How To Protect Your Computer From Attack In Linux (Windows) From A Hacker (Windows 2) And A Hacker From A Remote Control (Windows 3) (Windows 4) (For Windows) (Amd64) (Powerpoint) (Evil)

Size: px
Start display at page:

Download "How To Protect Your Computer From Attack In Linux (Windows) From A Hacker (Windows 2) And A Hacker From A Remote Control (Windows 3) (Windows 4) (For Windows) (Amd64) (Powerpoint) (Evil)"

Transcription

1 IT 4823 Information Security Administration Internet Authentication Protocols Linux and Windows Security July 9 Identification and Authentication Identification? Authentication? Authorization Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles and Practice, 1/e, by William Stallings and Lawrie Brown, Chapter 6 Intrusion Detection. On-Line Identity On the Internet, nobody knows you re a dog. Internet Authentication Applications Application-level authentication and digital signatures Implementations: Kerberos symmetric key authentication service X.509 public-key directory authentication Public-key infrastructure (PKI) Federated identity management Copyright 1993 The New Yorker Kerberos Trusted key server system from MIT Provides centralised secret-key third-party authentication in a distributed network Allows users access to services distributed through network without needing to trust all workstations Instead all trust a central authentication server Two versions in use: 4 and 5 Kerberos Overview A basic third-party authentication scheme Two servers (possibly one one machine) Authentication Server (AS) users initially negotiate with AS to identify self AS provides a non-corruptible authentication credential (ticket granting ticket TGT) Ticket Granting Server (TGS) users subsequently request access to other services from TGS on basis of users TGT

2 Kerberos Overview Kerberos Performance Issues Works with larger client-server installations Kerberos performance impact is very little if system is properly configured, since tickets are reusable Kerberos security is best assured if the server is a separate, isolated machine Motivation for multiple realms is administrative, not performance PKI: Certificate Authorities A digital certificate consists of: a public key plus ID of the key owner signed by a third party trusted by community a certificate authority (CA) Goal: bind an identity to a public key Users obtain certificates from CA User creates keys and unsigned certificate, gives to CA CA signs certificate, returns to user Other users can verify certificate by checking signature on certificate using CA s public key X.509 Authentication Service Universally accepted standard for formatting public-key certificates widely used in network security applications, including IPSec, SSL, SET, and S/MIME Part of CCITT X.500 directory service standards Uses public-key cryptography and digital signatures algorithms not standardised, but RSA recommended X.509 Certificates Public Key Infrastructure

3 Federated Identity Management Definition: use of a common identity management scheme: across multiple enterprises and numerous applications supporting many thousands, even millions of users Principal elements are: authentication, authorization, accounting, provisioning, workflow automation, delegated administration, password synchronization, selfservice password reset, federation Kerberos contains many of these elements Federated Identity Management Standards Used Questions Extensible Markup Language (XML) characterizes text elements in a document on appearance, function, meaning, or context Simple Object Access Protocol (SOAP) for invoking code using XML over HTTP WS-Security set of SOAP extensions for implementing message integrity and confidentiality in Web services Security Assertion Markup Language (SAML) XML-based language for the exchange of security information between online business partners Linux Security IT 4823 Information Security Administration Linux Security April 23 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles and Practice, 1/e, by William Stallings and Lawrie Brown, Chapter 6 Intrusion Detection. Linux has evolved into one of the most popular and versatile operating systems Many features mean broad attack surface You can create highly secure Linux systems We will review: Discretionary Access Controls typical vulnerabilities and exploits in Linux best practices for mitigating those threats new improvements to Linux security model

