Preemptive security and robustness testing solutions
|
|
|
- Ashlee Fitzgerald
- 10 years ago
- Views:
Transcription
1 KMP/IKE iscsi Kerberos LACP LDAPv3 LPD MGCP Modbus MPLS/LDP MSTP NFS NTP OSPFv2 OSPFv3 PIM-DM/SM POP3 PPPoE RADIUS RIP RIPng Rlogin RSTP RSVP RTCP RTP RTSP SCTP SigComp SIP SMTP SNMPv1 SNMPv2c SNMPv3 SRTP SSH1 SSH2 STP SunRPC Syslog TACACS+ TCP Telnet TFTP TLS/SSL UDP UPnP VLACP WPA1 WPA2 VRRP X.509 XML AIFF AU AMR IMY MP3 VOC WAV CAB GZIP JAR LHA ZIP A2DP AVRCP BIP BPP DUN FAX FTP H A ARP BGP4 BOOTP CIFS/SMB DHCP DHCPv6 Diameter DNS DVMRP EAP ESTP Finger FTP GRE GTPv0 GTPv1 H.248 H.323 HSRP HTTP ICMP ICMPv6 IGMP IKEv2 IMAP4 IPsec IPv4 IPv6 IS-IS IS ch L2CAP OPP PBAP RFCOMM SDP HID SAP BMP GIF JPEG MBM PCX PIX PNG PNM RAS TIFF WBMP WMF XBM XPM AVI MOV MPEG1 MPEG2 Codenomicon whitepaper: Building Secure Software using Fuzzing and Static Code Analysis - Anna-Maija Juuso and Ari Takanen Introduction Building Security into Systems Differences in Test Coverage False Positives and Negatives White-box vs. Black-box Testing Static vs. Dynamic Vulnerability Management Fuzzing and Static Code Analysis in the SDL and BSIMM Models Combining Fuzzing and Static Analysis Conclusion CODENOMICON Ltd. [email protected] Tutkijantie 4E FIN OULU FINLAND North Tantau Avenue Cupertino, CA UNITED STATES
2 1 Introduction The increased complexity of new technologies and faster software release cycles are making traditional reactive security solutions ineffective. Instead, more adaptable, preemptive product security testing is needed. Moreover, for example, due to agile development and outsourcing, the software development process itself is also becoming more complicated further increasing the need for more effective product security practices. The Building Security In Maturity Model (BSIMM) and Microsoft s Security Development Lifecycle (SDL) concept combine preemptive security testing with the SDLC models. Fuzzing and static code analysis are both a natural part of these secure development best practices, because they promote building security into systems proactively, instead protecting vulnerable systems and reacting to security issues. In this whitepaper, we describe how fuzzing and static code analysis can be used as complementary methods to ensure the security and robustness of your software. 2 Building Security into Systems Vulnerabilities Enable Attacks Vulnerabilities are not created, when a system is being attacked; they enable attacks. Vulnerabilities are implementation errors that are introduced into the code, when the programmer makes a mistake. They become vulnerabilities, once the software is released exposing the software for attacks. Security researchers, security companies and hackers discover some of the vulnerabilities, and if they choose to report the findings, they can enable software developers to create patches for the found vulnerabilities. However, other vulnerabilities still exist in the code waiting to be exposed. These unknown vulnerabilities are called zero-day vulnerabilities. Software vendors are unaware of their existence, thus there are no ready patches for them. Once a zero-day vulnerability is triggered, the developers race against the clock to get it fixed, before irrevocable damage is done to the company s sales or reputation. All Vulnerabilities are Exploitable Attackers need to find vulnerabilities in a device or a system in order to devise an attack against it. Basically, any crash-level bug can be exploited to attack a system or an application. Attackers send unexpected inputs to a system, and if they can get an abnormal response from the system, they continue to refine their inputs until they get the system to behave the way they want. Sometimes bugs can be exposed by simple individual inputs, and sometimes attackers have to communicate with longer message sequences with the system, in order to gain access to the deeper protocol layers. In some cases, vulnerabilities can even be triggered by events like heavier than normal use or maintenance. Therefore, the best way to ensure the security of your systems is to build security into it by finding and fixing these critical bugs before they become security vulnerabilities. The goal of both fuzzing and static code analysis is to produce better quality software by finding vulnerabilities in the code before deployment.
