A Multi-layer Tree Model for Enterprise Vulnerability Management
|
|
|
- Harvey Farmer
- 10 years ago
- Views:
Transcription
1 A Multi-layer Tree Model for Enterprise Vulnerability Management Bin Wu Southern Polytechnic State University Marietta, GA, USA Andy Ju An Wang Southern Polytechnic State University Marietta, GA, USA ABSTRACT Conducting enterprise-wide vulnerability assessment (VA) on a regular basis plays an important role in assessing an enterprise s information system security status. However, an enterprise network is usually very complex, divided into different types of zones, and consisting of hundreds of hosts in the networks. The complexity of IT systems makes VA an extremely timeconsuming task for security professionals. They are seeking for an automated tool that helps monitor and manage the overall vulnerability of an enterprise. This paper presents a novel methodology that provides a dashboard solution for managing enterprise level vulnerability. In our methodology, we develop a multi-layer tree based model to describe enterprise vulnerability topology. Then we apply a client/server structure to gather vulnerability information from enterprise resources automatically. Finally a set of well-defined metric formulas is applied to produce a normalized vulnerability score for the whole enterprise. As a prototype, we developed the implementation of our methodology, EVMAT, an Enterprise Vulnerability Management and Assessment Tool, to test our method. Experiments on a small E- commerce company and a small IT company demonstrate the great potentials of our tool for enterprise-level security. Categories and Subject Descriptors K.6.5 [Management of Computing and Information Systems]: Security and Protection; I.5.1 [Pattern Recognition]: Models- Statistical General Terms Security, Measurement, Algorithms Keywords Enterprise vulnerability, Multi-level tree model, Assessment, EVMAT, NVD. 1. INTRODUCTION Conducting enterprise-wide vulnerability assessment on a regular Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGITE 11, October 20 22, 2011, West Point, New York, USA. Copyright 2011 ACM /11/10...$ basis plays an important role in assessing an enterprise s information security status. However, the inherent complexity of information systems and the rapid emergence of new vulnerabilities make it extremely time-consuming task for security professionals. It is common for a moderate enterprise to have hundreds of different IT resources such as computer hardware and software, distributed in different zones of enterprise. When the IT resources scale up, it is increasingly challenging for a centralized manager to scan the vulnerability information against each IT resource or asset in the enterprise networks and further quantify the overall vulnerability status thus create corresponding security mechanisms. Security professionals are seeking an automated tool to help monitor and manage the complex IT resources. In this paper, we present a new multi-layer tree model-based approach to support the centralized management of enterprise vulnerability, which is essential for enterprise risk management. Our methodology firstly provides an efficient model to describe an enterprise vulnerability topology. Here we abstract an enterprise as a collection of business goals, such as E-commerce, customer services, and financial accounting, etc. These business goals are established by the senior managers of an enterprise. Only by meeting these business goals, can a company maintain its competitiveness in the business and market. In an enterprise, there are a large number of IT resources contributing to business goals. For instance, an HTTP server and database play the core roles of E-commerce business goal. In general, we assume that we have a formal description of an enterprise IT resources with respect to the device, weight, and their functioning roles to the business goals. To support the modeling of an enterprise vulnerability topology, we implemented EVMAT, which provides a user-friendly GUI help construct the model using the above three elements. With the initial model of an enterprise vulnerability topology, we assign different weights and interests to all business goals and resources to identify the importance of a business goal/ resource to the enterprise. Then we utilize Common Vulnerability Scoring System [1] to calculate the vulnerability scores for all leaf business goals. Thirdly, we provide a multi-layer C/S structure tool to gather and extract system characteristics from all resources in the enterprise network based on the Open Vulnerability and Assessment Language [2] standards and further retrieves vulnerability data from National Vulnerability Database [3] in order to evaluate software vulnerability scores corresponding to those resources. Then we rank the weaknesses of each product installed in a resource to support decision making of security professionals. Fifthly we calculate the overall vulnerability score of a resource and the corresponding impact score to the business 257
