Network Security: State of the Art, Hot Topics
|
|
|
- Laureen McDowell
- 10 years ago
- Views:
Transcription
1 Network Security: State of the Art, Hot Topics 1 The Future? Let s hope we make progress in computer security After all... The future is just around the corner! :) 2 (C)Copyright, 1998, Marcus J. Ranum 1
2 What is Progress? Practical goals Making Ecommerce real Making Ecash work Making systems resist 99+% of attacks Fundamental problems Delegation of trust Solving social maladjustment via software Trusting executables / secure executables 3 Defining Progress I define progress as positive movement toward practical goals Analogous to water level in a ship Are you pumping water out faster than you are taking it on? Are you patching holes faster than you re drilling new ones? Do you have time to design the next generation of ships?? 4 (C)Copyright, 1998, Marcus J. Ranum 2
3 The Problem with Progress Large enough amounts of progress require violent change (revolution V. evolution) or all we have is dinosaurs It may already be too late to fix The Internet is really huge; upgrade it? Upgrading the Internet is a problem on the order of changing the electrical voltage of a first-world country 5 Learn to See Security as Infrastructure A well-designed network is inherently More secure Faster More reliable (Maybe) cheaper to manage Retrofitting security into existing networks is a losing game Do it right the first time 6 (C)Copyright, 1998, Marcus J. Ranum 3
4 The Market The security products market is growing rapidly 1) We must deliver solutions that work 2) What are we getting for our money? 3) Is it being well spent? 4) Are there alternatives? 7 Delivery Computer security experts have been waving red flags about dangers of Electronic Commerce We ve got their attention Now we have to deliver or we re on the scrap heap Costs of security must be in line with benefits 8 (C)Copyright, 1998, Marcus J. Ranum 4
5 Costs Infosecurity news security survey: Mean Expenditures: $140,000 $175,000 $201,000 Yankee Group estimates $5.6Billion market by year 2000 (4 years) Source: Infosecurity product news, Yankee Group 9 Costs (cont) For Electronic Commerce to succeed the cost-of-entry into a secure environment has to be lower than 2% of per-transaction cost More than fractions of a penny/transaction will be hard to justify Many E-Commerce models are based on pennies per transaction profit margins 10 (C)Copyright, 1998, Marcus J. Ranum 5
6 The Cost Problem For infrastructure providers (banks, E- banks, credit bureaus) that make their money on pennies per transaction, we need to make security 2 orders of magnitude cheaper There is a huge disconnect between the high risk and low risk expenditures and potential exposure 11 Known Losses CSI Member Survey: 30 respondents total over $66million in losses due to infosecurity problems and cleanup 2 respondents report losses over $1million due to insider eavesdropping Average loss per incident is approximately $80,000 to $100,000 Source: Computer Security Institute 12 (C)Copyright, 1998, Marcus J. Ranum 6
7 Known Losses (cont) GAO report Rome Air Force base security incident and cleanup costs $211,700 not counting other agencies Citicorp security incident in Sept 1995 $12million transferred illegally but only $400,000 is lost and not recovered 13 Leverage Is ~$201,000/year spent on infosecurity products justified against the losses that are being recorded? Does it show that security products provide adequate leverage? I pay $2,000/year auto insurance against $300,000 liability with an estimated perincident loss of $2,000 to $25, (C)Copyright, 1998, Marcus J. Ranum 7
8 Cost (cont) Conclusion: I think we re improving but security is not going to be attractive until costs lower by 2 orders of magnitude Corollary: The small players will ignore security Observation: Nobody has a handle on this problem 15 The Present Expenditures on infosecurity products: 22% Don t know 17% Less than $20,000 12% $20,000 to $49,000 9% $50,000 to $99,000 (average cost/incident) 14% $100,000 to $249,000 Source: CSI 9% $250,000 to $499,000 17% $500,000+ Source: Infosecurity product news 16 (C)Copyright, 1998, Marcus J. Ranum 8
