Brad Glisson and Ray Welland Department of Computing Science

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Web Application Security Vulnerabilities Yen-Cheng Chen Department of Information Management National Chi Nan University Puli, 545 Nantou, Taiwan
Security Controls – What Works
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Threats and Attacks Principles of Information Security, 2nd Edition
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Web Application Security
OWASP Mobile Top 10 Why They Matter and What We Can Do
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
A Framework for Automated Web Application Security Evaluation
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
A Security Review Process for Existing Software Applications
August 1, The Software Security Problem August 1, 2006.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
WWW 安全 國立暨南國際大學 資訊管理學系 陳彥錚. WWW 安全 Web security is important for E-Commerce. Previous studies: –SSL –SET –Web server security Application-level security.
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
Engineering Essential Characteristics Security Engineering Process Overview.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Building Secure Web Applications With ASP.Net MVC.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Information Security Management Goes Global
Information Systems Security
CS457 Introduction to Information Security Systems
Securing Information Systems
Cybersecurity - What’s Next? June 2017
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
TOPIC: Web Security (Part-4)
Data and database administration
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 17 Risks, Security and Disaster Recovery
Introduction to the Federal Defense Acquisition Regulation
E-commerce Application Security
A Security Review Process for Existing Software Applications
Marking Scheme for Semantic-aware Web Application Security
COMPTIA CAS-003 Dumps VCE
Chapter 19: Building Systems with Assurance
The University of Adelaide, School of Computer Science
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
AppExchange Security Certification
Cyber security Policy development and implementation
Operating System Security
Chapter 1: Information Security Fundamentals
ONLINE SECURE DATA SERVICE
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Module 4 System and Application Security
Anatomy of a Common Cyber Attack
Presentation transcript:

Web Development Evolution: The Assimilation of Web Engineering Security Brad Glisson and Ray Welland Department of Computing Science Glasgow University glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Market Indications The 2004 Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Computer Crime and Security Survey estimates that losses from internet security breaches, in the US, exceeded $141 million within the last year. The Department of Trade and Industry’s Information Security Breaches Survey 2004 by PricewaterhouseCoopers indicates that security problems are on the rise in the United Kingdom and that malicious attacks are the primary culprits. The Department of Trade and Industry’s (2004) survey estimates “security breaches continue to cost” UK businesses “several billions of pounds”. The Deloitte 2005 Global Survey estimates that identity theft cost the UK almost a billion dollars in 2003. glisson@dcs.gla.ac.uk Department of Computing Science

Organization for Internet Safety (OIS) “a flaw within a software system that can cause it to work contrary to its documented design and could be exploited to cause the system to violate its documented security policy”. glisson@dcs.gla.ac.uk Department of Computing Science

Common Application Security Problems Un-validated parameters Cross-site scripting Buffer overflows Command injection flaws Error-handling problems Insecure use of cryptography Broken Access Controls glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Problem Current web applications face major security problems because security design is not integrated into the Web Engineering Development Process. Security needs to be built into the application design upfront by explicitly stating the security approach in the methodology. This deficiency creates an environment conducive to security breaches. Exploitation of these breaches translates into staggering corporate financial losses. glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science WES Solution My PhD research has produced a possible solution, A Web Engineering Security (WES) Methodology. An independent flexible Web Engineering development methodology that is specific to security. The process needs to be compatible with existing application development processes so that they are complementary, hence Deliverables between phases will vary on the size of the organizational and the methodology they are implementing, and Flexible enough to be tailored to individual companies of varying size. glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Project Development Risk Assessment NIST - National Institute of Standards and Technology - agency of the U.S. Commerce Department's Technology Administration. COBRA - Security risk analysis application OCTAVE - Operationally Critical Threat, Asset, and Vulnerability Evaluation - Focuses on organizational risk and strategic, practice-related issues, balancing operational risk, security practices, and technology. FRAP - Facilitated Risk Analysis Process glisson@dcs.gla.ac.uk Department of Computing Science

Project Development Risk Assessment Detail critical functions Determine the necessary service levels. Identify possible threats outline their motivating factors Estimate the probability of attack Estimate the probability of a successful attack Detail the cost of providing protection. glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Application Security Requirements Security Policy Compatibility Acceptable application computing practices interactions with the network, internet, messaging, and business specific applications or services interactions with internal companies, outside communities, vendors, and customers Corporate Culture Compatibility General security practice education Managerial acceptance and habits Social engineering (human element) attacks Technological acceptance of corporate norms Technological Compatibility Organization’s existing applications, software compatibility, legacy systems and the acquisition of new software and technology. Technical Skills within the company Existing security solutions glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Security Design / Coding Address issues Technology that is currently deployed in the organization Take advantage of existing security tools within the organization The best realistic design solution that meets the organization’s needs Coding Standards Secure coding practices Implementation of time tested security functions Data security glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Controlled Environment Implementation Separate PC Complete Environment that Mirrors Production Point is to make sure new software is compatible with the existing environment glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Testing Application Testing End User Testing Automated Scripts Penetration Testing Incident Management Will / When? How do you handle? Disaster Recovery News glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Web Engineering Security (WES) Process glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science End User Evaluation Critical to the success of the solution Solution is too secure & end users are not using it? Solution not secure enough? glisson@dcs.gla.ac.uk Department of Computing Science