4 Linux Security Model Linux s traditional security model is: people or proceses with root privileges can do anything other accounts can do much less Hence, attackers want to get root privileges One can run robust, secure Linux systems The crux of the problem is use of Discretionary Access Controls (DAC) File System Security In Linux everything is treated as a file e.g. memory, device-drivers, named pipes, and other system resources hence why filesystem security is so important I/O to devices is via a special file e.g. /dev/cdrom There are other special files like named pipes a conduit between processes / programs Users and Groups A user-account (user) represents someone capable of using files associated both with humans and processes A group-account (group) is a list of user-accounts users have a main group may also belong to other groups Users and groups are not files Users and Groups user s details are kept in /etc/password maestro:x:200:100:maestro Edward Hizzersands:/home/maestro:/bin/bash additional group details in /etc/group conductors:x:100: pianists:x:102:maestro,volodya use useradd, usermod, userdel to alter File Permissions files have two owners: a user and a group each with its own set of permissions with a third set of permissions for other permissions are to read/write/execute in order user/group/other, cf. -rw-rw-r-- 1 maestro user Mar 25 01:38 baton.txt set using chmod command Directory Permissions read = list contents write = create or delete files in directory execute = use anything in or change working directory to this directory e.g. $ chmod g+rx extreme_casseroles $ ls -l extreme_casseroles drwxr-x--- 8 biff drummers 288 Mar 25 01:38 extreme_casseroles

5 Sticky Bit originally used to lock file in memory now used on directories to limit delete (and other things) if set must own file or dir to delete other users cannot delete even if they have write permission set using chmod command with +t flag, e.g. chmod +t extreme_casseroles directory listing includes t or T flag drwxrwx--t 8 biff drummers 288 Mar 25 01:38 extreme_casseroles only apply to specific directory not child dirs SetUID and SetGID setuid bit means program runs as owner no matter who executes it setgid bit means run as a member of the group which owns it again regardless of who executes it run as = run with same privileges as are very dangerous if set on file owned by root or other privileged account or group SetGID and Directories setuid has no effect on directories setgid does; causes any file created in a directory to inherit the directory s group This is useful if users belong to other groups and routinely create files to be shared with other members of those groups, instead of manually changing its group Numeric File Permissions Each digit represents a bit in a mask: 1 = execute, 2 = write, 4 = read For specials: 1=sticky bit, 2=setgid, 4=setuid Kernel vs. User Space Kernel space refers to memory used by the Linux kernel and its loadable modules (e.g., device drivers) User space refers to memory used by all other processes Since the kernel enforces Linux DAC and security, it is critical to isolate kernel from user so kernel space is never swapped to disk only root may load and unload kernel modules setuid root Vulnerabilities A setuid root program runs as root no matter who executes it Used to provide unprivileged users with access to privileged resources Must be very carefully programmed because errors could be exploited. Distributions now minimize setuid-root programs System attackers still scan for them!

6 Web Vulnerabilities A very broad category of vulnerabilities with big and visible attack surfaces When written in scripting languages not as prone to classic buffer overflows can suffer from poor input-handling Few enabled-by-default web applications But users install vulnerable web applications Or write custom web applications having easily-identified and easily-exploited flaws Rootkits Allow attackers to cover their tracks If successfully installed before detection, all is very nearly lost Originally, collections of hacked commands hiding attacker s files, directories, processes Now rootkits use loadable kernel modules intercepting system calls in kernel-space hiding attacker from standard commands May be detectable with chkrootkit Generally have to wipe and rebuild system Linux System Hardening We consider how to mitigate Linux security risks at system and application levels First, look at OS-level security tools and techniques that protect the entire system OS Installation Security begins with OS installation Especially what software is run since unused applications liable to be left in default, unhardened and un-patched state Generally should not run: X Window system, RPC services, R-services, inetd, SMTP daemons, telnet etc Initial system software configuration: setting root password creating a non-root user account setting an overall system security level (initial file permissions) enabling a simple host-based firewall policy enabling SELinux Patch Management Installed server applications must be: configured securely kept up to date with security patches Patching can never win patch rat-race There are tools to automatically download and install security updates e.g. up2date, YaST, apt-get Note: one should not run automatic updates on change-controlled systems without testing There is tension between change control and automagic updates. Network Access Controls The network is a key attack vector to secure TCP wrapper is a key tool to check access originally tcpd inetd wrapper daemon before allowing connection to service checks if requesting host explicitly in hosts.allow is ok if requesting host explicitly in hosts.deny is blocked if not in either is ok Checks on service, source IP, username Now often part of application using libwrappers

