Wireless Computing and IT Ecosystems

Similar documents
Cryptography and Network Security

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Thick Client Application Security

e-code Academy Information Security Diploma Training Discerption

Strategic Information Security. Attacking and Defending Web Services

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

This Working Paper provides an introduction to the web services security standards.

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

SAST, DAST and Vulnerability Assessments, = 4

elearning for Secure Application Development

Cryptography and Network Security Chapter 1

External Supplier Control Requirements

Information System Security

Security Implications Associated with Mass Notification Systems

Security Goals Services

90% of data breaches are caused by software vulnerabilities.

XML Signatures in an Enterprise Service Bus Environment

What is Web Security? Motivation

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Recommended Wireless Local Area Network Architecture

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

How To Protect A Web Application From Attack From A Trusted Environment

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Where every interaction matters.

IDA. Cryptography for a High-Assurance Web-Based Enterprise. William R. Simpson, Project Leader. Coimbatore Chandersekaran

GRA Reliable Secure Web Services Service Interaction Profile Version 1.2 Table of Contents

Computer Security. Draft Exam with Answers

The monsters under the bed are real World Tour

Designing Security for Microsoft SQL Server 2005

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Preliminary Course Syllabus

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

Single Sign-On Secure Authentication Password Mechanism

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Implementing Cisco IOS Network Security

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

CompTIA Security+ (Exam SY0-410)

Application Security Testing

MySQL Security: Best Practices

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Introduction to Cyber Security / Information Security

544 Computer and Network Security

Last update: February 23, 2004

(WAPT) Web Application Penetration Testing

Requirement Priority Name Requirement Text Response Comment

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

DRAFT Standard Statement Encryption

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

COSC 472 Network Security

Apigee Gateway Specifications

8070.S000 Application Security

Securing Data on Microsoft SQL Server 2012

Attack Vector Detail Report Atlassian

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

Chap. 1: Introduction

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

CSCI 4541/6541: NETWORK SECURITY

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

MSc Information Technology - E521

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

Reducing Application Vulnerabilities by Security Engineering

Web Engineering Web Application Security Issues

Security Policy. Security Policy.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

MS-55096: Securing Data on Microsoft SQL Server 2012

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

AlphaTrust PRONTO Enterprise Platform Product Overview

OWASP Top Ten Tools and Tactics

Bellevue University Cybersecurity Programs & Courses

How To Ensure That Your Computer System Is Safe

How To Achieve Pca Compliance With Redhat Enterprise Linux

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Validation Procedure. ANNEX 4. Security Testing Basis

Web Services Implementation: The Beta Phase of EPA Network Nodes

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

InfoSec Academy Application & Secure Code Track

IINS Implementing Cisco Network Security 3.0 (IINS)

INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) TECHNICAL STANDARD INFORMATION ASSURANCE VERSION 1.0

Web Application Report

MS Information Security (MSIS)

CoSign by ARX for PIV Cards

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

Managing SOA Security and Operations with SecureSpan

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

Introduction to Service Oriented Architectures (SOA)

Digital Signature Web Service Interface

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Annex B - Content Management System (CMS) Qualifying Procedure

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

CS 356 Lecture 28 Internet Authentication. Spring 2013

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Transcription:

Wireless Computing and IT Ecosystems William R Simpson Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, Virginia 22311 USA, rsimpson@ida.org Abstract. We have evolved an IT system that is ubiquitous and pervasive and integrated into most aspects of our lives. Many of us are working on 4th and 5th level refinements in efficiency and functionality. But, we stand on the shoulders of those who came before and this restricts our freedom of action. The prior work has left us with an ecosystem which is the living embodiment of our state-of-the-art. While we work on integration, refinement, broader application and efficiency, the results must move seamlessly into the ecosystem. Fundamental concepts are being researched in the lab and may rebuild the world we all live in, until that happens, we must work within the ecosystem. Keywords: Ecosystem, Wireless, Standards, Security, OSI, Vulnerabilities. 1 Introduction Today, a combination of standards, applications, methodologies and interfaces has evolved into an ecosystem call web 2.0. Although the name would indicate a new version of the World Wide Web, it does not refer to any technical specification, but rather to the way software developers and end-users use the web today [1]. O'Reilly Media publisher Dale Dougherty coined the phrase Web 2.0 In 2004 [2]. Searching the web will not provide a clear definition of web 2.0. The author takes the term as a maturity level of processes, standards, and applications that form an ecosystem around which other applications and processes cannot diverge significantly or there cost to adopt them will be excessive. 2 The Layers of an Ecosystem The ecosystem is a living, breathing embodiment of an IT system of systems that is ubiquitous and pervasive and integrated into most aspects of our lives. It adapts to environment changes and enforces a measure of conformance by its very existence. 2.1 Ecosystem Layers Describing an architecture that conforms to these concepts requires specific elements and standards, a partial sampling is given in references [3] [7] to ensure