9 The Future: Predictions To get smaller players on board security product costs will continue to drop By Q4 1996: $200 secure web servers By Q3 1997: $400 firewalls By Q1 1998: free security in routers, hubs, switches Market growth will dilute quality of products: lack of expertise in security 17 The Future: Predictions Security is now a product feature Within 2 years security will be like low fat cooking Products that are laden with grease will be labelled as lite (Windows NT C2) Products that have nothing to do with fat will be labelled as fat free (Secure UPS ) Nothing will improve 18 (C)Copyright, 1998, Marcus J. Ranum 9
10 How do we Break the Cycle? We can either train s/w engineers to write security into V1.0 (which is expensive and they don t listen very well) or We can continue to have to retrofit and patch and kludge around security flaws to fix V2.0 (same caveat as above) 19 Breaking the Cycle High quality support libraries are necessary as basic building blocks for secure applications We need the equivalent of secure stdio.h Build it into infrastructure so we don t have to rely on application developers to get it right 20 (C)Copyright, 1998, Marcus J. Ranum 1
11 Breaking the Cycle (cont) Building security into infrastructure will require commitment from Vendors End users Standards committees We re doomed, aren t we? 21 Core Issues These are the issues that will dominate future of Internet Security: (in no particular order) Encryption Executable Content Firewalls Electronic Commerce User Communities Software Development / Distribution 22 (C)Copyright, 1998, Marcus J. Ranum 1
12 Encryption 23 Encryption: Today Reasonably usable crypto-apis exist Reasonably usable crypto code exists Some applications use crypto: a minority Many applications that should use crypto do not because of: Ignorance Customer misperception of risk 24 (C)Copyright, 1998, Marcus J. Ranum 1
13 Encryption: Today (cont) The single largest factors delaying the useful deployment of crypto: Patents and intellectual property restrictions Lack of leadership from standards bodies (vendor lobbyists) Government intervention (export control) This is not a technical problem 25 Encryption: Tomorrow Export control regs will be gone by 2000AD 80% likely: US businesses will lose to nonregulated foreigners 18% likely: Washington will wise up 2% likely: Government software clipper technology will be adopted By 2001AD we ll see encryption all over 26 (C)Copyright, 1998, Marcus J. Ranum 1
14 Encryption: Getting to the Future We need: Reduced regulation Increased packagability Embedded in APIs (e.g.: Winsock, AWT, Java) Embedded key management Embedded in application development tools Relevant and timely standards No vendor lobbyists / competitive lock out No more representational standards bodies 27 Executable Content 28 (C)Copyright, 1998, Marcus J. Ranum 14
15 Executable Content: Today Java Actually not too bad! ActiveX Generic OLE capability click here to reformat your hard disk PointCast Downloads new versions automatically Potential global virus broadcast system 29 Executable Content: Today (cont) Scary trends: Increasingly easy to download and install anonymous plug-ins from random places Increasing number of services overload on top of HTML (PointCast and others) Tunnel through firewall Indistinguishable from legitimate Web traffic Viral macros (Word Concept) are machineindependent 30 (C)Copyright, 1998, Marcus J. Ranum 1
16 Executable Content: Tomorrow It s going to be ugly 31 Firewalls 32 (C)Copyright, 1998, Marcus J. Ranum 1
17 Firewalls: Today Rapidly growing market Over 150 firewall products on market Commoditization is around the corner Vendors looking for ways to distinguish their offerings Terminology Market share Most-completest security solution syndrome 33 Firewalls: Today (cont) Biggest problems today with firewalls: Downloadable content Performance concerns (usually misplaced) Remote management Ignorance: knowing what policies make sense within a firewall What to allow in and how What to allow out and when 34 (C)Copyright, 1998, Marcus J. Ranum 1
18 Firewalls versus Host Security Many see a choice between firewalls (network level security) or host security Downloadable content is blurring the lines very rapidly That s not an OR question! 35 The Incoming Traffic Problem Data streams that are allowed in may not be protected or protectable Some firewalls perform application specific security on data streams Others do not Sometimes you can t - PGP+MIME Splits security between firewall and system on backend 36 (C)Copyright, 1998, Marcus J. Ranum 1
