Is Open Source Software More Secure?
|
|
|
- Lee Watson
- 10 years ago
- Views:
Transcription
1 Is Open Source Software More Secure? Russell Clarke David Dorwin Rob Nash Homeland Security / Cyber Security
2 Contents 1 Introduction Scope Initial Systems Analysis A Brief Overview of Source Theologies Open Source is More Secure Security Through Obscurity Metrics are Often Misleading Open and Closed Source Software are Intertwined Vulnerabilities Source-Dependent Attacks Buffer Overflow SQL Injection Patch Reverse Engineering Source-Independent Attacks User Participation Brute Force Attacks Protocol Vulnerabilities Physical Intrusion and Inside Jobs Frequency of Attacks Understanding Attack Frequency Security Analysis Vulnerability Discovery Security Tools Threat Modeling and Exploit Classification
3 4.2.2 Source Code Scanners Security Reviews Socioeconomic Effects Business Decisions Accountability and Support Patch and Fix Distribution Availability of Security Fixes Custom Software and Configurations Security Fixes for End-of-Lifed Software Conclusion 25
4 Abstract In an attempt to contribute to the current state of understanding with respect to systems security, this paper inspects one software source distribution philosophy that underlies the operation of a representative class of networked computers today. Establishing whether open source leads to more secure software will have serious implications for organizations utilizing or constructing open source software, the trust established between a user and a program (irrespective of source visibility), and provide valuable observations for proprietary software vendors as well. It is the intent of this paper to advance forward the state of understanding with respect to source philosophies, initially and critically explore the vulnerability differences caused by the source visibility differences, and propose an answer to a modern and relevant question: Does open source development lead to more secure code?
5 1 INTRODUCTION 1 1 Introduction In this paper, we seek to measure the security value (or lack thereof) of the open source software distribution philosophy. While many groups treat this discussion as a religious debate between open source and proprietary software, we seek to empirically describe the issues and factors in support of or against the security of open source software and avoid as best we can the issues we cannot measure. Further, this debate is often partitioned along the axis of the dominant operating system on each side, and may be colored by opinions just as much as fact. However, we believe the security analysis of, and differences between, the open source and proprietary software design philosophies dont reduce to a contest between Microsoft Windows (proprietary) and Apple Macintosh OS X (where the kernel is primarily open source) or Linux (completely open source). Rather, in this paper we seek to observe the theoretical and practical differences in security between representative classes of software systems, regardless of the corporations or organizations responsible for the products under scrutiny. Hence, the examples presented in this paper are chosen as practical, representative, and timely. We feel it is appropriate, then, to recognize and understand the tussles that exist in this area of research, to then formulate our reasoning and research further. Also, since there is both fiction and fact on each side of the debate, we initially advocate for both sides, only to later analyze and explain these observations. 1.1 Scope This section defines the extent and limits of our discussion. We have chosen many issues as topics for future work, and identified issues not bearing significant relevance for their inclusion, understanding that time, trials, and experience will validate or discredit these simplifying assumptions. We are not interested in
6 2 INITIAL SYSTEMS ANALYSIS 2 the dissection of the corporate ecosystems, nor in comparisons of one company s product versus another (indeed, such reports are already plentiful). We are not arguing which operating system is superior overall, which has more features, or which is more economical. We do not even argue that one system is more secure than another, but rather, we seek out data in an attempt to qualitatively (more data here) and quantitatively (less data here) confirm or deny the security of open source software due to its inherent code visibility. Topics peripheral to our study of cyber security, such as licensing for open source and closed source systems, have been ommitted. Finally, we recognize that significant changes to the state of the art, such as stronger tools, breakthroughs in quantum computing, types of attacks not previously known, underlying network protocol alterations (via deployment of Internet2 or IPv6, for example) will have significant ramifications to what is researched and presented here. 2 Initial Systems Analysis 2.1 A Brief Overview of Source Theologies In this section we present the two opposing views on the security of open source. The intent is to summarize the view of each side of the argument, regardless of whether it can be proven. In later sections we address these claims with facts and data Open Source is More Secure With open source, any who wish to see the source code for any part of project can do so. Bugs including security vulnerabilities may be spotted by the many eyes both the experts and novices alike on the code. Open source code is subject to security reviews (as in any professional software developing enterprise), but
7 2 INITIAL SYSTEMS ANALYSIS 3 in addition to in-house reviews by those engineers tied to the project, is also subject to unsolicited security reviews that may be conducted by anyone in the world. One could argue that, in general, more code walkthroughs are likely to occur in open source projects, since usually an entity responsible for a project will test it to some amount and outside sources will also test your source some amount, potentially resulting in more code scrutiny in this paradigm. This is especially true when large corporations have a vested interest in or sell products based on an open source project. In this case, they have the same interest in the project being secure as if it were proprietary. Finally, while security is oft cited as a primary reason for not opening source code to the public, there seems to be little conclusive evidence to support this Security Through Obscurity This argument is as follows: If I hide my code from my adversaries, it will be more difficult for them to identify vulnerabilities in my software. Only negative results can come from offering visibility at the source level. Writing good software is difficult, and writing nontrivial, flawless software is probably impossible. Hence, if software is complex to generate, and at least somewhat complex to reverse engineer, why sacrifice protection afforded to us by obscurity? Certainly, the technique is not mutually beneficial; it simply provides the blueprints of your construction to your adversary. As tools for identifying security flaws improve, these will also benefit the adversary as they can identify vulnerabilities in code bodies before fixes can be deployed to customers. If I could slow or prevent the propagation of my source, then my organization can capitalize on the gains that we are exclusively responsible for. As with any battle, giving your plans to your adversaries or competitors is not a good strategy for security or business in general.