3 3 Differences in Test Coverage Testing Entire Systems with Static Code Analysis Static code analysis tools identify problematic programming practices and risky code structures. The purpose of the code review is to ensure that secure coding policies are being followed. Static code analysis is an efficient process for identifying many common coding problems. It examines the entire source code looking for syntactic matches of common coding problems using patterns and rules. The more advanced tools adopt a multi-layered approach to source code analysis, combining syntactical and semantic analysis with other forms of analysis. These include searching for architectural clusters or spaghetti code, analyzing dependencies and coupling, threading issues and metrics. All of these can relate to the security of a system. Figure 1a illustrates that static analysis tools can find bugs in the entire software, but not all the issues it finds are critical or exploitable. Testing Open Interfaces by Fuzzing Fuzzing, on the other hand, is a form of attack simulation, in which unexpected data is fed to the system through an open interface, and the behavior of the system is then monitored. If the system fails, for example, by crashing or by failing built in code assertions, then there is a bug in the software. Similar to advanced code analysis tools, more advanced fuzzing tools also test multiple layers. It is important that the fuzzers can genuinely interoperate with the tested system. Only this way can they access the deeper protocol layers and test the system more thoroughly. In contrast to static analysis, fuzzing can only find bugs, which can be accessed through an open interface, as illustrated by Figure 1b. However, all the found issues are critical and exploitable. ATTACK SURFACE ATTACK SURFACE Figure 1a. Static Code Analysis Coverage FEEDS FEEDS Figure 1b. Fuzzing Coverage
4 4 False Positives and Negatives The problem with static analysis is that it also reports bugs that the software does not contain, namely false positives. Because it is impossible to test the entire system, test tools have to make a number of approximations, which leads to inaccuracies. False positives are troublesome, because checking them consumes valuable resources. Thus, some tools have adopted heuristic or statistic approaches. The advantage of these approaches is that they can reduce the amount of false positives without compromising test coverage. In effect, it can improve a tools ability to catch critical vulnerabilities. In fuzzing, there are no false positives: Every bug is discovered as a result of a simulated attack. Thus, they are all real security threats. Simple fuzzing techniques rely on random mutation to create test cases. The coverage of mutation based Fuzzers is limited and thus they only find some of the vulnerabilities the software contains. Yet, this is better than performing no fuzzing at all, because these are the vulnerabilities the attackers would also find. More sophisticated fuzzing techniques improve coverage by using protocol specifications to target protocol areas most susceptible to vulnerabilities. This type of optimized test generation also reduces the amount of test cases needed without compromising test coverage. 5 White-box vs. Black-box Testing Performing static code analysis on software requires source code access. Thus static code analysis is essentially a solution for sell-side companies producing their own software, whereas fuzzing can be black-box, grey-box or white-box testing. Therefore, it not only provides solutions for companies developing software, but also for companies, which outsource their code development. Companies with their own software development processes can get the best advantage from security testing by integrating fuzzing and source code analysis into their software development process. Thus, they can find vulnerabilities at the earliest possible moment. The earlier vulnerabilities are found, the easier and cheaper it is to fix them. Fuzzing is also a quick verification method for third-party developed code. Companies with outsourced code developments can integrate fuzzing into their sourcing processes and mitigate risks by checking their systems before deployment. This type of testing can also take the form of interoperability testing. Moreover, by fuzzing their outsourced software components, the companies can ensure that the price matches the quality and also provides them with tools for price negotiation. In addition, fuzzing can be used by end-users of the software without any access to source code, providing an automated means of quality assurance for later steps in product life-cycle. 6 Static vs. Dynamic Static code analysis is a good method for improving the general software quality level. A major difference between static code analysis and fuzzing is the intrusiveness of the testing method. Static code analysis can only be performed off-line. As its name suggests, static code analysis is performed on static code, which is not being executed during test. While this has the benefit of full test coverage, it cannot easily provide a test verdict for complex problems and therefore will result in a lot of false positives. Fuzzing, on the other hand, needs to be executed against executable code. It can find vulnerabilities that are triggered by complex runtime behavior. Such vulnerabilities are not necessarily visible in the static code. Fuzzing can be performed against live systems. However, because fuzzing is an intrusive method of testing and will most probably crash the target system, it is recommended that you at least start testing in a separate environment, for example a virtualized environment or a test lab. Figure 2 illustrates the differences between the testing techniques by comparing the types of bugs they find.
