Voice-over-IP Risk Analysis.
|
|
|
- Gavin Lambert
- 10 years ago
- Views:
Transcription
1 Voice-over-IP Risk Analysis Enno Rey CISSP/ISSAP CISA Enno Rey, CISSP/ISSAP, CISA
2 Risk ISO/IEC GUIDE 73:2002 Combination of the probability of an event and its consequence where Probability = extent to which an event is likely to occur Event = occurrence of a particular set of circumstances Consequence = outcome of an event Voice-over-IP Risk Analysis 2
3 Risk Analysis ISO/IEC GUIDE 73:2002 systematic use of information to identify sources and to estimate the risk Source: item or activity having a potential for a consequence Risk analysis provides a basis for risk evaluation, risk treatment and risk acceptance. Information can include historical data, theoretical analysis, informed opinions, and the concerns of stakeholders. Voice-over-IP Risk Analysis 3
4 Security Objectives VoIP Availability Confidentiality Privacy Integrity (?) - of calls/transported data - of billing data/arrival time of voice mails/state of communication participants/etc. Compliance with regulations (Privacy protection, Lawful interception, 911 calls, other) Prevention/avoidance of identity spoofing - of caller/callee (both may lead to social engineering attacks) => billing fraud => other fraud (telephone banking) covert channels (Skype) Voice-over-IP Risk Analysis 4
5 VoIP Threats ( Sources ) Threats on protocol level Threats on connection level Threats on gateway level Threats on endpoint level Remote control of hosts / covert channels Voice-over-IP Risk Analysis 5
6 Threats on protocol level TP1: Poorly designed protocols may lead to breach of conf/int/avail il TP2: Bad implementations suffering from buffer overflows etc. TP3: Protocol complexity may lead to bad firewall configuration Voice-over-IP Risk Analysis 6
7 Example: Bad implementation with buffer overflow Voice-over-IP Risk Analysis 7
8 Threats on connection level TC1: Eavesdropping / Call Monitoring (Breach of confidentiality) TC2: Data Corruption / Modification (Breach of integrity) Denial-of-Service (Loss of availability) TC3: - by attack TC4: - by misconfig. (e.g. insufficient resources/prioritization) Voice-over-IP Risk Analysis 8
9 Threats on gateway level Note: term gateway applies to any central component like gateways, gatekeepers, call managers (CM), session border controllers (SBC), SIP proxies/registrars/redirectors etc. TG1: System compromise => Eavesdropping => Call redirection => Billing fraud Denial-of-Service TG2: - by attack TG3: - by misconfiguration (Loss of availability) Voice-over-IP Risk Analysis 9
10 Threats on endpoint level TE1: System compromise => Eavesdropping => Call redirection => Billing fraud TE2: Denial-of-Service - by attack (Loss of availability) TE3: VoIP endpoint as attack vector for malware spread (applies particularly to softphones) TE4: Covert channels Voice-over-IP Risk Analysis 10
11 Vulnerabilities Vulnerabilities on protocol level Vulnerabilities on connection level Vulnerabilities on gateway level Vulnerabilities on endpoint level Voice-over-IP Risk Analysis 11
12 Vulnerabilities on protocol level Designed without security in mind Protocols work with highly dynamic port assignments Voice-over-IP Risk Analysis 12
13 Example: Dynamic port assignments Voice-over-IP Risk Analysis 13
14 Vulnerabilities on connection level Nearly no encryption by default SRTP not used due to inter-vendor keymgmt incompatibilites Voice-over-IP Risk Analysis 14
15 Vulnerabilities on gateway level Designed/assembled/configured without security in mind Unsecure default configurations Segregation of duties principle may be violated Voice-over-IP Risk Analysis 15
16 Example: Components with teething problems Voice-over-IP Risk Analysis 16
17 Vulnerabilities on endpoint level Unsecure default configurations Poorly implemented (see Shawn Merdinger s research) Softphones may be prone to buffer overflows Isolation of softphones traffic may be difficult Voice-over-IP Risk Analysis 17
18 Example: Softphones may be prone to buffer overflows Voice-over-IP Risk Analysis 18
19 Toolbox of Mitigating Controls Mitigating Controls are taken from/named accordingly to Common Criteria i to use exact terminology. Only those relevant to VoIP were chosen. In the course of the risk analysis itself they will be referenced just by their class name. This means some of the controls listed in this document, in that class, can/should be implemented to mitigate the respective risk. Voice-over-IP Risk Analysis 19