8 2 INITIAL SYSTEMS ANALYSIS Metrics are Often Misleading Deciding this debate would be much simpler if we could just look at the number of attacks against or reported vulnerabilities in comparable open source and proprietary software products and declare a winner. However, there are many variables besides development philosophy that affect such metrics. The size of the deployed base, code size, features provided, business decisions, effectiveness of customer maintenance and patching, and adversaries preferences all affect these statistics. It is in an adversary s interest to exploit vulnerabilities present in as many systems as possible. Thus, she may choose to identify and exploit security vulnerabilities in the most popular operating systems or applications. Likewise, it is unlikely that security organizations and white hats put equal amounts of effort into identifying vulnerabilities in all software (even the leading products). As such, we are unable to conclude directly that a software product with more reported attacks or vulnerabilities is, in fact, more or less secure than another product from this information alone. 2.3 Open and Closed Source Software are Intertwined In one example[1], a vulnerability was identified, reported, and fixed in the Linux operating system. Upon release of the security update, attackers learned the exact nature of the vulnerability and conjectured a similar vulnerability might exist in other resource managers and operating systems. That group was successful in constructing an attack exploiting the same vulnerability that was indeed present in the closed source operating system, Windows NT. So, we see that the existence of an open source program (and its constituent security updates) can reveal the vulnerabilities of both itself and any isometric system. This is implicit, obvious, and important in that it could suggest, for example, that open source software and closed source software are intertwined
9 3 VULNERABILITIES 5 in a way that makes investigation difficult. While it is the case that these systems do not operate in isolation of one another, and have each been constructed with many engineering standards and similarities, we conjecture that it is not impossible to separate the two systems for analysis, and further, that this evidence might suggest that we can leverage the similarity of systems in our study by observing wide classes of vulnerabilities in a platform-independent fashion. Further, we should consider the effects of releasing patches out in to the wild that reveal high-level operational vulnerabilities that might be shared amongst similar platforms, providing attackers with a so-called day zero attack that is cross-platform. It is important to understand the broad overlap in the general construction of the major resource managers studied here, and expect that as vulnerabilities are found, reported, and fixed, that there should be overlap in the vulnerability space as well. This offers incentives for major operating systems to share findings with each other, to offer mutually beneficial security enhancements, but is likely to be complex to navigate in a commercial or competitive environment. However, for this study, it is valuable to observe that software systems in general overlap a great deal in the design patterns employed, and hence can corporately suffer from classes of vulnerabilities that affect all platforms. 3 Vulnerabilities Not all attacks rely on vulnerabilities in the source code and as such not all attacks directly relate to open source software security. Many attacks rely on humans as the weak link, or at least rely in part on humans to help. In addition, there are other types of cybersecurity attacks that can be executed even on perfectly secure software. We classify a variety of popular attacks into sourcedependent and source-independent and examine them in the following sections.
10 3 VULNERABILITIES Source-Dependent Attacks Open source software has not been a major target of security attacks, and this is generally thought to be due to the predominance of Windows as a platform. The number of Linux security attacks is increasing, however, due to increased popularity of Linux. There are currently more than 100 viruses that target Linux [2] and this number is constantly rising. There are also other attacks against Linux, including worms, Trojans, denial of service (DOS) attacks and rootkits. Many Linux servers have been attacked and attacks are increasing [3], because many servers on the Internet run Linux. The main reason cited for the vulnerability of Linux servers is due to poor server administration, and not due to inherent security vulnerabilities in the software (Ibid). The complexity of administering a Linux server is also cited as one of the reasons to use a Windows server instead of Linux [4]. This raises another source of insecurities, which is the complexity of administrating the server. Poor administration leads to insecurities. Different distributions of Linux leave multiple ports open, increasing the vulnerability of the system to attacks. A default Windows installation may leave ports open, but because it is generally easier to administer, it is easier to close unwanted services than on Linux. Systems that offer better ease of administration are therefore preferred, but this issue is not inherent to source distribution philosophies, and so is beyond the scope of this work. It is important to note that ease of administration does not mean that one OS (whether open or closed source) is more or less secure than another. An system administrator expert in any OS will know how to best reduce vulnerabilities and secure the server. There is one major way in which Linux and Windows are administered, which is that Linux administrators generally don t run as root, instead running as a