2 goals it contributes to. Finally, we produce a normalized vulnerability score for the whole enterprise based on a set of welldefined metric formulas. 2. RELATED WORK Existing literature such as Zhang et al. [4], Adnerson et al. [5] and Shi et al. [6] provides different models to describe enterprise security. In particular, Adnerson et al. [6] provides a formal enterprise level model of security used for canonical representation, identification of components that need to be measured. Shi et al. [4] provides another modeling methodology to manage the network security in enterprise. However, both of them did not provide any methodology to measure the security level of an enterprise. A number of research papers such as Lee et al. [7], Liao, Striegel and Chawla [8], Homer [9], and Chen et al. [10] focus on the evaluation and management of enterprise network security. Myerson, Judith M. [11] indentifies vulnerabilities in an enterprise network environment. Chen et al. addressed a comprehensive approach to enterprise network security management. There are some researches utilizing the enormous vulnerability data from NVD to evaluate vulnerability of a software product. Wang, J., Wang, H., Guo, M., Zhou, L., Camargo, J. [12] provides a set of security metrics to rank attacks based on vulnerability analysis. Wang, J. and Guo, M. [13] proposes a novel methodology of using Bayesian networks to automating the categorization of software security vulnerabilities based on standardized vulnerability data. 3. ENTERPRISE VULNERABILITY TOPOLOGY In this section we discuss our model of enterprise vulnerability topology for calculating the overall vulnerability score of an enterprise. There are three principles in our modeling method: An enterprise is a collection of business goals. These business goals form a tree of business goals with each node a business goal associated with a different interest (weight). The root business goal must be the top of the business existence. For each business goal, it may have multiple children business goals. Each leaf business goal utilizes a number of IT resources to reach its goal. A resource can contribute to one or more business goals. For a pair of resource and business goal, weight is used to measure the importance of a resource contributing to that business object. Each leaf business goal should have a vulnerability score using the transferred CVSS base metrics. This quantitative score describes the characteristics and impacts on that business goal when it becomes vulnerable due to its internal defects and external threats. 3.1 Model Demonstration In Figure 1, means the relationship between a business goal and its children business goals. means the relationship between a business goal and the resources it utilizes. From this figure, it is evident that the root business goal is the Company node. It has two business goals: one is E-commerce and the other is Internal IT system. Also E-commerce has two children business goals: Online selling and Data backup. Two servers are used for reaching the goal of Online selling: e-commerce.server.id1 and e- commerce.server.id2. Then we need to determine the interest (weight) of a business goal related to its parent business goal. The same as resource, we need to determine the weight (range from 0-10) of a resource for a business object. Figure 1: Sample enterprise vulnerability topology. 3.2 Multi-layer Tree Model The model in section 3.1 is useful when modeling a small company. However, when the enterprise scales up, consisting of tens of business goals and hundreds of IT resources, it is neither trivial nor convenient to put all things in a single chart. Here we introduce the multi-layer tree model to hide details of low layer elements. The top layer tree model can be only main business goals and for the second layer, the root is one of main business goals and the business goal can extend to some sub-business goals. For the lower layers, business goals are connected with resource groups. The lowest level only consists of leaf business goals and resources. Figure 2 demonstrates a sample multi-layer tree model of an IT company. Figure 2: Multi-layer tree model of an IT company. 258
3 In figure 2, the top layer of constructed model only consists of three main business goals: Software Development, Website Maintenance and Internal IT system. The second layer extends Software Development business goal to three sub business goals. The third level describes the relationship of Java Implementation business goal and the IT resources contributing to it. In this way, our multi-layer model hides details of low layer resources from senior security managers and allows primary security professionals to focus on the IT resources belongs to them. 4. TECHNOLOGY DETAILS In this section, we discuss the algorithm and technical details of our approach based on the discussion above. 