7 Network Access Controls Linux has a very powerful netfilter kernel-based native firewall mechanism and iptables user-space front end Useful on firewalls, servers, desktops Direct configuration is tricky, steep learning curve There are automated rule generators Typically, personal firewall use will: allow incoming requests to specified services block all other inbound service requests allow all outbound (locally-originating) requests Can be configured manually for greater security Antivirus Software Historically, Linux has not been as vulnerable to viruses ad MS systems This is more due to popularity than security Prompt patching was effective for worms Viruses abuse users privileges, so non-root users have less scope to exploit Growing Linux popularity means growing exploits Hence, antivirus software will be more important There are various commercial and free Linux A/V products. User Management Guiding principles in user-account security: need care setting file / directory permissions use groups to differentiate between roles use extreme care in granting / using root privs Commands: chmod, useradd/mod/del, groupadd/mod/del, passwd, chage Critical information in files /etc/passwd and /etc/group Manage user s group memberships Set appropriate password ages Root Delegation Linux has root can to anything, users do little issue su command allows users to run as root either root shell or single command must supply root password means likely too many people know this SELinux RBAC can limit root authority, complex to configure sudo allows users to run as root but only need their password, not root password /etc/sudoers file specifies what commands allowed Or configure user/group perms to allow, tricky Logging Effective logging is a key resource Linux logs using syslogd or Syslog-NG receive log data from a variety of sources sorts by facility (category) and severity writes log messages to local/remote log files Syslog-NG preferable because it has: variety of log-data sources / destinations much more flexible rules engine to configure can log via TCP which can be encrypted One should check and customized defaults Log Management Balance number of log files used size of few to finding info in many Manage size of log files must rotate log files and delete old copies typically, use logrotate utility run by cron to manage both system and application logs Configure application logging

8 Application Security Many security features are implemented in similar ways across different applications Approaches: running as unprivileged user/group running in chroot jail modularity encryption logging Running As Unprivileged User/Group Every process runs as some user Extremely important that this user is not root since any bug can compromise entire system May need root privileges, e.g. bind port have root parent perform privileged function but main service from unprivileged child User/group used should be dedicated, making it easier to identify source of log messages Running in chroot Jail chroot confines a process to a subdirectory maps a virtual / to some other directory useful if have a daemon that should only access a portion of the file system, e.g. FTP directories outside the chroot jail aren t visible or reachable at all Contains effects of compromised daemon Complex to configure and troubleshoot; must mirror portions of system in chroot jail Modularity Applications running as a single, large, multipurpose process can be: more difficult to run as an unprivileged user harder to locate / fix security bugs in source harder to disable unnecessary functionality Hence, modularity is a highly prized feature providing a much smaller attack surface cf. postfix vs sendmail, Apache modules Encryption Sending logins and passwords or application data over networks in clear text exposes them to network eavesdropping attacks Many network applications now support encryption to protect such data, often using OpenSSL library OpenSSL may need X.509 certificates can generate/sign using openssl command may use commercial/own/free CA Logging Applications can usually be configured to log to any level of detail (debug to none) Must decide whether to use dedicated file or system logging facility (e.g. syslog) central facility useful for consistent use Must ensure any log files are rotated

9 Mandatory Access Controls Linux uses a DAC security model But Mandatory Access Controls (MAC) impose a global security policy on all users users may not set controls weaker than policy normal admin done with accounts without authority to change the global security policy but MAC systems have been hard to manage Novell s SuSE Linux has AppArmor RedHat Enterprise Linux has SELinux Use pure SELinux for high-sensitivity, high-security SELinux NSA s powerful implementation of mandatory access controls for Linux Linux DACs still applies, but if it allows the action, SELinux then evaluates it against its own security policies Subjects are processes (run user commands) Actions are permissions Objects are not just files and directories To manage complexity SELinux has: that which is not expressly permitted, is denied (default deny) groups of subjects, permissions, and objects Security Contexts Each individual subject and object in SELinux is governed by a security context being a: user - individual user (human or daemon) SELinux maintains its own list of users user labels on subjects specify account's privileges user labels on objects specify its owner role - like a group, assumed by users a user may only assume one role at a time, may only switch roles if and when authorized to do so domain (also called a type) - a sandbox being a combination of subjects and objects that may interact with each other This model is called Type Enforcement (TE) Decision Making in SELinux Two types of decisions: access decisions when subjects do things to objects that already exist, or create new things in expected domain transition decisions invocation of processes in different domains than the one in which the subject-process is running creation of objects in different types (domains) than their parent directories transitions must be authorized by SELinux policy RBAC and MLS Controls SELinux has Role Based Access Control (RBAC) rules specify roles a user may assume other rules specify circumstances when a user may transition from one role to another and Multi Level Security (MLS) concerns handling of classified data Similar to Bell-LaPadula: no read up, no write down MLS is enforced via file system labeling SELinux Policy Management Creating and maintaining SELinux policies is complicated and time-consuming A single SELinux policy may consist of hundreds of lines of text RHEL has a default targeted policy defines types for selected network apps allows everything else to use DAC controls There is a (large) set of SELinux commands; RH has a GUI for configuring