11 3 VULNERABILITIES 7 normal user account, and use setuid or sudo to execute commands as root. Windows administrators, on the other hand, typically run using Administrator mode all the time. While this is not exactly an open vs. closed source issue, it can help explain why there might be more successful attacks on Windows than Linux. Linux viruses often infect ELF (Executable and Linkable Format) files, which are common on Linux systems. Other attacks use shell scripts, which are often compatible across platforms and distributions, allowing them to spread more widely than a binary file. The sophistication of Linux viruses has also increased. For example, a recent virus, W32/Etap.d is a polymorphic virus, making it difficult to detect. A variant of this virus is able to infect Windows portable executable files in addition to Linux files. Because open source code is often shared among different open source software (e.g. different Linux distributions or applications), some vulnerabilities can exist on multiple open source software. Apache is one example. The Linux/Slapper worm makes use of a known vulnerability in the Open SSL library to infect Apache web servers. In addition, the Linux/Adore.worm uses a random port scan to identify systems that contain a root access vulnerability on Linux servers. Even though there is only one vulnerability, multiple operating systems are affected. Because open source software comes in many different flavors (e.g. the many varieties and distributions of Linux), it is more difficult to coordinate a simultaneous patch for all distributions. Since most attacks are made after both the vulnerability and patch have been made known publicly, but not all distributions have patches available, some distributions will be left vulnerable to attacks while others can be patched. This is a clear disadvantage of the distributed nature of open source software development. However, by the same argument, it is more
12 3 VULNERABILITIES 8 difficult for attackers to target multiple distributions simultaneously, so there are both positive and negative aspects to open source software distributions Buffer Overflow Buffer overflows are easily found via automated tools that perform static code analysis; since this type of attack is specifically related to the structure and symbols in a given program s construction, we state that buffer overflows are source level attacks. As such, they are quickly detectable from any body of visible source code. Hence, any open source project with buffer overflows vulnerabilities in its code base will be susceptible to such an attack, and adversaries could use automated tools to perform a vulnerability analysis. However, these same tools are available during the lifecycle of the software under construction, and should be a routine part of any security analysis and walkthrough the code receives. In fact, many modern development environments will automatically warn developers if they have used legacy code constructs that could be subject to overflow attacks, and newer programming languages seek to disallow the types of memory structure declarations that allow programmers to overrun memory spaces. An example of a buffer overflow exploit is the infamous Blaster worm released in 2003 exploited a vulnerability in the Windows DCOM service. The Blaster worm spreads without any user participation, such as opening an or visiting a web site. [5] SQL Injection SQL injection attacks generally follow the same strategy find a web server that advertises database services and look for an interface, such as a username and password login webpage, that accepts client-side input. By providing carefully constructed input to the interface, the SQL database or even the server it is
13 3 VULNERABILITIES 9 running on can can be compromised. This attack is analogous to the buffer overflow attack for remote code execution in that it exploits failure to properly verify and limit input data. As such, it is a source-dependent attack Patch Reverse Engineering A so-called day zero attack is the result of reverse engineering a recently released software update, in an effort to discover and exploit the problem the patch is supposed to fix. The patch itself serves as a blueprint describing a real vulnerability that most computers (unpatched thus unprotected) are susceptible to. The day zero moniker is derived from the fact that the best time to exploit the greatest number of computers is immediately following the patch release because the exploit becomes less valuable as the patch is applied to an increasing number of systems. In preparation for this style of time sensitive attack, tools are generated by attackers that can automatically generate a working exploit, given a patch as input. Day zero attacks are code level attacks, and a disadvantage to open source software. Interesting to note here is that closed source software suffer from this exact class of attacks, too. The subtlety lies in the fact that the differences in machine code between patched and unpatched files can be reverse engineered to give an attacker visibility into the original security flaw, regardless of whether the source code is available. So, in this class of attacks, both open and closed source software are at risk. 3.2 Source-Independent Attacks A large set of attacks do not rely at all on security flaws in source code, and thus neither open source or proprietary software is safer with respect to such attacks. In this section we describe some of these attacks to demonstrate that for these
14 3 VULNERABILITIES 10 classes, systems are equally vulnerable regardless of the software development philosophy employed when creating the operating system and other software on it User Participation Many types of data theft (both corporate data and phishing for consumer data), spyware, viruses, and other attacks require some participation by a system user. Often these attacks just rely on the user executing a program or providing data to a party they should not. Often such attacks exploit the ignorance or inattention of the user. For example, many users will click Yes on any dialog that pops up just to make it go away.[6] Traditional viruses propogated when users transferred files between computers, often by floppy disk, and ran an infected application. Such viruses do not rely on security flaws in the applications that they infect. If a user is logged into a system with root or administrator priveleges, any application that is executed during that session can also run with such privileges. This includes installing drivers, patching the kernel, etc. Other attacks may rely on user participation to exploit vulnerabilities, such as those that permit elevation of privileges. For example if there is such a security flaw in a part of an operating system that is not accessible via the network, an attack may require an unprivileged user to launch a program that implements the exploit. The vulnerability exploited as part of the Red Team exercise is one such example. The target application was not accessible via the network, but once the Red Team logged on with a limited user account it was able to execute the program and elevate the accounts privileges. Attacks sent via attachment are a common example of those that require user participation. An adversary creates a script or program that generates socially-engineered s that entice the user to open the attached file.