4.1 Vulnerability of a Business Goal In our model, we evaluate the vulnerability score of leaf business goal. For a parent business goal, the vulnerability score equals to the maximum vulnerability score among its children. CVSS is a suite of standard measurement systems for industries, organizations and governments that need accurate and consistent vulnerability impact scores. It is most used for evaluating individual IT vulnerabilities. In our methodology, we transfer the calculation of base metrics in CVSS to compute the vulnerability of a business goal. Figure 3: A sample scoring of online selling. The base metrics of CVSS captures the characteristics of a vulnerability that are constant with time and across user environments. Similarly in the measurement of an IT product s vulnerability, the Access Vector, Access Complexity and Authentication metrics capture how the vulnerability existed in a business goal is accessed and whether or not extra conditions are required to exploit it. The three impact metrics, confidentiality, integrity and availability metrics measure how a vulnerability, if exploited, will directly affect that business goal. The scoring formula of base metrics can be found in [14]. Figure 3 is a sample interface scoring of business goal online selling in Figure Vulnerability of a Software Product For each machine, we use OVAL Interpreter to attain the system characteristics XML files from different resources, then a product vulnerability calculator extracts the Common Platform Enumeration [16] information of every product and then calculates the vulnerability score based on the data retrieved from NVD [22]. NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol [17]. For a record in the NVD, it contains CVE-id (Common Vulnerabilities and Exposures) [18], vulnerability-configuration, vulnerable-softwarelist, published date and time, CVSS base metrics and scores, Common Weakness Enumeration(CWE) [19] summary of a vulnerability and so on. We extract all vulnerability data that has impact on the input product and then compute the software vulnerability score. We adopt the security metrics in Wang et al. [12] with modification that takes time phase into consideration. Rigorous measurement of software security can provide substantial help in the evaluation and improvement of software products and processes. However, little agreement exists about the meaning of software security and how to define software security. We define software security metrics based on the representative weakness of the software as shown in the formulas below: m P n W n SM ( s ) (1) n 1 Where SM(s) stands for the security metrics for the software s, and P i (i = 1, 2,, m) are the severity of those representative weakness W i in the software s. Note that a software product may have many weaknesses and flaws. Here representative refers to those weaknesses that lead most vulnerabilities that may be exploited by attackers. Suppose the weakness corresponding to has k vulnerabilities and their corresponding CVSS base scores are,,,. The severity of this weakness,, is defined as the average score of them, as demonstrated in the formula (2) below. W n K i V i 1 (2) K In formula (1), each (n = 1, 2,, m) represents the risk of the corresponding weakness. We use the percentage each representative weakness occurs in the overall weakness occurrences to calculate as the formula (3) below. R i (3) Pn m R i 1 i Where is the frequency of occurrences for each representative weakness over a span of time in months, as illustrated in formula (4) below, where K is the number of vulnerabilities related to each representative weakness, and M is the number of months. K R n (4) M To make the value of software security metrics SM(s) to range from 0 to 10, we require that the following formula (5) hold for P n, that is, their sum becomes 1. As shown in the formulas above, we define software security metrics based on the representative weaknesses of the software. 259
4 For a given piece of software, we first find out those typical weaknesses reported in Common Weakness Enumeration (CWE) related to the software and calculate the number of vulnerabilities caused by these weaknesses. Some weakness causes more vulnerabilities than others. We pick up those weaknesses that cause most vulnerabilities as our representative weaknesses. After identifying the representative weaknesses for the software, we incorporate the severity of representative weaknesses into the security metrics. The severity of a vulnerability is captured by calculating the percentage of occurrences of this vulnerability compared with the total occurrences of all vulnerabilities. m P n n 1 1 (5) 4.3 Vulnerability of a B-R Relationship Before calculating the vulnerability score of a B-R relationship, users can determine the important level of a specified software product or allow EVMAT tool to assign the importance level. For instance, for a resource performs as an HTTP server, the apache server and MySQL are the core components to achieve its functionality while a browser like Firefox seems to be unrelated. There are three kinds of important level: core, related and unrelated, describing how a product influences the functionality of a resource. After assigning these values, we can calculate the overall vulnerability of a resource. S R V L,1 (6) In formula (6), Vi is the vulnerability score of a product installed in the resource. Li is the importance level of that product. Currently we have Core = 1.0, Related = 0.5 and Unrelated = 0.0. In formula (6), m stands for the number of most vulnerable products to a B-R relationship. In our implementation of EVMAT, m=5. This formula first finds m largest VL products and then calculates the overall vulnerable score of a B-R relationship. 