the processes are built into systems. The layers are similar to the layers in an onion as shown if figure 1. Fig. 1. The Layers of the Ecosystem 2.2 Layers within layers The layers of figure 1 are exemplary and have not been blessed by any organization. Certain of the sub-layers have. In figure 1 we have broken out the sublayers of one category communications and apply the open systems interconnect reference model [8] for its constituent sub-layers shown below in figure 2. The model has been used for the definition of end points and protocols for communications processes.

Fig. 2. Secure Communication OSI Reference Model 3 Working within the Layers Wherever you work in this ecosystem, you must be concerned with: Functionality- A Manet must provide routing of messages to members of its network. Efficiency A pheromone based routing method must be more efficient than a priority-based or round-robin routing to make it worth the added complexity. Security Even in ad-hoc Manet based networks we must protect our own assets and monitor nefarious behaviors. The following are some threat mitigation and elimination that may be considered: a. Traditional threats i. Threats against the OS and Network interfaces ii. Authentication, Authorization attacks iii. Man in the middle attacks inside / outside enterprise both on the platform and on all comm. Links iv. Configuration setup and Change based attacks, v. Mobile software attacks vi. Integrity Attacks [change security attributes, metadata record content] vii. Design and Implementation threats 1. Buffer overflow, Static Analysis, Type checking 2. Web service attacks [cross site scripting, ] others 3. Threats on Caches, Replays

b. Data at rest and data in Motion threats c. Cryptographic key PKI private key and session key threats [Java] d. Attacks on Virtualization [Minimal] e. Attack on Inter Forest / Enclave Trust, TPM and Others f. Threats from Black Hat Integrity software, data, credentials all need to be validated as to source and tamper resistance. Standard Interfaces unless we are in a standalone environment we must be able to communicate with other elements in the ecosystem. Records Management Record pertinent events for monitoring and forensics: a. Security violation b. Performance issues c. Fault recoveries d. Health Monitoring e. Behavioral Monitoring f. Others dealing with the functionality g. Etc. If you are not working in all of these areas, your work may not survive the laboratory. 4 Vulnerabilities in Software Vulnerabilities occur at all levels of software development. Most of the software developed for wireless communication are coded to the middle of the OSI communications model. Vulnerabilities are tracked and aggregated according to the software level, and the weaknesses in coding by the Common Weakness Enumeration (CWE) [9] which describes itself as follows:. CWE - International in scope and free for public use, CWE provides a unified, measurable set of software weaknesses that is enabling more effective discussion, description, selection, and use of software security tools and services that can find these weaknesses in source code and operational systems as well as better understanding and management of software weaknesses related to architecture and design. A summary by type is provided below as derived from the CWE for middleware coding vulnerabilities. The broader category includes a broad range of middleware software including Oracle data base code and Apache HTTP server code, but can be used as a gauge for software vulnerabilities that arise during normal coding, using standard coding reviews. You could expect the numbers to be considerably higher for software developed within academic experiments and experimental code with less stringent development activities.