15 3 VULNERABILITIES 11 The infamous Love Letter (also known as I Love You )[7] and MyDoom[8] worms are examples of such attacks. While these worms attacked a specific operating system, they were dependent on user participation rather than exploits to spread Brute Force Attacks Brute force attacks, such as dictionary password attacks on systems that permit remote access, are also independent of source bugs. In the case of dictionary password attacks, adversaries repeatedly try to log into a system (often as root or administrator) until they are successful. No code vulnerability is necessary to execute such an attack and therefore software based on both open and proprietary source is susceptible Protocol Vulnerabilities. Some industry standard protocols have vulnerabilities inherent in the protocol itself or its dependencies. Since all software that supports the protocol is implementing the same protocol, all such software is equally susceptible. The Kerberos Man-in-the-Middle vulnerability is one example. Any standard implementaiton of Kerberos could be exploited regardless of source code availability. Such protocol vulnerabilities may be more worrisome than software vulnerabilities because the potential set of targets is larger as it includes many different platforms Physical Intrusion and Inside Jobs While clearly the most pedestrian of the techniques surveyed thus far, no less effective is the physical intruder or an inside job executed by someone with access. In addition to offering immediate access to any system on the Internet
16 3 VULNERABILITIES 12 remote attacks also offer an additional level of anonymity and security for adversaries. In contrast, the simplicity of a physical attack is alluring for some, especially when network security is tight and a specific target is desired. When an adversary has physical access, the software implementation philosophy rarely matters. 3.3 Frequency of Attacks The reported numbers of cyber attacks for all operating systems has grown steadily and, during some outbreaks, explosively, in the past decade and beyond. CERT, the coordination center for the Computer Emergency Response Team at Carnegie Mellon, has reported more than three hundred thousand incidents (where each incident could involve whole networks) since CERT reports that, given the growing use of automated attack tools, attacks against networked systems have become so frequent that counts of the number of incidents reported provide little information with regard to assessing the scope and impact of attacks. Therefore, as of 2004, [CERT] will no longer publish the number of incidents reported [9] and in place of sheer numbers, CERT will work to develop a more meaningful metric. However, we are able, at the very least, to note an increase in interest in and use of cyber attacks over the past decade and a half, so we include figure one. The growth in the number of attacks might seem to suggest multiple things, but we must take care not to derive too many conclusions; these statistics are for all operating systems and each incident could represent a completely compromised network or simply one computer. The increase in automation of attacks would help account for some of the explosive growth, and the increase in personal computer sales from 1988 to today provides for significantly more possible targets to attack (all sharing a similar base of operating systems and applications).
17 4 SECURITY ANALYSIS Understanding Attack Frequency Many observers agree that a significant reason why Windows has been subject to more attacks than Linux is because it is a much more popular operating system [10]. In 2004, Linux market share globally was only about 3% [11], about the same as Mac OS, leaving Windows with most of the remaining 94%. Given this data, replacing closed source software with open source would not solve the problem hackers would simply move to the next major target. As we will shortly see, Linux viruses exist, but in much fewer numbers than for Windows. In fact, some vulnerabilities have been left unpatched in Debian Linux because they did not feel the risk of an attack was significant enough to fix (Ibid). 4 Security Analysis 4.1 Vulnerability Discovery Currently, it is mainly left up to the open source community to find and fix security issues in open source software. However, with the growing endorsement and investment of open source software (e.g. Linux) from large corporations such as IBM and Novell, more people who are security experts (who are employed by those corporations) will be finding and fixing security issues. Thus, we can expect the security of open source software to increase in the next few years. This will reduce any difference that exists in the security of open and closed source software. For closed source software, security processes are now commonplace (e.g. at Microsoft) to attempt to reduce the number of vulnerabilities that exist in the software. These companies employ software security experts and even have security teams set up such as Microsoft s MSRC [12]. These processes enable companies to fix problems before they are discovered by customers, or a
18 4 SECURITY ANALYSIS 14 hacker. As with open source software, security bug reports also come from the community. 4.2 Security Tools Threat Modeling and Exploit Classification Threat modeling is a method commonly used to find and address security threats in software. It is basically a brainstorming process that can be summarized as follows: A list of all inputs into the program is created. A list of all vulnerabilities in the program is created. These may be external dependencies (for example, APIs which the programmer has no control over) or other vulnerabilities which are not easy to eliminate. Vulnerabilities are typically classified according to the STRIDE classification system. STRIDE is an acronym which stands for: Spoofing identity, Tampering with data, Repudiation, Information disclosure, Denial of service, and Elevation of privileges. They each refer to different classes of threats. Spoofing identity refers to obtaining access and use of another person s authentication information, such as username and password. Tampering with data refers to modifying data without the owner s permission. Repudiation refers to the ability to keep track what actions were performed, and who performed them. Information disclosure refers to obtaining information without having permission to access it. Denial of service refers to attempts to prevent legitimate users from using a service or system. Elevation of privileges refers to where an underprivileged user obtains higher-privileged access. The STRIDE model was developed by Microsoft and is used by developers to identify security issues in their code. After categorizing each of the vulnerabilities; for each of the inputs into the program, ways in which the inputs could threaten the vulnerabilities are listed.
