Secure Software Confidentiality Integrity Data Security Authentication

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Network Security Testing Techniques Presented By:- Sachin Vador.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Enterprise Network Security Accessing the WAN Lecture week 4.
APA of Isfahan University of Technology In the name of God.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISEC0511 Programming for Information System Security
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Software Security Testing Vinay Srinivasan cell:
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Operating System Security Fundamentals Dr. Gabriel.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
E-Commerce & Bank Security By: Mark Reed COSC 480.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Information Management System Ali Saeed Khan 29 th April, 2016.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 5 Electronic Commerce | Security Threats - Solution
Working at a Small-to-Medium Business or ISP – Chapter 8
Design for Security Pepper.
Chapter 7: Identifying Advanced Attacks
Chapter 6 Application Hardening
National Cyber Security Month
Chapter 5 Electronic Commerce | Security Threats - Solution
Security Shmuel Wimer prepared and instructed by
Security in the Workplace: Information Assurance
Chapter 5 Electronic Commerce | Security
Introduction to Networking
Security of a Local Area Network
Teaching Computing to GCSE
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
Prepared By : Binay Tiwari
Information Security Awareness
Data Security in Local Networks using Distributed Firewalls
How to Mitigate the Consequences What are the Countermeasures?
Computer Security.
Intrusion Detection system
Network hardening Chapter 14.
Intrusion.
WJEC GCSE Computer Science
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Module 4 System and Application Security
Mohammad Alauthman Computer Security Mohammad Alauthman
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Secure Software Confidentiality Integrity Data Security Authentication Disclosure of information to only intended parties Integrity Determine whether the information is correct or not Data Security Privacy Data Protection Controlled Access Authentication Access to Authorized People Availability Ready for Use when expected Non Repudiation Information Exchange with proof

Software Security Security of Operating System Security of Client Software Security of Application Software Security of System Software Security of Database Software Security of Software Data Security of Client Data Security of System Data Security of Server Software Security of Network Software

Why Security Testing For Finding Loopholes For identifying Design Insecurities For identifying Implementation Insecurities For identifying Dependency Insecurities and Failures For Information Security For Process Security For Internet Technology Security For Communication Security For Improving the System For confirming Security Policies For Organization wide Software Security For Physical Security

Approach to Software Security Testing Study of Security Architecture Analysis of Security Requirements Classifying Security Testing Developing Objectives Threat Modeling Test Planning Execution Reports

Security Testing Techniques OS Hardening Configure and Apply Patches Updating the Operating System Disable or Restrict unwanted Services and Ports Lock Down the Ports Manage the Log Files Install Root Certificate Protect from Internet Misuse and be Cyber Safe Protect from Malware Vulnerability Scanning Identify Known Vulnerabilities Scan Intrusively for Unknown Vulnerabilities

Security Testing Techniques (continued…) Penetration Testing Simulating Attack from a Malicious Source Includes Network Scanning and Vulnerability Scanning Simulates Attack from someone Unfamiliar with the System Simulates Attack by having access to Source Code, Network, Passwords Port Scanning and Service Mapping Identification and locating of Open Ports Identification of Running Services Firewall Rule Testing Identify Inappropriate or Conflicting Rules Appropriate Placement of Vulnerable Systems behind Firewall Discovering Administrative Backdoors or Tunnels

Security Testing Techniques (continued…) Network Scanning Identifying Active Hosts on a network Collecting IP addresses that can be accessed over the Internet Collecting OS Details, System Architecture and Running Services Collecting Network User and Group names Collecting Routing Tables and SNMP data Password Cracking Collecting Passwords from the Stored or Transmitted Data Using Brute Force and Dictionary Attacks Identifying Weak Passwords Ethical Hacking Penetration Testing, Intrusion Testing and Red Teaming File Integrity Testing Verifying File Integrity against corruption using Checksum

Security Testing Techniques (continued…) Session Hijacking Exploitation of Valid Computer Session Exploitation of the Web Session control mechanism Gain unauthorized access to the Web Server Phishing Masquerading as a trustworthy entity in an electronic communication Acquiring usernames, passwords and credit card details URL Manipulation Make a web server Deliver inaccessible web pages URL Rewriting