19 The Incoming Problem (cont) Attacker Internet SMTP session allowed unmodified through firewall to backend system with a sendmail hole Router w/some screening Firewall SMTP Server w/ sendmail 4.5 Internal Network 37 Incoming Traffic: Implications Security must be split between firewall and backend system to be effective Host security raises its head - again! Many admins do not realize they still need to worry: we have a firewall so everything is OK now. Sometimes the service is necessary w/no security: TN3270 to mainframe 38 (C)Copyright, 1998, Marcus J. Ranum 1
20 The Wish and Wash Host Security Network Security Time T=now 39 Wish and Wash: Worst Case Host Security Network Security Time T=now 40 (C)Copyright, 1998, Marcus J. Ranum 2
21 Firewalls: Tomorrow Mixtures of firewalls and secure applications will co-exist Based on bandwidth needs Based on application requirements Firewalls will become a commodity Distinction between firewall types will primarily be marketing terminology Desktop security will still be terrible 41 Electronic Commerce 42 (C)Copyright, 1998, Marcus J. Ranum 2
22 Electronic Commerce: Today Still embryonic Web-based GUI on top of federal express and credit card system Real electronic commerce will depend on useable electronic cash Transmission of value Transfer of funds 43 Electronic Commerce: Today Big problems to solve Repudiation or revocation of a transaction Credit cards do this badly, slowly, awkwardly What about a stock sale? Portable Identity Authenticated user-identity that goes with you Portable digital certificate Smart cards likely crucial technology 44 (C)Copyright, 1998, Marcus J. Ranum 2
23 Electronic Commerce: Tomorrow One scary thing to consider To implement full-blown electronic commerce we ll need full-blown electronic cash Ecash may be subject to same pressures as real cash Deflation / Inflation Currency trading Devaluation 45 Electronic Commerce: Tomorrow Security is going to play a critical role for Electronic Commerce So far we ve been doing a terrible job Lack of standards Gaping holes Poorly designed systems We need to do better or we ll lose 46 (C)Copyright, 1998, Marcus J. Ranum 2
24 User Communities 47 Managing User Communities What is needed are tools that organizations can use to manage customer E-commerce relations Authentication Integrity Privacy Non-repudiation Eventually, delegation of trust 48 (C)Copyright, 1998, Marcus J. Ranum 24
25 User Communities: Today Very primitive systems based on service provider-oriented access CompuServe has online banking interface AOL has online trading etc. Initial attempts to migrate to Internet from closed systems have begun 49 User Communities: Today (cont) The battle for the future is being fought today over who controls the concept of registered user Deliberate standards-fragmentation over certification hierarchies Deliberate standards-fragmentation between E-cash and credit card alliances 50 (C)Copyright, 1998, Marcus J. Ranum 2
26 User Communities: Digital Certificates Public key is an attractive technology Makes the process of key management a lot simpler Sounds extremely sexy 51 User Communities: Digital Certificates (cont) Public keydoes not address: Can you trust issuer of certificate? What is the certificate holder authorized to do? Management of stolen certificates (yet) 52 (C)Copyright, 1998, Marcus J. Ranum 2
27 User Communities: Digital Certificates (cont) Current model is based on credit card transaction model Other data needs to be stored someplace The transaction model may not apply Every big bank on the planet is looking at digital certificates and waiting for the technology to stage a break-through 53 User Communities: Smart Cards Smart cards are a key technology in the future Certificates are large and need to be stored someplace How many of you want to memorize and type in a 1024-bit RSA key? Stored value cards are coming 54 (C)Copyright, 1998, Marcus J. Ranum 2
28 User Communities: Smart Cards (cont) Current model is based on credit card transaction model Data storage on card represents great integration opportunity Every big bank on the planet is looking at smart cards and waiting for the technology to stage a break-through 55 Delegation of Trust Ecommerce will become truly interesting when delegation of trust occurs Corporations cross-accepting eachother s digital certificates and stored value smart cards Growth model is very familiar 56 (C)Copyright, 1998, Marcus J. Ranum 2