19 4 SECURITY ANALYSIS 15 For example, a program that sends data across a network might have a threat that the data could get tampered with as it is being sent across the network. Finally, mitigations for each threat are listed. A mitigation for the network example above could be to encrypt the data before sending it using a strong encryption method, or to use checksums. If a program is too big for all inputs to be listed at once, it can be broken down into features and subfeatures, and a threat model performed on each of these Source Code Scanners Source code scanners (such as Flawfinder, RATS and ITS4) exist for both open and closed source software, and help create more secure code by finding common security issues in source code and often suggesting more secure code that could be used instead [13]. Both Flawfinder and RATS (Rough Auditing Tool for Security) are free, while ITS4 (It s The Software Stupid Source Scanner) charges a fee for its use. All three tools find problems with using functions such as printf() with variable length strings, gettext libraries and their use in internationalization. All three are configurable, allowing different levels out output (depending on the priority of the issue found) and ignorable lines. Flawfinder is the fastest of the three, while RATS finds the most errors (Ibid). One problem with all three tools is that they do not do any preprocessing, so some mistakes can go unnoticed (for example, if you create a macro for the printf function). ITS4 does not give as useful output as the other two tools, as it does not suggest secure alternatives. A commercial tool, Microsoft Visual Studio 2005, includes two source code security scanners, one called FXCop, which scans managed,.net Framework code; and one called PREfast, which scans regular C/C++ code [14]. These tools were used internally and have been tested within Microsoft before becoming part of Visual Studio. They both scan for a large number of potential errors,
20 4 SECURITY ANALYSIS 16 which can be selected individually from a settings dialog. Suggestions on how to fix the code are also given. The main limitation of source code scanners is that as a general-purpose automated tool, it will never be as thorough as a manual code review. A good suggestion is to use a code scanner as a pre-pass before the programmer does a manual audit of the code. It is also important for the programmer to understand what each API used does. For example, some libraries may be using unsafe APIs in them, which a code scanner would not find (unless the source for them is scanned as well). Internally, Microsoft uses another tool, called PREfix (Ibid) which takes much longer but searches for even more errors. Because the tool is internal, Microsoft here has an advantage over open source code. But as mentioned earlier, as more large corporations invest in open source software, these advantages are expected to become less relevant in the near future. 4.3 Security Reviews Closed source development is generally more organized than open source development, and thus there are more processes involved. One such process is the security review, which most major software development companies use. These typically include Threat Modeling and running security tools statically on the code or during runtime. For example, Microsoft does a security pass at least once during each product development cycle. During a security pass, relevant source code is reviewed for security issues, code analysis tools are run on the source code and the bugs fixed, and tests, which try to find various security issues, are run on the software. Open source development, being more distributed and less conventional, does not always go through a security process. Security review methods that can be
21 5 SOCIOECONOMIC EFFECTS 17 used effectively in open source projects include running code scanners (such as Flawfinder, RATS, and ITS4) and the fact that there are a large number of people looking at the code. However, the people looking at the code may not be experts or understand the code fully, which could let more security bugs go unnoticed. In addition, the tools available to large corporations are often more advanced than those available to the open source community. Furthermore, corporations - as with individuals - have access to all the tools in the open source community. The open source community may also be limited as to the APIs that can be used, where more secure APIs exist commercially. While open source may have traditionally been a less organized grass roots effort, that is not always the case, especially for the major open source projects. Over the past decade, corporations have invested billions of dollars in open source software - mostly Linux. [15][16] IBM, Intel, Red Hat, and many other companies have full time employees contributing to Linux. In addition, Open Source Development Labs (OSDL) acts as the central body dedicated to accelerating the use of Linux for enterprise computing. [17] It is worth noting that around 95% of software bugs are caused by 19 common, well-understood programming errors [18]. 5 Socioeconomic Effects The availability of the cource code for open source software has additional effects on the ecosystem of such software beyond just source code availability. These effects include the speed at which security fixes are available and the ability to customize security, to name a few.