20 Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FAU: SECURITY AUDIT FAU_GEN "Security audit data generation FAU_STG "Security audit event storage FAU_SAR "Security audit review FAU_SAA "Security audit analysis CLASS FCO: COMMUNICATION FCO_NRO "Non-repudiation of origin i FCO_NRR "Non-repudiation of receipt" Voice-over-IP Risk Analysis 20
21 Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FCS: CRYPTOGRAPHIC SUPPORT FCS_CKM CKM "Cryptographic key management FCS_COP "Cryptographic operation" CLASS FDP: USER DATA PROTECTION FDP_ACC "Access control policy FDP_ACF "Access control functions" FDP_DAU "Data authentication FDP_IFC/FDP_IFF IFF "Information flow control policy / functions FDP_SDI "Stored data integrity FDP_ UCT/FDP_ UIT "Inter-TSF user data confidentiality / integrity transfer protection Voice-over-IP Risk Analysis 21
22 Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FIA: IDENTIFICATION AND AUTHENTICATION FIA_AFL AFL "Authentication ti ti failures" FIA_UAU "User authentication" FIA_UID "User identification" CLASS FMT: SECURITY MANAGEMENT FMT_MOF "Management of functions in TSF FMT_MSA "Management of security attributes FMT_MTD MTD "Management of TSF data FMT_REV "Revocation FTM_ SMF "Specification of Management Functions FMT_SAE "Security attribute expiration FMT_SMR "Security management roles" Voice-over-IP Risk Analysis 22
23 Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FPT: PROTECTION OF THE TSF FPT_RPL "Replay detection FPT_STM "Time stamps FPT_TDC "Inter-TSF TSF data consistency CLASS FRU: RESOURCE UTILISATION FRU_FLT "Fault tolerance FRU_PRS "Priority of service FRU_RSA "Resource allocation" Voice-over-IP Risk Analysis 23
24 Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FTA: TOE ACCESS FTA_MCS "Limitation on multiple concurrent sessions" FTA_TAB "TOE access banners FTA_TAH "TOE access history FTA_TSE "TOE session establishment CLASS FTP: TRUSTED PATH/CHANNELS FTP_ITC "Inter-TSF trusted channel" Voice-over-IP Risk Analysis 24
25 Risk Analysis Protocol level Connection level Gateway level Endpoint level Voice-over-IP Risk Analysis 25
26 RA, Methodology used Numbers for likelihood and impact were chosen on a scale from one to five. Rating of impact is based on a mixture of several factors (breach of/loss of confidentiality/integrity/availability, violation of regulations). The impact rating largely depends on individual/environment/objectives/ settings. Your mileage might vary... Nevertheless some notes: - non-compliance nearly always leads to a 5 - loss of availability rarely gets a 5 (5 only used for disaster cases, which are out of scope here) - sometimes rating of impact depends on host count/scale concerned Assignment of numbers to respective threads is based on VoIP security common body of knowledge and author s experience/research. Here the risk is calculated by simple multiplication (see BS , 5.7). Voice-over-IP Risk Analysis 26
27 RA Protocol Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TP1, Poor protocol design TP2, Implementat. t leading to BO 1 5 Breach of con/int, Non-Compliance 1 5 Compromise of components 5 Class FCS, Class FDP 5 Class FAU, Class FDP TP3, Class FDP, Bad firewall Larger possible Stateful firewalls/algs config attack surface Voice-over-IP Risk Analysis 27
28 RA Protocol Level, Notes Since Oulu University Secure Programming Group research [1] on SIP and H.323 their common implementations can be considered less vulnerable. Presently most major firewalls are able to cope with SIP, H.323 and RTP without huge problems but still additional proprietary ports (e.g. for connections to CM or SBC) needed d frequently. Voice-over-IP Risk Analysis 28
29 RA Connection Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TC1, Eavesdrop. / 2 5 Breach of conf., 10 Class FCS, Class FDP, Call Monitor. Non-Compliance NW-Segmentation TC2, Data 2 5 Breach of conf., 10 Class FCS, Class FDP, Modification Non-Compliance NW-Segmentation TC3, Class FRU, DoS by attack Loss of service NW-Segmentation, SLAs TC4, Class FRU, DoS due to Loss of service Class FMT, misconfig Operational procedur. Voice-over-IP Risk Analysis 29
30 RA Connection Level, Notes Most important tools to eavesdrop VoIP connections include: vomit wireshark cain & abel oreka Voice-over-IP Risk Analysis 30
31 RA Gateway Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TG1, System 3 5 Breach of conf., 15 Class FMT, Class FDP, compromise Non-Compliance Hardening & OpSec TG2, DoS by attack 3 4 Loss of service 12 Class FRU, Class FTA TG3, Class FRU, DoS due to Loss of service Class FMT, misconfig Operational Procedur. Voice-over-IP Risk Analysis 31