29 Delegation of Trust (cont) Phase 1: ATM cards Each bank has own machines Customers not used to technology Nobody sure it will be a success Phase 2: Local acceptance Local banks begin to permit foreign cards Customers can now use card within metropolitan area 57 Delegation of Trust (cont) Phase 3: Delegation of trust Ubiquity achieved Consortia (MOST, etc) cross accept all members cards Cards now usable world-wide (mjr gets cash in Tokyo with card issued in Baltimore, MD) 58 (C)Copyright, 1998, Marcus J. Ranum 2
30 Software Development 59 Software Development: Today Amazingly vigorous and profitable industry US leads hands-down in innovation We re also almost completely clueless about security in our development practices 60 (C)Copyright, 1998, Marcus J. Ranum 3
31 Software Development: Today Any idiot with a compiler could write the next killer app that will be driving your business next year 61 Software Development: Today Big Problems: Code quality (from a security perspective) Code trustworthiness (who wrote it anyhow?) Code distribution (is what you re running what the vendor really wrote?) 62 (C)Copyright, 1998, Marcus J. Ranum 3
32 Code Quality How do we build secure systems when the people writing 99% of the code in the world know nothing about security? How can we fix all the broken code which is being churned out? This problem grows more acute every day 63 Code Trustworthiness The ultimate hacker s paradise: get a job at Microsoft and work on the NT sources How can we establish any degree of confidence in security of development practices? background checks? code reviews? 64 (C)Copyright, 1998, Marcus J. Ranum 3
33 Code Distribution With a $500 CDROM burner and a $4,000 CDROM printer I can make a disk that looks just like an NT SDK update and send it to my victim Increasing number of patch downloads over Web No integrity signature or check on most downloads 65 Where are we now? 66 (C)Copyright, 1998, Marcus J. Ranum 3
34 1997: Security Environment Firewalls Boundary access control Encryption Data integrity and confidentiality Digital Signatures Electronic identity May be used for authentication Backbone for E-commerce (maybe) : Security Environment (cont) Dialup Networking Mostly insecure Must rely on other (external) security, e.g.: firewalls and encryption The Web Server side security Client side security 68 (C)Copyright, 1998, Marcus J. Ranum 34
35 1997: Main Problems Client-side execution Java, ActiveX, Pointcast plugins Poor security model weakens desktop Server-side execution Secure web servers use a secure protocol to talk to an insecure service Most CGI developers are security challenged : Main Problems (cont) Business perception Internet risks are distorted Some see Internet as no risk (and shouldn t) Some see Internet as huge risk (and shouldn t) Relatively few organizations understand their security exposure or countermeasures 70 (C)Copyright, 1998, Marcus J. Ranum 3
36 1997: Main Problems (cont) Government intervention Law enforcement is useless on the net Legislation is useless on the net Restrictions on use of encryption are increasing Attempts at regulating E-commerce are being considered (with likely disastrous or laughable results) : Main Problems (cont) Trust boundaries Nobody really knows who they are connected to anymore Many organizations are connected to their competitors and don t know it 72 (C)Copyright, 1998, Marcus J. Ranum 3
37 What s Hot: Firewalls Firewalls now a commodity technology Differences between turbo-whomping adaptive psychic packet filter and application gateway are increasingly blurred Most important factor in firewall s configuration is how the end user installs it 73 What s Hot: Encryption Little progress in this area 74 (C)Copyright, 1998, Marcus J. Ranum 3
38 What s Hot: Digital Signatures X.509 is becoming standard Encodings of X.509 certificates are not :( Widespread use will prompt widespread theft starting soon Smart card storage is next step Too many certificate issuers Whose certificate can you trust? Nobody s? 75 What s Hot: Dialup Networking Dialup networking still a game of Russian Roulette Presently no vendors supporting built-in encryption dialup TCP/IP Very few support CHAP authentication Most rely on passwords Some desktops may route traffic Lots of work to do in this area 76 (C)Copyright, 1998, Marcus J. Ranum 3
39 What s Hot: The Web Server Hackers altering web pages So put it on a Jaz disk!!!! Server side encryption is OK Remaining problems of how to get transactions in through firewalls What about attacks against CGI scripts that are launched over secure channels? 77 What s Hot: The Web Client This changes too fast to contemplate Bad news: More plugins More client side code More security holes Constant flow of new standards makes it impossible to fix the broken stuff Disaster looms 78 (C)Copyright, 1998, Marcus J. Ranum 3