22 5 SOCIOECONOMIC EFFECTS Business Decisions Some security vulnerabilities are worsened by business decisions that are unrelated to the product s source code availability. For example, Microsoft made the decision to enable the DCOM service by default in Windows XP despite the low utilization of this future in the user base. [19] While the vulnerabilities discovered in DCOM was a code flaw, the Blaster worm that exploited it would not have spread nearly as quickly or broadly as it did if DCOM had been disabled by default. The Code Red and Nimda worms took advantage of a similar business decision that left vulnerable services enabled by default. Default installations for Microsoft s Internet Information Services (IIS) web server (versions 4.0 and 5.0) included the Microsoft Indexing Service. As a result, a vulnerability in the Indexing Service could be exploited on most systems using the IIS web server regardless of whether the system was actually running the Indexing Service. [20] Code Red alone is estimated to have caused billions of dollars in lost productivity. [21] The impact would have likely been reduced had only systems that needed it had the Indexing Service not been installed on servers that were not using it. The decisions or lack of awareness of customers can also have an impact on the success of exploits. Once a patch is available, it is important for customers to apply them to their systems. A patch for the DCOM vulnerability was available for nearly a month before Blaster was released [22], and Nimda exploited the same vulnerability (for which a patch was available) as Code Red had a few weeks earlier. [21] (Note: The average delay between the publishing of a vulnerability or patch and the release of malicious exploits has decreased significantly since these worms were released.) If different decisions - both by software vendors and customers - had been
23 5 SOCIOECONOMIC EFFECTS 19 made, some of the most damaging and infamous worms in the Internet s history may have been merely minor issues or not created at all because of the low potential return on investment for the author. Both open source and proprietary software products are susceptible to business decisions worsening the impact of or exposing code flaws. For example, one need not see the source code for DCOM to understand that this service was a potential vulnerability. They are also both susceptible to customer ignorance, apathy, or delay in applying patches for known vulnerabilities. 5.2 Accountability and Support Accountability is an issue that often comes up when large organizations are considering adopting open source software. For example, a recent editorial in Federal Computer Week [23] says CIOs considering a move to open-source software need someone to hold accountable someone who has the resources to address any problems that occur. They want to know that they will have support available when they have problems. This is especially important for security issues, because they can be very costly to corporations, as shown by the numerous worms and viruses that have spread recently. When a company buys software from Microsoft (as an example of a closed source system), they expect Microsoft has a level of accountability. The EULA (End User License Agreement) users agree to in order to use the software does not actually provide any accountability, but the reputation of software gives a company a level or accountability. If the software does not work, people will not use it, so it is in Microsoft s interests to fix security problems as they are discovered. In fact, this is what happens, as attested to by the numerous security updates that Microsoft releases. When a company buys a Linux solution from IBM (as an example of an open
24 5 SOCIOECONOMIC EFFECTS 20 source system), there is also no accountability provided by IBM, but because they do not own the software (Linux software is distributed under the GNU Public License), there is less loss of reputation for any security issues that are found. IBM will provide setup support, but will not fix any bugs or security issues. These issues are left up to the Linux distribution s open source community to fix. Because there is no company that can be immediately contacted or responsible for fixing the issue, some corporations will not use open source software. 5.3 Patch and Fix Distribution Microsoft releases regular security patches which they call critical updates. Apple also releases monthly (or, as necessary) security updates for Mac OS X. Users have the option to be alerted when security patches are available, and then let them download and install the patch manually; or download automatically and let them install manually; or automatically both download and install the patch. One problem is that users typically need to reboot after installing a security patch, which may delay installation of the patch since many users do not wish to be forced to reboot their computer, instead preferring to keep their applications and documents open for days at a time. In this situation, the computer is vulnerable until it is rebooted, even though the patch has been downloaded and installed. This problem exists less on Linux, where reboots are not required as frequently [24]. Several major Linux distributions (e.g. Debian, Red Hat) also have automated security updates, which have similar features to Microsoft s security updates. While the patch mechanism is not an open source vs. closed source issue, it shows that the open source community has the resources to adequately issue patches and notify users of patches.
25 5 SOCIOECONOMIC EFFECTS Availability of Security Fixes When proprietary software vendors fix security flaws, they must validate it and get it into a release or patch. This process could take up to a year or more in the worst case. In some cases, the company may decide not to fix the flaw at all. In the open source community, however, end users could apply a fix as soon as it is implemented. This process is complicated by the fact that vendors must avoid incompatibilities with their customer base. Microsoft says the following regarding this issue. Microsoft products run on thousands of different manufacturers hardware, in millions of different configurations, and in conjunction with countless other applications. Our patches must operate correctly on every single machine. This is a significant engineering challenge under any conditions, but it is even more difficult when details of a vulnerability have been made public before a patch can be developed. In such cases, speed must become our primary consideration, in order to protect our customers against malicious users who would exploit the vulnerability. [25] Furthermore, significant new security features may not be available to users until the next major release or service pack. Software is often only released every couple or few years, so significant new security features may be withheld from users for years regardless of how long the feature took to implement. There are also vendors that package open source software and must follow the same steps and be just as careful when releasing patches or other software updates. However, if an end user really wants the fix and is willing to accept the risk or test their configuration (i.e. in an IT department), they can get the fix immediately. Even if an open source vendor does not fix a security flaw, if it is important enough to end users, someone will likely implement a fix. In
26 5 SOCIOECONOMIC EFFECTS 22 addition, its possible that some group or vendor will release a distribution with the feature. Because there are many different distributions of Linux, there is competition between the makers of these distributions which are based mostly on the same code base. This means that once one distribution has a feature, there could be pressure on other distributions to add it as well for fear of losing customers. Regardless, users could always switch to another distribution while switching distributions can be a hassle, it is much simpler than changing operating systems all together (i.e. Windows to Linux). 5.5 Custom Software and Configurations In addition to permitting end users to apply security fixes as early as they wish, open source software also allows end users to make their own modifications to improve security. Anyone with the right knowledge and skills can make a derivative or custom version of open source software. One might choose to do so to limit exposure or increase security. Linux and Windows each contain tens of millions of lines of code.[26] Security vulnerabilities could be waiting in nearly any portion of that code, yet most users only need a minority of the code. As noted earlier, the Blaster, Code Red, and Nimda worms took advantage of vulnerabilities in features that many Windows users did not need. By compiling and installing only features that one really needs, there is less code with potential bugs and less code to review for security flaws if one chooses to. Custom builds do create their own potential vulnerabilities since the changes have not been reviewed by or tested by the wider community. However, as mentioned earlier, adversaries are more likely to go after more widely distributed software, unless of course you are a high value target. Custom builds also require that the maintaner merge applicable security fixes into the custom build. One solution to both issues is to submit the changes or derivative back to the community.