10 Novell AppArmor Novell s MAC for SuSE Linux enforced at kernel level using Linux Security Modules Restricts behavior of selected applications in a very granular but targeted way hence a compromised root application s access will be contained has no controls addressing data classification Hence, it is only a partial MAC implementation Non-protected applications just use Linux DAC Windows and Windows Vista Security Windows is the world s most widely-used O/S An advantage is that security enhancements can protect millions of nontechnical users (effort by Microsoft pays large rewards) A challenge is that vulnerabilities in Windows can also affect millions of users We will review overall security architecture of Windows 2000 and later. (Changed since Win9X.) Windows Security Architecture Security Reference Monitor (SRM) a kernel-mode component that performs access checks, generates audit log entries, and manipulates user rights (privileges) Local Security Authority (LSA) responsible for enforcing local security policy Security Account Manager (SAM) a database that stores user accounts and local users and groups security information local logins perform lookup against SAM DB passwords are stored using MD4 Windows Security Architecture Active Directory (AD) Microsoft s LDAP directory all Windows clients can use AD to perform security operations including account logon authentication uses AD when the user logs on using a domain rather than local account user s credential information is sent securely across the network to be verified by AD WinLogon (local) and NetLogon (net) handle login requests Local vs. Domain Accounts A networked Windows computer can be: domain joined can login with either domain or local accounts if local may not access domain resources centrally managed and much more secure in a workgroup a collection of computers connected together only local accounts in SAM can be used no infrastructure to support AD domain Windows Login Example Domain admin adds user s account info (name, account, password, groups, privileges) Account is represented by a Security ID (SID), unique to each account within a domain Username in one of two forms: SAM format: DOMAIN\Username User Principal Name (UPN): username@domain.company.com Login requires username and password or smartcard The user is issued with token (SID, groups, privileges) assigned to every process run by user

11 Windows Privileges Are system wide permissions assigned to user accounts e.g. backup computer, or change system time Some are deemed dangerous such as: act as part of operating system privilege debug programs privilege backup files and directories privilege Others are deemed benign such as bypass traverse checking privilege Access Control Lists Two forms of access control list (ACL): Discretionary ACL (DACL) grants or denies access to protected resources such as files, shared memory, named pipes etc System ACL (SACL) used for auditing in Windows Vista, to enforce mandatory integrity policy Access Control Lists Objects needing protection are assigned a DACL (and possible SACL) that includes SID of the object owner list of access control entries (ACEs) Each ACE includes a SID and access mask Access mask could include ability to: read, write, create, delete, modify, etc Access masks are object-type specific e.g. service abilities are create, enumerate Security Descriptor (SD) Data structure with object owner, DACL, & SACL, e.g. Owner: CORP\Blake ACE[0]: Allow CORP\Paige Full Control ACE[1]: Allow Administrators Full Control ACE[2]: Allow CORP\Cheryl Read, Write and Delete There is no implied access, if there is no ACE for requesting user, then access is denied Applications must request correct type of access: if just request all access when need less (I read) some user s who should have access will be denied More on SD s and Access Checks Each ACE in the DACL determines access An ACE can be an allow or a deny ACE Windows evaluates each ACE in the ACL until access is granted or explicitly denied So, deny ACEs come before allow ACEs default if set using GUI explicitly order if create programmatically When user attempts to access a protected object, the O/S performs an access check, comparing user/group info with ACE s in ACL Impersonation Processes can have multiple threads common for both clients and servers Impersonation allows a server to serve a user, using the access privileges of the user e.g. ImpersonateNamedPipeClient function sets user s token on the current thread then access checks for that thread are performed against this token not server s, with user s access rights