4.4 Computing the Weight Tree The usage of a weight tree is to determine the importance of a resource to the whole enterprise. For instance, in an E-commerce company, the server used for online selling is far more important than a personal PC used by an employee. Since it is impractical for companies always applying vulnerability patches immediately for all machines because of the cost of maintenance procedure, computing the weight tree could help security administrators focus on the most important resources and delay those not so important. In section 3, we have already modeled the enterprise vulnerability topology. Each business goal has an interest (weight) value related to its parent and each resource has a weight value related to the business goal it contributes. Now we use formula (7) to calculate the weight of a resource to the whole enterprise. W W,1 (7) In formula (7), W is the weight of i s parent, m is the children number of p. The weight of root is 10. Formula (7) iterates from the root to a resource node to calculate the overall weight of the resource to the whole enterprise. 4.5 Overall Vulnerability of an Enterprise Finally, we calculate the overall vulnerability score of an enterprise. Assume a leaf business goal has vulnerability score sb (calculated by CVSS) and it has n resources weighted wr,wr,wr and the vulnerability scores are sr,sr,sr. The contributed vulnerability score for that business goal is: s sb wr sr (8) Then we sum up all leaf business goals and normalize the score into (0-100). es s 10 (9) es is the overall vulnerability score of an enterprise 5. EXPERIMENT DEMONSTRATION In this section, we model an IT company vulnerability topology and calculate the overall vulnerability score of that company. The full model is shown in Figure 5 and all resource entities have already read the scored products file it installed. The result of enterprise vulnerability analysis is shown in Figure 4. Figure 4: Analysis result of a small IT company. From figure 4 we can see the four servers play the core role of the whole enterprise. The company s vulnerability score is 38.96, which is relatively high (The range is 0-100). The analysis result implies that the security professionals need to pay more attention to reduce vulnerability score. The EVMAT tool provides the following functionalities to help security administrators manage enterprise s vulnerability in many different ways. It provides a simple but efficient way to model the enterprise vulnerability topology that helps security administrators understand the relationship of business goals and resources, the weight of different resources and the vulnerability of a business goal (Figure 5). It provides a dashboard solution that automatically measures the enterprise vulnerabilities in different scope, from a single computer to an entire enterprise (Figure 4). For instance, due to delayed update of Apache server installed on server e- commerce.server.id1, the vulnerability of Apache server becomes 10.0 (previously it was 5). The overall vulnerability score increases to and the vulnerability score of that server increases to 7.65, which alerts the security administrators to take actions to reduce the vulnerability score. It can be an assistant tool that helps security administrators determine the priority level of different resources requiring 260
5 vulnerability patches. For example, both e- commerce.server.id1and e-commerce.server.id2 are out of secure states because of recent updates of vulnerabilities. However, only one server can be patched first due to the limited resource of security professionals. By examining the enterprise vulnerability topology and the influence factors of two servers, it is straightforward to discover that e-commerce.server.id1 should be patched first because it has higher weight and vulnerability impact. Figure 5: An IT company vulnerability topology model 6. CONCLUSION AND DISCUSSION This paper presents a model-based automated approach to quantify the overall vulnerability score of a company. Our developed tool, EVMAT 1) provides a user interface to model the enterprise vulnerability topology, 2) automatically gathers system characteristics based on OVAL and further evaluates software vulnerabilities installed in a computer resource based on the vulnerability data retrieved from NVD; 3) Ranks the weaknesses of software products to help security administrators decide whether the product fits their security