27 5 SOCIOECONOMIC EFFECTS 23 Other benefits of the ability for end users to customize software include the ability to add features or security updates to an existing version of software without being forced to upgrade to a new version, which may contain new vulnerabilities. The opposite can happen as well features or support may be removed from a newer more secure version of software so users continue to run an older less secure version. This often occurs when hardware vendors make a business decision not to provide support (drivers) for older hardware on new versions of Windows. Consumers must then decide whether to pay to replace their hardware so that they can upgrade Windows or continue to run an older version of Windows. If the driver were open source and there was enough interest, someone may update the driver and provide it to the general public. In addition, if a open source software vendor does not think implementing a customer s request makes business sense, the customer or an organization of customers can modify the software themselves to suite there needs. Security Enhanced Linux (SE Linux) is one such example that grew out of the United States National Security Agency s (NSA) frustration with computersecurity weaknesses in the late 1990s. When proprietary software vendors rejected the idea of investing large amounts in extra-secure systems, the NSA began implementing its own derivative of Linux with an advanced security architecture. The agency then submitted SE Linux for inclusion in the Linux kernel and SE Linux eventually made its way into commercial products.[27][28] Rootkits, such as the recent one found on some Sony music CDs, provide a us with a specific example of a modification a user may wish to make. The XCP rootkit on these CDs relies on the ability to patch functions in the system call table. [29] While Microsoft acknowledges that allowing patching of the kernel is undesirable, they have decided to continue to permit it in 32-bit versions of Windows because preventing it would break compatibility for a significant
28 5 SOCIOECONOMIC EFFECTS 24 amount of released software. [30] If Windows were open source, end users would be able to decide for themselves whether protection from such rootkits or compatibility with software that can interfere with other software and affect the stability of the operating system [30] is more important to them. The answer would vary among end users, but at least they would have the option. Instead, end users that are concerned and knowledgeable enough are left in an ongoing battle to detect whether a rootkit has been installed on their system. 5.6 Security Fixes for End-of-Lifed Software As with many other industries, software vendors like to end-of-life support for older software. For various reasons, customers may wish to or have business needs to continue using software beyond its supported timeframe. When proprietary software is no longer supported, these customers may be left vulnerable to new exploits. With open source, however, customers could make their own security fixes for security flaws indefinitely even if the original author or vendor is no longer releasing security updates. The same benefits apply if a vendor goes out of business. Although not directly related to cyber security, the Y2K phenomenon demonstrates the need for source code. Countless software applications had to be replaced or updated to support four-digit years. Many companies decided to update their decades-old software rather than migrate to new hardware and software. Fortunately for many of them, the old software had been developed in-house, in which case they had the source code, or by vendors that provided year 2000-complian updates. Companies with commercial software for which no source or updates were available may have had to make different - potentially more costly or risky - decisions. While open source software can help alleviate such scenarios, proprietary
29 6 CONCLUSION 25 software can also offer such cyber security blankets. Potential solutions for proprietary software include licensing the source code for specific use or putting it into escrow. Microsoft has even provided Windows source code to some customers, such as large governments.[31] 6 Conclusion While open source makes code visible, we have found that source visibility does little to increase the security risks posed to a given project, in most cases. Security analysts report that, in some situations, source level visibility can even assists in the convergence of projects to stable and secure states.[32] The current scale and prevalence of closed source systems relative to open source makes discerning meaningful conclusions from attack frequency alone difficult. It is expected that hackers will attack those targets offering superior economies of scale, but this does not preclude the possibility of closed source systems being more secure based on the sheer number of assaults mounted against such a system. If the operating system a hacker chooses to attack is rarely deployed, then the development of a corresponding exploit for that machine is of relatively little value. However, an exploit that can successfully compromise a wide base of systems is valuable indeed; we conclude only that popular systems are popular for attackers. Closed source advocates will frequently cite the structure and adaptive remote development techniques as being too ad hoc and thus insufficient, not capable of uniform and coordinated evaluations or reviews by professionals. Open source is not a community of hobbyists, but rather a diverse grouping of professionals and full time industry experts from international corporations such as Intel, IBM, and RedHat. The closed source software lifecycle, while necessarily structurally different due to topology differences between contributers, has not
30 6 CONCLUSION 26 to date been shown in any quantative fashion to be inherently less secure. Open source advocates frequently note their system to be more secure based on attack frequencies, as well as other observations that frequently are supported by strong opinions more than available data. In this research, we have been unable to demonstrate greater security through obsecurity or cloaking, and thus unable to assert that closed source offers additional protections or tangible security features we can leverage in pursuit of a more secure system. The ability to read the source in and of itself offers little additional incentive for hackers to specifically target open source projects. If the secrets in software were completely containable (possibly through encryption), then perhaps a security through obscurity argument would apply more concretely; instead, however, since source code can be reverse engineered (to various levels of readability or success), the value of hiding the implementation is diminished. Further, exposing the code has side-effects that can be beneficial (such as unsolicited security reviews or software reuse), while cloaked source has no such counterparts. Finally, code leaks are somewhat common and difficult to prevent[33], so it is likely that any closed source project has been opened at some point, diminishing the value of the information hiding further. In addition, as described in this paper, many security attacks are independent of the source code, so neither open source or proprietary software is less secure. In conclusion, open source does not pose any significant barriers to security, but rather reinforces sound security practices by involving many people that expose bugs quickly, and offers side-effects that provide customers and the community with concrete examples of reusable, secure, and working code.