32 RA Gateway Level, Notes Special attention should be paid to - SNMP - Default passwords (mgmt access, configured users) Apply usual hardening steps before going productive and (pen-) test! Bad protocol implementations may have side effects on devices purportedly not running VoIP at all (see for example [3]). Voice-over-IP Risk Analysis 32
33 RA Endpoint Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TE1, System 2 4 Breach of conf., 8 Class FMT, Class FDP, compromise Non-Compliance Hardening & OpSec TE2, DoS by attack 1 3 Loss of service 3 Class FRU, Class FRA TE3, Class FRU, Malwa. spread Loss of service, Class FMT, Backdoors Operational Procedur. TE4, FAU_SAA (IDS), Covert chann. Breach of con/int Desktop OpSec corporate level Do not use Skype! Voice-over-IP Risk Analysis 33
34 RA Endpoint Level, Notes Special attention should be paid to - SNMP - Open Ports/running services (e.g. Telnet) See presentations and advisories of Shawn Merdinger. (Strong) Authentication is your friend here x in the meantime available for some hardphones, check preferred vendor. Remember trunking/dtp security problems when using Cisco Voice VLANs... Did I already mention? ;-) Do not run Skype! Why? See [2] and [4]. Voice-over-IP Risk Analysis 34
35 Questions & Answers Voice-over-IP Risk Analysis 35
36 References [1] Oulu University Secure Programming Group: [2] Hackers call on Skype to spread Trojan: [3] Cisco Security Advisory: Vulnerabilities in H.323 Message Processing: [4] Biondi/Desclaux: Silver Needle in the Skype: NIST Special Publication "Security Considerations for Voice Over IP Systems : NIST IPTel/VoIP Security Technical Implementation Guide: NIST IPTel/VoIP Checklist: Voice-over-IP Risk Analysis 36
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007 Version 3.1 Revision 2 CCMB-2007-09-002 Foreword This version of the Common Criteria
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005 Version 2.3 CCMB-2005-08-002 Foreword This version of the Common Criteria for Information
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)
COMMON CRITERIA PROTECTION PROFILE for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) Revision No 1.1 Revision Date 11.07.2014 Document Code File Name SCM-WTS PROTECTION PROFILE Prepared
Certification Report
Certification Report EAL 2 Evaluation of Revenue Administration Department of Turkey/Gelir İdaresi Başkanlığı Common Criteria Protection Profile for New Generation Cash Register Fiscal Application Software-2
Common Criteria Evaluation for a Trusted Entrust/PKI
Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United
COMMON CRITERIA PROTECTION PROFILE. for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002
COMMON CRITERIA PROTECTION PROFILE for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002 Revision No 1.7 Revision Date 28.08.2013 Document Code File Name NGCRFAS PROTECTION
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-16-INF-682 v2 Difusión: Expediente Fecha: 13.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-16 Datos del solicitante: 440301192W HUAWEI References:
How To Manage Security In A Network Security System (Tsi)
SecureDoc Disk Encryption v4.3c Security Target for Common Criteria EAL-4 Abstract: This document represents Security Target Document for Secure Doc Disk Encryption product v4.3c. It specifies treats,
Network Intrusion Prevention System Protection Profile V1.1
Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection
Security Requirements for Network Devices
Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:
CERTIFICATION REPORT
REF: 2010-23-INF-808 v4 Target: Expediente Date: 22.12.2011 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-23 Huawei 3900 Series LTE enodeb Software V100R004C00SPC100
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
Criteria Requirements of Mobile Payment Application
보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014), pp.79-88 http://dx.doi.org/10.14257/jse.2014.02.11 Criteria Requirements of Mobile Payment Application Hyun-Jung Lee 1), Jae-In Shin 2), Kab-Seung
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
Villains and Voice Over IP
Villains and Voice Over IP Heather Bonin ECE 578 March 7, 2004 Table of Contents Introduction... 3 How VOIP Works... 3 Ma Bell and her Babies... 3 VoIP: The New Baby on the Block... 3 Security Issues...