demand most; and 4) quantitatively measures the overall vulnerability of an enterprise. The experiment of modeling a small IT company using our tool demonstrates the potentials of this tool. There are a number of research topics that deserve further efforts. First, the source of determine the vulnerability of a business resource could be extended to include both local information and NVD data. For instance, the log information of each local computer could provide useful information of the security status of a computer. Second, the metric formulas of calculating the overall enterprise vulnerability score could be improved to better reflect its level of its resilience to internal flaws and external threats. Third, it will make EVMAT more useful if it could provide security recommendations in addition to simply vulnerability assessment. Finally, the graphical user interface of EVMAT will be improved in the next version. ACKNOWLEDGMENTS This paper is based upon work supported by the National Science Foundation under Grant No and Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. The authors would like to express their gratitude to anonymous reviewers of this paper for their thoughtful comments and suggestions. REFERENCES [1] Mell Peter and Scarfone Karen and Romanosky Sasha.Common Vulnerability Scoring System.IEE Security and Privary, 4(6):85-89, [2] OVAL, Open Vulnerability and Assessment Language. [3] NVD, National Vulnerability Database. [4] Shi, Fuqian and Xu, Hongbiao and Wang, Haining. A Representative Management Model of Network Security in Enterprise Informatization. Proceedings of the 2008 International Conference on Information Management, volume 2: , 2008 [5] Zhang, Zonghua and Nat-Abdesselam, Farid and Lin, Xiaodong and Ho, Pin-Han. A model-based semi-quantitative approach for evaluating security of enterprise networks. Proceedings of the 2008 ACM symposium on Applied computing, , [6] Anderson, Evan and Choobineh, Joobin and Grimaila, Michael R. An Enterprise Level Security Requirements Specification Model. 261
6 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences, , 2005 [7] Lee, Jae Seung and Kim, Sang-Choon and Sohn, Seung Won. A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. Proceedings of the Third International Conference on Information Security and Cryptology, , 2001 [8] Liao, Qi and Striegel, Aaron and Chawla, Nitesh. Visualizing graph dynamics and similarity for enterprise network security and management. Proceedings of the Seventh International Symposium on Visualization for Cyber Security, 34-45, 2010 [9] Homer, John. A comprehensive approach to enterprise network security management. Phd thesis, Kansas State University, 2009 [10] Chen, Xiuzhen and Zheng, Qinghua and Guan, Xiaohong. An OVAL-based active vulnerability assessment system for enterprise computer network. Information System Frontiers, 10(5): , [11] Myerson, Judith M. Identifying enterprise network vulnerabilities. Int. J. Netw. Manag., 12(3): , [12] Wang, Ju An and Wang, Hao and Guo, Minzhe and Zhou, Linfeng and Camargo, Jairo. Ranking Attacks Based on Vulnerability Analysis. Proceedings of the rd Hawaii International Conference on System Sciences, 1-10, 2010 [13] Wang, Ju An and Guo, Minzhe. Vulnerability categorization using Bayesian networks. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research,29:1 29:4, [14] OVAL Interpreter. [15] [16] CPE, Common Platform Enumeration. [17] SCAP, Security Content Automation Protocol. [18] CVE, Common Vulnerabilities and Exposures. [19] CWE, Common Weakness Enumeration. [20] Wang, Ju An and Wang, Hao and Guo, Minzhe and Xia, Min. Security metrics for software systems. Proceedings of the 47th Annual Southeast Regional Conference, 47:1 47:6, 2009 [21] CERT, Computer Emergency Response Team at Carnegie Mellon University s Software Engineering Institute. [22] NVD, National Vulnerability Database, Version 2.2, 262
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
A Software Security Assessment System Based On Analysis of
A Software Security Assessment System Based On Analysis of Vulnerabilities 1,2 Chenmeng Sui, 1 Yanzhao Liu, 2 Yun Liu, 1 China Information Technology Security Evaluation Center, Beijing,China,[email protected]
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Secunia Vulnerability Intelligence Manager (VIM) 4.0
Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading
A Cyber Attack Modeling and Impact Assessment Framework
2013 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum (Eds.) 2013 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication for
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain
International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Design of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
Towards Unifying Vulnerability Information for Attack Graph Construction
Towards Unifying Vulnerability Information for Attack Graph Construction Sebastian Roschke Feng Cheng, Robert Schuppenies, Christoph Meinel ISC2009-2009-09-08 Internet-Technologies and -Systems Prof. Dr.