12 Mandatory Access Control Windows Vista has Integrity Control that limits operations changing an object s state Objects and principals are labeled (using SID) as: Low integrity (S ) Medium integrity (S ) High integrity (S ) System integrity (S ) When a write operation occurs, first check whether subject s integrity level dominates object s integrity level Much of O/S marked medium or higher integrity Vista User Account Windows Vulnerabilities Windows, like all O/S s, has security bugs and bugs have been exploited by attackers to compromise customer operating systems Microsoft now uses a process called the Security Development Lifecycle net effect approx 50% reduction in errors Windows Vista used SDL start to finish IIS v6 (in Windows Server 2003) had only 3 vulnerabilities in 4 years, none critical Windows Security Defenses Attackers are now criminals rather than poorly-socialized pre-adolescents, and are highly motivated by money Windows has categories of security defenses: account defenses network defenses buffer overrun defenses. browser defenses Windows System Hardening Hardening is the process of shoring up defenses, reducing exposed functionality, disabling features known as attack surface reduction use 80/20 rule to decide which features to enable e.g. requiring RPC authentication in XP SP2 e.g. strip mobile code support on servers Servers are easier to harden: are used for very specific and controlled purposes perceive server users are administrators with better computer configuration skills than typical users Account Defenses User accounts can have privileged SIDs Least privilege dictates that users operate with just enough privilege for tasks Windows XP users are in Local Administrators for application compatibility reasons (bad) Windows Vista reverses default with UAC users prompted to perform a privileged operation unless admin on Server

13 Low Privilege Service Accounts Windows services are long-lived processes started after booting many ran with elevated privileges but many do not need elevated requirements Windows XP added Local Service and Network service accounts allow a service local or network access otherwise operate at much lower privilege level Windows XP SP2 split RPC service (RPCSS) in two (RPCSS and DCOM Server Process) example of least privilege in action, see also IIS6 Stripping Privileges Another defense is to strip privileges from an account soon after an application starts e.g. Index server process runs as system to access all disk volumes but then sheds any unneeded privileges as soon as possible using AdjustTokenPrivileges Windows Vista can define privileges required by a service using ChangeServiceConfig2 Network Defenses We need more than user defenses Because Windows is vulnerable to attack via network service We have IPSec and IPv6 with authenticated network packets enabled by default in Windows Vista IPv4 also enabled by default, expect less use There is a built-in software firewall block inbound connections on specific ports Vista can allow local net access only optionally block outbound connections (Vista) default was off (XP) but now default on (Vista) Buffer Overrun Defenses Many compromises exploit buffer overruns Windows Vista has Stack-Based Buffer Overrun Detection (/GS) default enabled source code compiled with special /GS option does not affect every function; only those with at least 4-bytes of contiguous stack data and that takes a pointer or buffer as an argument Defends against classic stack smash Windows Stack and /GS flag Buffer Overrun Defenses No executenamed (NX) / Data Execution Prevention (DEP) / execution Disable (XD) prevent code executing in data segments as commonly used by buffer overrun exploits applications linked with /NXCOMPAT option Stack Randomization (Vista only) randomizes thread stack base addresses Heap-based buffer overrun defenses: add and check random value on each heap block heap integrity checking heap randomization (Vista only)

14 Other Defenses Image Randomization O/S boots in one of 256 configurations makes O/S less predictable for attackers Service Restart Policy services can be configured to restart if fail great for reliability but lousy for security Vista sets some critical services so can only restart twice, then manual restart needed gives attacker only two attempts Browser Defenses Web browser is a key point of attack via script code, graphics, helper objects Microsoft added many defenses to IE7 ActiveX opt-in unloads ActiveX controls by default when any then first run prompts user to confirm Protected mode IE runs at low integrity level (see earlier) so more difficult for malware to manipulate O/S Cryptographic Services Questions Cryptographic primitives for encryption, hashing, signing Encrypting File System (EFS) allows files / directories to be encrypted / decrypted transparently for authorized users generates random key, protected by DPAPI Data Protection API (DPAPI) manages encryption key maintenance protection keys derived in part from user s password BitLocker Drive Encryption encrypts an entire volume with AES key either on USB or TPM chip

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

J-202. IT 4823 Information Security Administration. Linux Security Model. Linux Security. In Room. Linux Security April 23