5 code #include <stdio.h> int main() { char buffer[20]; printf ("Please enter your name."); scanf("%s", buffer); printf ("your name is %s \n", buf); } extern int name; void f(char *name); // declaration: no problem here //... void f(char *arg) { // definition: no problem, arg doesn't hide name // use arg } pad = ciphertext.data[ciphertext.size - 1] + 1; /* pad */ length = ciphertext.size - hash_size - pad; if (pad > ciphertext.size - hash_size)... for (i = 2; i < pad; i++) { if (ciphertext.data[ciphertext.size - i]!= ciphertext.data[ciphertext.size - 1]) pad_failed = GNUTLS_E_DECRYPTION_FAILED; } Figure 2: Bugs Discovered by Fuzzing and Static Code Analysis 1 - FOUND BY STATIC ANALYSIS 2 - FOUND BY FUZZING 3 - ACCESSIBLE BY 4 - RELATED TO COMPLEX RUNTIME BEHAVIOR 7 Vulnerability Management Crisis Management is Expensive In traditional vulnerability management, most of the costs arise from patch deployment. This not only holds for the vendor-side, but also for the user-side. Patchdeployment is always carried out as a crisis management process. Software developers race against the clock in an attempt to first find and verify the vulnerabilities, and then deploy workarounds or patches for their customers. Often the quality of these patches cannot be vouched for. For example, if there is a buffer overflow vulnerability, the programmers might just increase the size of a buffer without fixing the actual problem. Maintenance downtime during patch deployment is also expensive. Being Prepared Pays off In order to improve the security of the software they use, companies need to move away from reacting to somebody else s security discoveries to proactively finding vulnerabilities. In reactive security, patches are usually implemented in later stages making the whole process more costly. By detecting attack vectors and discovering zero-day vulnerabilities proactively you can stay ahead of the industry and proactively protect yourself against zero-day weaknesses. Fuzzing can also be used to test around patches to verify their quality. But one of the key benefits of proactive testing from a cost saving perspective is that you can do all the testing and patching at your own pace, and then push all the corrections and updates
6 to your services and systems in one big security push, thus reducing the amount of downtime needed. Identifying Vulnerabilities There are open source tools available for both fuzzing and static code analysis. However, in addition to their testing capabilities, their reporting capabilities are also limited compared to more advanced commercial solutions, which not only enable better test coverage and faster test runs, but also provide extensive test case documentation, which makes the repair process easier. For example, they commonly utilize Common Weakness Enumeration (CWE), which is an industry standard, to describe the vulnerabilities. This significantly facilitates the process of identifying and prioritizing the found vulnerabilities. Fixing Zero-Day Vulnerabilities If you find critical zero-day vulnerabilities in your own code, the most critical question is how widely employed and how public your product is. If you use open source projects, then the whole process is public, also to potential hackers, who will seize the opportunity to create exploits. After you release a patch, it is a race between your end users employing your update and the attackers seeking to exploit it. You might, for example, consider launching a pre-warning system, at least for your most critical customers, so they know to expect any major security updates. If you find issues in third party software, the important thing is to notify the vendor, so that they can fix the problem and to protect your own systems. In both cases, it is always advisable to contact your local CERT organization, which will assist you in the disclosure process. 8 Fuzzing and Static Code Analysis in the SDL and BSIMM Models Security Perspective While the SDL defines the product security process for software developers, the BSIMM model looks at security from a quality perspective. It depicts an organizational maturity model that helps companies benchmark their product security practices to state-of-the-art practices in the industry. The BSIMM model stresses the importance of static code analysis, because it ensures that secure coding policies are being followed. Protocol fuzzers, on the other hand, are essential, because they encapsulate an attacker s perspective. BSIMM is a product security checklist listing different activities that you might want to include in your own processes, but it does not enforce any activity over others. Development Lifecycle Phases One big difference between the BSIMM and the SDL model is that, unlike the SDL model, the BSIMM model does not attempt to place any of the security practices in a certain phases of the SDLC. In the SDL model, static code analysis is used in the Implementation phase and fuzzing in the Verification phase, as can be seen in Figure 3. However, both assessment methods can also be used in other lifecycle phases as well. TRAINING REQUIREMENTS DESIGN IMPLEMENTATION - Specify tools - - Enforce banned functions - - STATIC ANALYSIS - RESPONSE RELEASE VERIFICATION - Dynamic / FUZZ TESTING - - Verify threat models / attack vectors - Figure 3: Static Analysis and Fuzzing in the SDL