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,
Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia [email protected]
Best Practices for Vulnerability Management
4 Steps to Reducing Risk with Vulnerability Management Best Practices Is Your Vulnerability Management Process Meaningful To Your Business? The vulnerability management process can be very useful and provide
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
METRICS FOR INFORMATION SECURITY VULNERABILITIES
ABSTRACT METRICS FOR INFORMATION SECURITY VULNERABILITIES Andy Ju An Wang, Min Xia and Fengwei Zhang Southern Polytechnic State University, USA It is widely recognized that metrics are important to information
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management
Scanless Vulnerability Assessment A Next-Generation Approach to Vulnerability Management WHITEPAPER Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network
Cyber Security RFP Template
About this document This RFP template was created to help IT security personnel make an informed decision when choosing a cyber security solution. In this template you will find categories for initial
Security Risk Assessment of Software Architecture
Security Risk Assessment of Software Architecture Fadi HajSaid 1, Yousef Hassouneh 2, Hany Ammar 1, 1 West Virginia University, USA; 2 Birzeit University, Palestine [email protected], [email protected],
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)
NIST Interagency Report 7800 (Draft) Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT) David Waltermire, Adam Halbardier,
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
User s Guide. Skybox Risk Control 7.0.0. Revision: 11
User s Guide Skybox Risk Control 7.0.0 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY
MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
NIST Special Publication 800-51 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme Recommendations of the National Institute of Standards and Technology Peter Mell Tim Grance
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
A Novel Approach on Zero Day Attack Safety Using Different Scenarios
A Novel Approach on Zero Day Attack Safety Using Different Scenarios 1Shaik Yedulla Peer,2N. Mahesh, 3 R. Lakshmi Tulasi 2 Assist Professor, 3 Head of The Department [email protected] Abstract-A zero day
PAKITI Patching Status System
PAKITI Patching Status System EGI-InSPIRE A Race for Security: Identifying Vulnerabilities on 50 000 Hosts Faster then Attackers Michal Procházka 1, Daniel Kouřil 1, Romain Wartel 2, Christos Kanellopoulos
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
How To Build A Vulnerability Chain
Acta Universitatis Sapientiae Electrical and Mechanical Engineering, 6 (2014) xx-yy Identifying Chains of Software Vulnerabilities: A Passive Non-Intrusive Methodology Béla GENGE 1, Călin ENĂCHESCU 1 1
Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)
1 Overview Introduction WINE TRIAGE Zero day analysis Conclusions 2 5 locations: USA: Mountain View (CA), Culver City (CA), Herndon (VA) Europe: Dublin (IE), Sophia Antipolis(FR).. 4 thematic domains:
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
AHS Flaw Remediation Standard
AGENCY OF HUMAN SERVICES AHS Flaw Remediation Standard Jack Green 10/14/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Vulnerability Assessment Report Format Data Model
I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
An Information Assurance and Security Curriculum Implementation
Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
Information Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
Threat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
Design call center management system of e-commerce based on BP neural network and multifractal
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
Information Visualization of Attributed Relational Data
Information Visualization of Attributed Relational Data Mao Lin Huang Department of Computer Systems Faculty of Information Technology University of Technology, Sydney PO Box 123 Broadway, NSW 2007 Australia
Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis
, 22-24 October, 2014, San Francisco, USA Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis Teng Zhao, Kai Qian, Dan Lo, Minzhe Guo, Prabir Bhattacharya, Wei Chen, and Ying
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
How To Manage A Network Security Risk
Scanless Vulnerability Assessment: Skybox Security whitepaper July 2014 1 Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
3 Web Services Threats, Vulnerabilities, and Countermeasures
3 Web Services Threats, Vulnerabilities, and Countermeasures Securing a Web service requires us to protect, as far as possible, all of its basic components, shown in Figure 3.1, and their interactions
WORKSHOP Rethinking Cyber Security for Industrial Control Systems
WORKSHOP Rethinking Cyber Security for Industrial Control Systems Bob Mick, Workshop Moderator VP Emerging Technologies ARC Advisory Group [email protected] 1 Re-Thinking Cyber Security Why Re-Thinking?
Payment Card Industry (PCI) Executive Report 08/04/2014
Payment Card Industry (PCI) Executive Report 08/04/2014 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: A.B. Yazamut Company: Qualys
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Attack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad ([email protected]) Ashraf Vahid, MA student of computer software, Shabestar Azad University ([email protected]) Ashraf Vida, MA
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