J-202. IT 4823 Information Security Administration. Linux Security Model. Linux Security. In Room. Linux Security April 23 Final Exam Final exam date: May 5, 4:00 5:50 PM. IT 4823 Information Security Administration Linux Security April 23 In Room J-202 Notice: This session is being recorded. Lecture slides prepared by Dr

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 23 Linux Security EECS 710 Professor: Dr. Hossein Saiedian Presented by Ankit Agarwal 1 Outline Introduction Linux Security Model Linux File-System Security

More information

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake Objectives Windows 7 Security By Al Fall 2014 CS 140M LBCC Background Windows Security Architecture Windows Vulnerabilities Means of Evaluating Metrics System Hardening Windows Defenses OS Security Capabilities

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Operating System Security

Operating System Security Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and

More information

SYSTEM ADMINISTRATION MTAT.08.021 LECTURE 8 SECURITY

SYSTEM ADMINISTRATION MTAT.08.021 LECTURE 8 SECURITY SYSTEM ADMINISTRATION MTAT.08.021 LECTURE 8 SECURITY Prepared By: Amnir Hadachi and Artjom Lind University of Tartu, Institute of Computer Science amnir.hadachi@ut.ee / artjom.lind@ut.ee 1 OUTLINE 1.Is

More information

Linux Operating System Security

Linux Operating System Security Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in

More information

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011) Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!

More information

Safety measures in Linux

Safety measures in Linux S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota lichota@mimuw.edu.pl A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

CHAPTER 26 WINDOWS SECURITY

CHAPTER 26 WINDOWS SECURITY CHAPTER 26 WINDOWS SECURITY 26.1 FUNDAMENTAL WINDOWS SECURITY ARCHITECTURE... 2 26.2 WINDOWS VULNERABILITIES... 18 26.3 WINDOWS SECURITY DEFENSES... 20 26.4 BROWSER DEFENSES... 35 26.5 CRYPTOGRAPHIC SERVICES...

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information

Windows security for n00bs part 1 Security architecture & Access Control

Windows security for n00bs part 1 Security architecture & Access Control Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

CHAPTER 25 LINUX SECURITY

CHAPTER 25 LINUX SECURITY CHAPTER 25 LINUX SECURITY 25.1 INTRODUCTION... 2 25.2 LINUX S SECURITY MODEL... 3 25.3 THE LINUX DAC IN DEPTH: FILE-SYSTEM SECURITY... 5 25.4 LINUX VULNERABILITIES... 17 25.5 LINUX SYSTEM HARDENING...

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Security. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik. Copyright 2001-2004 Hermann Härtig, Ronald Aigner

Security. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik. Copyright 2001-2004 Hermann Härtig, Ronald Aigner Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4 CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,

More information

ENTERPRISE LINUX SECURITY ADMINISTRATION

ENTERPRISE LINUX SECURITY ADMINISTRATION ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet

More information

Linux Security Ideas and Tips

Linux Security Ideas and Tips Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

About Microsoft Windows Server 2003

About Microsoft Windows Server 2003 About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified

More information

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Access Control Lists in Linux & Windows

Access Control Lists in Linux & Windows Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

GL550 - Enterprise Linux Security Administration

GL550 - Enterprise Linux Security Administration GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates Microsoft Windows Server and Client Security Windows 7, Vista and Server 2008 R2 Donald E. Hester CISSP, CISA, CAP, MCT,

More information

Windows Advanced Audit Policy Configuration

Windows Advanced Audit Policy Configuration Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction

Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

ENTERPRISE LINUX SECURITY ADMINISTRATION

ENTERPRISE LINUX SECURITY ADMINISTRATION ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

Chapter 15 Operating System Security

Chapter 15 Operating System Security Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006 CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is

More information

Authentication Applications

Authentication Applications Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service

More information

Secure computing: SELinux

Secure computing: SELinux Secure computing: SELinux Michael Wikberg Helsinki University of Technology Michael.Wikberg@wikberg.fi Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

Mandatory Access Control

Mandatory Access Control CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

Windows Security Environment

Windows Security Environment Motivation Popularity, widespread use of Windows Big surface, big impact Protection via user/kernel architecture and CPU modes Multiple-users environment, same physical resources Easy to install < security

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information