Table 1 Weakness Enumerations Common Weakness Enumeration for Non-Website Vulnerabilities 1 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE- 119) 32% 2 Improper Control of Generation of Code ('Code Injection') (CWE-94) 17% 3 Resource Management Errors (CWE-399) 10% 4 Improper Input Validation (CWE-20) 9% 5 Numeric Errors (CWE-189) 8% Middleware Coding Vulnerability Types 1 Improper Input Validation (CWE-20) 11% 2 Resource Management Errors (CWE-399) 11% 3 Improper Control of Generation of Code ( Code Injection ) (CWE-94) 9% 4 Numeric Errors (CWE-189) 9% 5 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE- 119) 7% 8 Summary This paper has reviewed the eco-system that most research will eventually have to live within. The ultimate goal is to have the algorithms coded into products and deployed into an enterprise or web service environment. Shortly after your research phase and as you begin product development remember these factors. At whatever layer you are working, you are responsible for; Functionality, Efficiency, Security, Integrity, Standard Interfaces, Records Management(for forensics), Etc. Shortfalls will have to be covered in the next level in the ecosystem, often at a penalty in performance and efficiency. These items should be baked in not added on. Eliminate Common vulnerabilities. Your algorithm (no matter how efficient) may not become productized or institutionalized if you miss these factors. REFERENCES 1. Web 2.0, http://en.wikipedia.org/wiki/web_2.0 2. How Web 2.0 Works, http://www.howstuffworks.com/web-20.htm 3. World Wide Web Consortium (W3C): a. "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)", April 27, 2007. b. W3C XML Schema Definition Language (XSD) 1.1 Part 1: Structures, W3C Candidate Recommendation 21 July 2011. c. W3C XML Schema Definition Language (XSD) 1.1 Part 2: Datatypes, W3C Candidate Recommendation 21 July 2011. d. XML Encryption Requirements,W3C Note 04 March 2002 e. XML Signature Syntax and Processing (Second Edition),W3C Recommendation 10 June 2008. f. And others 4. Organization for the Advancement of Structured Information Standards (OASIS) open set of Standards

a. WS-Security Specification 1.1 OASIS, November 2006 b. WS-Trust Specification 1.4. OASIS, February 2009 c. WS-ReliableMessaging Specification 1.1, OASIS, November 2004 d. WS-SecureConversation Specification 1.4, OASIS, February 2009 e. WS-BaseNotification, 1.3 OASIS, October 2006. f. And others 5. Internet Engineering Task Force (IETF) Standards: a. STD 66 (RFC3986) Uniform Resource Identifier (URI): Generic Syntax, T. Berners- Lee, R. Fielding, L. Masinter, January 2005 b. STD 9 (RFC0959) File Transfer Protocol, J. Postel, J. Reynolds, October 1985. c. STD 5 (RFC0791) Internet Protocol, J. Postel, September 1981. d. LDAPv3: Technical Specification. J. Hodges, RL "Bob" Morgan. IETF RFC 3377, September 2002. Authentication Methods for LDAP. M. Wahl, H. Alvestrand, J. Hodges, R.L. Morgan. IETF RFC 2829, May 2000. e. And others 6. National Institute of Standards, Gaithersburg, Md: a. FIPS PUB 197, Advanced Encryption Standard (AES), November 2001. b. FIPS PUB 800-67,, November 2008. c. FIPS PUB 800-67, Version 1.2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Revised July 2011 d. FIPS PUB 140-2, Security Requirements for Cryptographic Modules, May 25, 2001 e. FIPS PUB 180-2, Secure Hash Standard. August 2002, U.S. Department of Commerce/National Institute of Standards and Technology f. FIPS PUB 186-3, Digital Signature Standard (DSS), June, 2009 g. And others 7. Common Criteria for Information Technology Security Evaluation: a. Version 3.1, revision 3, July 2009. Part 1: Introduction and general model. b. Version 3.1, revision 3, July 2009. Part 2: Functional security components. c. Version 3.1, revision 3, July 2009. Part 3: Assurance security components. d. Common Methodology for Information Technology Security Evaluation, Version 3.1, revision 3, July 2009 8. Open System Interconnect reference model, http://osilayers.org/ 9. Common Weakness Enumeration, A Community-Developed Dictionary of Software Weakness Types, http://cwe.mitre.org/