7 For software testers the most important phase in the SDL is the verification phase, where fuzzing is used to test the robustness of the system before the release. However, fuzzing can be used throughout the development process from the moment the first software components are ready and even after the release. In fact, the earlier you start fuzzing the easier and cheaper it is to fix the found vulnerabilities. Similarly, the earlier you start using static code analysis the better the results you can achieve. Some advanced approaches even enable you to perform static code analysis directly after the code has been written in a development environment. 9 Combining Fuzzing and Static Analysis Complementary Testing Methods Static code analysis covers the entire source code, which makes it a very exhaustive form of testing. Especially, when testing larger scale systems, the amount of found bugs makes it difficult to determine which bugs are actually critical is difficult. Therefore, static code analysis can be a very slow and time consuming process. Fuzzing helps streamline the testing process by focusing the testing effort on the most critical interfaces. Fuzzing is a risk-based testing approach. It is a very representative method for testing software robustness, because it targets the problems attackers would also find. However, some bugs, like problems in error handling when the disc space is full, are triggered through an external interface, yet they are easier to discover with static code analysis, because testing them by fuzzing would require a vast amount of test cases in several different test configurations. Use Cases for Fuzzing and Static Code Analysis Fuzzing and static code analysis can be combined easily. When a new type of vulnerability is found by fuzzing, the fingerprint of the vulnerability can be taught to the static code analysis tools. This will help in potentially eliminating similar mistakes in other branches of the code that might not be exposed to attacks at the moment, but can become critical in future releases of the same software. Also, when a vendor releases a patch, you can use fuzzing to test around the patch to test its effectiveness. The benefits from using both fuzzing and static code analysis are derived from the differences in the testing technologies. 10 Conclusion The purpose of proactive testing is to find vulnerabilities, before somebody else finds them and exploits them. By integrating fuzzing and static analysis into your software development process, you can discover flaws at the earliest possible moment. The earlier the bugs are discovered the cheaper and easier it is to fix them. You can actually gain time and save money through preemptive security and robustness testing. Instead of, racing against the clock to get your system to work again and spending valuable resources in calming down angry customers, you can discover flaws and create patches for them proactively, before any problems occur. Furthermore, if vulnerabilities are fixed early on during the software development process, then there simply will not be any time for anyone to devise an attack. Proactive testing is not just about protecting systems against attacks. Cleaning up your code also serves another purpose. Namely, it improves the quality of your software. As a whitebox testing technique, static code analysis can be used to improve the quality of in-house software developments, but fuzzing can also be used as an auditing tool to verify the quality of outsourced code development. The costs of bad Quality of Service (QoS) and downtime can be considerable to your company reputation and sales. By ensuring the quality of your software you can also avoid other liability problems. And, most importantly, by building the security into your system, you can be sure that it is really secure and not just coated with security. Static code analysis and fuzzing are complementary in many aspects. While code analysis is static, fuzzing is dynamic. Static analysis is white-box testing, while fuzzing is mainly blackbox testing. These two methods complement each other by finding vulnerabilities that could not have been found using just one method. Static analysis can easily find bugs, which would require vast amounts of feeds to uncover with fuzzing. Fuzzing, on the other hand, can find bugs that reveal themselves when the code is executed, for example vulnerabilities in dynamic libraries or bugs created by the code compiler or hardware setup. Overall, using multiple testing methods improves the test coverage as both the BSIMM and SDL models advocate.
Codenomicon whitepaper: Unknown Vulnerability. Management. - Anna-Maija Juuso and Ari Takanen - Introduction. Management. How to Defend Your Systems
KMP/IKE iscsi Kerberos LACP LDAPv3 LPD MGCP Modbus MPLS/LDP MSTP NFS NTP OSPFv2 OSPFv3 PIM-DM/SM POP3 PPPoE RADIUS RIP RIPng Rlogin RSTP RSVP RTCP RTP RTSP SCTP SigComp SIP SMTP SNMPv1 SNMPv2c SNMPv3 SRTP
Defensics. Technology Specifications
Defensics Technology Specifications Defensics is a next-generation security testing platform that enables builders and users of technology to rapidly, reliably and efficiently find and correct dangerous