40 Summary Lots of work is being done in security The problems are being attacked piecemeal (perhaps that s the only way to attack them!) Lack of standards and unification increases exposure to bugs and flaws Life will continue to be interesting 79 Conclusion 80 (C)Copyright, 1998, Marcus J. Ranum 4
41 May you live in interesting times 81 The Future? This talk has been about the future Can we believe that things really will get better? Or will we do more of the same faster and just as badly as before? 82 (C)Copyright, 1998, Marcus J. Ranum 4
42 An Analogy Cars begin appearing on the market in 1890 s-1900 s By 1920 s cars capable of speeds in excess of 60mph It must have been accepted as a matter of course that when you had an accident you ate the dashboard Seatbelts appear in 1950 s 83 Analogy (cont) Window of 60 years between introduction of passenger safety technology into a known dangerous product Industry resistance and consumer resistance continues to this day We are in the padded dashboard phase of network security 84 (C)Copyright, 1998, Marcus J. Ranum 4
43 Questions? Questions? Comments? Tomatoes? 85 (C)Copyright, 1998, Marcus J. Ranum 4
Are Firewalls Obsolete? The Debate
Are Firewalls Obsolete? The Debate Pro: Marcus J. Ranum! Con: Marcus J. Ranum 1! Firewalls are Dead Opening Position: Firewalls are a kludge - let s have real network security instead! New services and
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Network Security. A Quick Overview. Joshua Hill [email protected] http://www.untruth.org
Network Security A Quick Overview Joshua Hill [email protected] http://www.untruth.org Security Engineering What is Security Engineering? "Security Engineering is about building systems to remain dependable
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Evolution from FTP to Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
HIGH-SPEED BRIDGE TO CLOUD STORAGE
HIGH-SPEED BRIDGE TO CLOUD STORAGE Addressing throughput bottlenecks with Signiant s SkyDrop 2 The heart of the Internet is a pulsing movement of data circulating among billions of devices worldwide between
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 [email protected] Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.
1 / 40 Crypto () Client security Server security 2 / 40 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Session 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
PacketTrap One Resource for Managed Services
Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
GUIDE TO WEBSITES AND E-COMMERCE
GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Agent vs. Agent-less auditing
Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
E-Business, E-Commerce
E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize
Securing Network Print Jobs
White Paper - Levi, Ray & Shoup, Inc. Securing Network Print Jobs Enterprise Output Management Series LRS White Paper 2002 Levi, Ray & Shoup, Inc. All rights reserved. LRS, VPS, and are registered trademarks
Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM
Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,
Installing Oracle 12c Enterprise on Windows 7 64-Bit
JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises
Secure Remote Control Security Features for Enterprise Remote Access and Control
Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms
Secured Voice over VPN Tunnel and QoS. Feature Paper
Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Network Security - ISA 656 Review
Network Security - ISA 656 Review Angelos Stavrou December 4, 2007 Material Test Conditions 7:20pm - 9:30pm, Thursday, Dec 11th, in the Lab (STI-128) Same style of questions as the midterm I m not asking
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
Read this guide and you ll discover:
BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS
A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
VOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology
The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
PLA4231. User s Guide. Quick Start Guide. 500 Mbps Powerline Wireless N Extender. Default Login Details. Version 1.00 Edition 1, 12/2012
PLA4231 500 Mbps Powerline Wireless N Extender Version 1.00 Edition 1, 12/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 Password 1234 www.zyxel.com Copyright
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