Check Point Endpoint Security Full Disk Encryption Security Target
Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos
collaborative Protection Profile for Network Devices
collaborative Protection Profile for Network Devices Version 0.1 05-Sep-2014 Acknowledgements This collaborative Protection Profile (cpp) was developed by the Network international Technical Community
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
CERTIFICATION REPORT
REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
Security Target for Cisco Remote Access VPN
Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Voice over IP (VoIP) Vulnerabilities
Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT [email protected] "Security problems in state of the art IP-Telephony
Protection Profile for Network Devices
Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...
Protection Profile for Mobile Device Management
31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100 Security Target Evaluation Assurance Level: EAL 2+ Document Version: 0.7 Prepared for: Prepared by: Blue Coat Systems, Inc.
Cisco Catalyst Switches (3560-X and 3750-X) Security Target
Cisco Catalyst Switches (3560- and 3750-) Security Target Revision 1.0 6 June 2012 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms and Abbreviations...
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target
3eTI Technologies International 3e-525/523 Series Wireless Network Access Points Security Target Version 1.0 Revision I October 8 th, 2015 Page 1 2015 3e Technologies International, Inc. All rights reserved.
EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification
Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0
LogLogic v4.6.1 Open Log Management Platform Security Target Release Date: 30 June 2009 Version: 2.0 Prepared for: LogLogic Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 Prepared by: Savvis Federal
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Microsoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Document Information Version Number 1.0 Updated On December 19, 2014 Microsoft 2014 Page 1 of 446 This is
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
Huawei BSC6900 Multimode Base Station Controller Software Security Target
Huawei BSC6900 Multimode Base Station Controller Software Security Version: 1.07 Last Update: 2011-12-20 Author: Huawei Technologies Co., Ltd. Page 1/ 58 Index 1 Introduction... 5 1.1 Security Reference...
RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target
RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Top Layer Networks IPS 5500 E Security Target
Top Layer Networks IPS 5500 E Security Target Version 1.1 April 10, 2009 Prepared For: Top Layer Networks 2400 Computer Drive Westborough, MA 01581 Prepared By: CygnaCom Solutions Security Evaluations
Security Target Microsoft SQL Server Team
Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation
Trustwave Secure Web Gateway Security Target
Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
CyberArk Software, Ltd. Privileged Account Security Solution v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.
CyberArk Software, Ltd. Privileged Account Security Solution v9.1 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.8 Prepared for: Prepared by: CyberArk Software, Ltd. 57 Wells
Protection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5
PROTECTION PROFILE DEVELOPMENT
PROTECTION PROFILE DEVELOPMENT FOR CARD ACCEPTANCE DEVICE (CAD) WITH BIOMETRIC Norahana Salimin [email protected] ICCC 2013 Sept 10-12 Orlando Content PPWG Background Challenge Lesson Learn Sneak
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
VoIP Security: How Secure is Your IP Phone?
VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT
Common Criteria NDPP SIP Server EP Assurance Activity Report
Common Criteria NDPP SIP Server EP Assurance Activity Report Pascal Patin ISSUED BY Acumen Security, LLC. 1 Revision History: Version Date Changes Initial Release 7/20/2015 Initial Release Version 1.0
OmniPCX Enterprise Common Criteria Security Target
OmniPCX Enterprise Common Criteria Security Target ALCATEL-LUCENT Enterprise Product Group March 2010 Ref: 3EU_29000_0019_DEZZA_03 Alcatel-Lucent All Rights Reserved Alcatel-Lucent 2010 Table of Content
AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10
AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4
Dell Networking Switches Security Target. Version 1.0 January 22, 2015
Version 1.0 January 22, 2015 Revision History Date Version Author Description 06/16/2014 0.1 Cygnacom Solutions First Draft 08/01/2014 0.2 Cygnacom Solutions Vendor review & OS v9.6 updates 08/31/2014
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
Commercial Database Management System Protection Profile (C.DBMS PP)
Common Commercial Database Management System (C.DBMS PP) March 1998 Common Commercial Database Management System March 1998 Page ii Contents March 1998 1 Introduction... 1 1.1 Identification of... 1 1.2
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih
luiz eduardo cissp, ceh, cwne, gcih who am I? networking guy security guy employed by Aruba Networks wlan network for defcon, blackhat & ccc regular speaker at cons founder, dc55.org and... agenda intro