Parallel Execution of Defensics 3 Test Suites Study of maximum throughput, resource consumption and bottlenecks for fast-speed fuzzing
KMP/IKE iscsi Kerberos LACP LDAPv3 LPD MGCP Modbus MPLS/LDP MSTP NFS NTP OSPFv2 OSPFv3 PIM-DM/SM POP3 PPPoE RADIUS RIP RIPng Rlogin RSTP RSVP RTCP RTP RTSP SCTP SigComp SIP SMTP SNMPv1 SNMPv2c SNMPv3 SRTP
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
3.4 Rikke Kuipers, Ari Takanen/ Fuzzing embedded devices
3.4 Rikke Kuipers, Ari Takanen/ Fuzzing embedded devices 3.4.1 Rikke Kuipers Rikke is a security specialist, has a network engineering background at several ISPs and the public broadcasting platform in
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD whoami? Senior Director of a Red Team PSIRT Case Manager Data Analyst Internet Crime Investigator Security Evangelist
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]
Cisco Packet Tracer 6.3 Frequently Asked Questions
Cisco Packet Tracer 6.3 Frequently Asked Questions Last Updated 22 January 2015 FAQ Table of Contents Cisco Packet Tracer 6.3 Release...1 Q1. What is Cisco Packet Tracer?... 1 Q2. How can I obtain Packet
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Achilles Assurance Platform. Dr. Nate Kube Founder / CTO Wurldtech
Achilles Assurance Platform Dr. Nate Kube Founder / CTO Wurldtech Presentation Outline Statement of the Problem 3 rd Generation Achilles Assurance Platform Questions and Answers Achilles Certification
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Evaluating IPv6 Firewalls & Verifying Firewall Security Performance
Next Generation IPv6 Network Security IPv6 Summit Bonn 30 th June 2004 Evaluating IPv6 Firewalls & Verifying Firewall Security Performance [ Vital questions to ask your firewall vendor ] Yvon Rouault Agilent
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
For more information email [email protected] or call 703.749.7723
Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they
Colasoft Capsa Technical White Paper. Maximize Network Value
Colasoft Capsa Technical White Paper Maximize Network Value Content Content BACKGROUND... 3 OVERVIEW... 3 CONCEPT AND PRINCIPLE... 4 HOW TO WORK... 4 DATA CAPTURE... 4 DATA ANALYSIS... 5 EXPORTING DATA...
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can
NWEN405: Security Engineering
NWEN405: Security Engineering Lecture 15 Secure Software Engineering: Security Evaluation Engineering & Computer Science Victoria University of Wellington Dr Ian Welch ([email protected]) Waterfall Secure
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Security Vulnerability Management. Mark J Cox
Security Vulnerability Management Mark J Cox Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of
Streamlining Patch Testing and Deployment
Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
INDIAN INSTITUTE OF TECHNOLOGY BOMBAY MATERIALS MANAGEMENT DIVISION : (+91 22) 2576 8800 (DR)
Item CORE SWITCH: 24 Ports Item Description 1)General requirements: Switch- modular operating system, non-blocking wire speed performance. Switch solution-capable of providing complete redundancy by using
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Software Assurance: An Overview of Current Industry Best Practices
Software Assurance: An Overview of Current Industry Best Practices February 2008 Executive Summary Software Assurance: An Overview of Current Industry Best Practices Software underpins the information
-.% . /(.0/.1 . 201 . ) 53%/(01 . 6 (01 (%((. * 7071 (%%2 $,( . 8 / 9!0/!1 . # (3(0 31.%::((. ;.!0.!1 %2% . ".(0.1 $) (%+"",(%$.(6
!""#"" ""$"$"# $) ""$"*$"# %%&''$ $( (%( $) (%+"",(%$ -.% Number Phase Name Description. /(.0/.1.(((%( $. 201 2,%%%% %$. %(01 3-(4%%($. ) 53%/(01 %%4.%%2%, ($. 6 (01 (%((. * 7071 (%%2. 8 / 9!0/!1 ((((($%
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Secure Programming Lecture 9: Secure Development
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Cyber Security nei prodotti di automazione
Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
Fuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt [email protected] Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Building Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
IxLoad TM Adobe HDS Player Emulation
IxLoad TM Adobe HDS Player Emulation HTTP Dynamic Streaming (HDS) is a solution developed by Adobe Systems to playback high quality live and on-demand content. The playback uses HTTP for streaming fragmented
EDA 1200 4.3 Training Programs. Catalog of Course Descriptions
EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org
The Security Development Lifecycle 24 June 2010 Steve Lipner Senior Director of Security Engineering Strategy Trustworthy Computing Microsoft Corporation [email protected] +1 425 705-5082 Copyright
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction
Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
Security Considerations for the Spiral Development Model
Security Considerations for the Spiral Development Model Loye Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783 [email protected] 717-718-5727 Abstract
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker
Microsoft CompTIA Network+ Rapid Review (Exam N10-005) Craig Zacker Introduction xix Preparing for the exam xxiii Chapter 1 Network Concepts 1 Objective 1.1: Compare the layers of the OSI and TCP/IP models