31 REFERENCES 27 References [1] D. A. Wheeler, Secure programming for linux and unix howto. HOWTO/open-source-security.html, March [2] Linux - the new target for threats? Gadget.co.za. [3] M. Broersma, Hack attacks on linux on the rise. mh, July News.com. [4] E. Hurley, Scrap iis?. gci779497,00.html, November Tech Target. [5] S. Bekker, Blaster worm exploits rpc dcom vulnerability. August [6] The default answer to every dialog box is cancel. September [7] Cert advisory ca love letter worm. May CERT/CC. [8] S. Harris, Cyber alert system debuts as super worm spreads. January National Journal Group.
32 REFERENCES 28 [9] Cert/cc statistics stats.html, CERT Coordination Center. [10] R. Gedda, Open source security not good enough CIO. [11] G. Keizer, Linux to ring up $35 billion by TechWeb. [12] Microsoft security Microsoft, Inc. [13] J. Nazaario, Source code scanners for better code Linux Journal. [14] J. Udell, Source code analysis breaks new ground. 1.html, October Info World. [15] J. Wilcox, Ibm to spend $1 billion on linux in December CNET News.com. [16] Ibm s open-source army. s+opensource+army, August Red Herring. [17] About osdl. osdl/. Open Source Development Labs (OSDL).
33 REFERENCES 29 [18] [19] M. Liron, Dcom windows xp: Do you need it?. September [20] R. Boyce, Code red - iss buffer overflow. The SANS Institute. [21] E. Hurley, Scrap iis?. gci779497,00.html, November TechTarget. [22] Ms03-026: Buffer overrun in rpc may allow code execution. October Microsoft. [23] Reviewing the case against open source. April FCW.com. [24] Security report: Windows vs linux. report windows vs linux/, The Register. [25] Acknowledgment policy for microsoft security bulletins. January Microsoft TechNet. [26] D. A. Wheeler, Counting source lines of code (sloc). [27] D. Clark, Defense, nsa move on open source software development. March National Journal s Technology Daily.
34 REFERENCES 30 [28] M. S. Mimoso, Red hat brings se linux to fedora. gci957636,00.html, March SearchOpenSource.com. [29] M. Russinovich, Sony, rootkits and digital rights management gone too far. October [30] Patching policy for x64-based systems. September Microsoft WHDC. [31] D. Appleman, Opening source: The ultimate customer security blanket. March [32] Creating a national framework for cybersecurity. cybersec.pdf, February acm. [33] S. Kuchinskas, Microsoft s loss not linux gain. February InternetNews.
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Operating System Security
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Endpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
HACKING RELOADED. Hacken IS simple! Christian H. Gresser [email protected]
HACKING RELOADED Hacken IS simple! Christian H. Gresser [email protected] Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
Chapter 14 Computer Threats
Contents: Chapter 14 Computer Threats 1 Introduction(Viruses,Bombs,Worms) 2 Categories of Viruses 3 Types of Viruses 4 Characteristics of Viruses 5 Computer Security i. Antivirus Software ii. Password,
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Sample Report. Security Test Plan. Prepared by Security Innovation
Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
12 Security Camera System Best Practices - Cyber Safe
12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements
NERC CIP Ports & Services Part 2: Complying With NERC CIP Documentation Requirements White Paper FoxGuard Solutions, Inc. November 2014 Defining Ports And Services In part 2 of our Ports and Services white
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Patch management with WinReporter and RemoteExec
White Paper Patch management with WinReporter and RemoteExec This white paper provides an overview on how to use WinReporter and RemoteExec in conjunction to keep Windows systems updated and immune to
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Top Ten Cyber Threats
Top Ten Cyber Threats Margaret M. McMahon, Ph.D. ICCRTS 2014 Introduction 2 Motivation Outline How malware affects a system Top Ten (Simple to complex) Brief description Explain impacts Main takeaways
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
TIME TO LIVE ON THE NETWORK
TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Three Ways to Secure Virtual Applications
WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Enhancing Cyber Security for the Warfighter
INTRODUCTION 115 Chapter 8 Enhancing Cyber Security for the Warfighter Sean R. Finnegan A key element of current and future U.S. warfighter capabilities is and will be the information systems being integrated
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
