilities, configurations, data leakage, log analysis and compromise detection. For more information, please visit us at TENABLE Network Security, Inc Columbia Gateway Drive Suite 100 Columbia, MD TEL:
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
May 11, 2011. (Revision 10)
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques May 11, 2011 (Revision 10) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Copyright 2011. Tenable
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Tenable Tools for Security Compliance The Antivirus Challenge
Tenable Tools for Security Compliance The Antivirus Challenge January 20, 2005 (Updated February 7, 2007) Nicolas Pouvesl e / John Lampe Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 WHAT
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
How To Manage A Network Security Risk
Scanless Vulnerability Assessment: Skybox Security whitepaper July 2014 1 Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Security and Vulnerability Testing How critical it is?
Security and Vulnerability Testing How critical it is? It begins and ends with your willingness and drive to change the way you perform testing today Security and Vulnerability Testing - Challenges and
Vulnerability Assessment Report Format Data Model
I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Why you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
Firewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
Passive Vulnerability Scanning Introduction to NeVO
Passive Vulnerability Scanning Introduction to NeVO August 2003 revision 9 Renaud Deraison Director of Research Ron Gula Chief Technology Officer Todd Hayton Senior Security Engineer Introduction Passive
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
IDS or IPS? Pocket E-Guide
Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Asset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