Agile Web Engineering (AWE) glisson@dcs.gla.ac.uk Department of Computing Science

Agile Web Engineering (AWE) Web Engineering Security (WES) AWE & WES Comparison Agile Web Engineering (AWE) Web Engineering Security (WES) Business Analysis Project Development Risk Assessment Requirements Application Security Requirements Security Policy Compatibility Corporate Culture Compatibility Technological Compatibility Design Security Design / Coding Implementation Controlled Environment Implementation Testing Application Testing Incident Management Disaster Recovery Management Evaluation (End User Evaluation) Deploy Deploy in Production End User Evaluation glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Conclusions Technical solutions alone will not solve current security issues in the global web environment. Increasing business pressures will force organizations to address application security from a development perspective The most effective way to handle security, in the application design, is to incorporate security upfront into the development methodology. glisson@dcs.gla.ac.uk Department of Computing Science

Contact Details Brad Glisson, Department of Computing Science, University of Glasgow E-mail: glisson@dcs.gla.ac.uk. Web: www.dcs.gla.ac.uk/~glisson/ Prof. Ray Welland, E-mail: ray@dcs.gla.ac.uk. Web: www.dcs.gla.ac.uk/~ray/ glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Application Security Confidentiality – Proper access is restricted to the appropriate individuals. Integrity – modification of assets by the appropriate personnel & within guidelines. Availability - Access is available to the appropriate parties at designated times. [i] [i] Pfleeger, Charles P. and Shari Lawrence Pfleeger. Security in Computing Third Edition. Prentice Hall Saddle River, NJ. 2003. pg 10. glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Relevant Work Secure Software Comprehensive Lightweight Application Security Process (CLASP) Microsoft’s Trustworthy Computing Security Development Lifecycle Security Patterns - “A methodology for secure software design”.[2] [2] Fernandez, E.B. A methodology for secure software design. in Procs. of the 2004 Intl. Symposium on Web Services and Applications (ISWS'04). c2004. Las Vegas, NV. http://polaris.cse.fau.edu/~ed/EFLVSecSysDes1.pdf. glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Definitions Unvalidated Input Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application. Broken Access Control Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users’ accounts, view sensitive files, or use unauthorized functions. Broken Authentication and Session Management Account credentials and session tokens are not properly protected. Attackers that can compromise passwords, keys, session cookies, or other tokens can defeat authentication restrictions and assume other users’ identities. Cross Site Scripting (XSS) Flaws The web application can be used as a mechanism to transport an attack to an end user’s browser. A successful attack can disclose the end user’s session token, attack the local machine, or spoof content to fool the user. Buffer Overflows Web application components in some languages that do not properly validate input can be crashed and, in some cases, used to take control of a process. These components can include CGI, libraries, drivers, and web application server components. Injection Flaws Web applications pass parameters when they access external systems or the local operating system. If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the web application. Improper Error Handling Error conditions that occur during normal operation are not handled properly. If an attacker can cause errors to occur that the web application does not handle, they can gain detailed system information, deny service, cause security mechanisms to fail, or crash the server. Insecure Storage Web applications frequently use cryptographic functions to protect information and credentials. These functions and the code to integrate them have proven difficult to code properly, frequently resulting in weak protection. Denial of Service Attackers can consume web application resources to a point where other legitimate users can no longer access or use the application. Attackers can also lock users out of their accounts or even cause the entire application to fail. Insecure Configuration Management Having a strong server configuration standard is critical to a secure web application. These servers have many configuration options that affect security and are not secure out of the box. The Open Web Application Security Project (OWASP). The Ten Most Critical Web Application Security Vulnerabilities. c2004 http://www.owasp.org/index.jsp glisson@dcs.gla.ac.uk Department of Computing Science

Department of Computing Science Additional Support R.F. Darcy’s report on Information Security indicates that: patch management is critical in mitigating cyber vulnerabilities number of security vulnerabilities reported is increasing and attacks are becoming automated Conclusion no longer be assumed that security will be addressed in the acquisition of the functional or non-functional requirements surveys indicate that there are fundamental security problems with the methodologies being used in real world web application development glisson@dcs.gla.ac.uk Department of Computing Science