SUBMISSION TITLE Srinivas Munigala & Principal QA Engineer

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Security+ Guide to Network Security Fundamentals
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 21 Distributed System Security Copyright © 2008.
Broken Authentication & Session Management. What is it ? Bad implementation of authentication and session management. If an attacker can get your session.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Srinivas Balivada USC CSCE548 07/22/2016.  Cookies are generally set server-side using the ‘Set-Cookie’ HTTP header and sent to the client  In PHP to.
CS457 Introduction to Information Security Systems
562: Power of Single Sign-On in OpenEdge
Web Applications Security Cryptography 1
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Wireless Protocols WEP, WPA & WPA2.
Cryptography Why Cryptography Symmetric Encryption
WEP & WPA Mandy Kershishnik.
Secure Sockets Layer (SSL)
Security and Encryption
Security.
Presented by: Dr. Munam Ali Shah
Review Slides, Security +
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Computer and Network Security
امنیت شبکه علی فانیان
An Introduction to Web Application Security
Security in Network Communications
Network Security – Kerberos
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Security.
Security Of Wireless Sensor Networks
Security network management
Lecture 10: Network Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Chinese wall model in the internet Environment
Security of Wireless Sensor Networks
Authentication Chapter 2.
Advanced Computer Networks
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
Instructor Materials Chapter 4: The Art of Confidentiality
Cryptography and Network Security
A Model For Network Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
AIT 682: Network and Systems Security
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

SUBMISSION TITLE Srinivas Munigala & Principal QA Engineer Progress Software Pvt Ltd

Abstract Information is an asset for today’s organizations and individuals. Information may be less or more important and very often has a monetary value. The disclosure, improper modification, or unavailability of information may incur expenses (loss) or missed profits for the organization or the individual. Therefore, most organizations and individuals protect information to a certain extent. User identity and Authentication are the main security processes working together to provide access to assets in a controlled manner. Security testing is most trending and happening subject in IT. It is very important aspect of testing and tricky thing. Authentication and Authorization plays an vital role in security testing. This session gives complete understanding of Authentication and Authorization mechanisms that are available in application security, challenges in managing user identity in distributed environments and techniques to test them thoroughly.

Presentation Body

Agenda Overview of Application Security Importance of Authentication and Authorization Different threats to A & A Enterprise user Identification and Authentication Challenges Different techniques to secure your credentials Testing tips for Sensitive Data Exposure

Overview - History We are working on these slides

Overview - Now We are working on these slides

Overview - Cost of data breach

Overview – Security in different layers We are working on these slides

Overview – Security Types Application Security Identity Management Authentication Authorization Connection and Data Security Confidentiality Integrity Trust We are working on these slides

Authentication and Authorization We are working on these slides

Importance of Authentication and Authorization

Evaluation of A & A password Hardware tokens Software Tokens Single-sign-on Federated We are working on these slides

Enterprise user Identification and Authentication Challenges Yet to prepare slides

Different threats to A & A Bypassing Authentication Default Passwords Password Guessing Sniffing Credentials off the Network Replaying Authentication Session Hijacking Downgrading Authentication Strength

Different techniques to secure your credentials Secret Algorithm Secret Key Protection Keys Data Encryption Standard (DES / 3DES) Advanced Encryption Standard (AES) RC4 RSA Encryption Algorithm Encryption Message Integrity Code (MIC) Message Authentication Code (MAC) Data Integrity Yet to prepare slides

Authentication Testing Techniques – Areas to look into Data in rest and in transit Default credentials Lock out mechanism Bypassing authentication Remember password functionality Browser cache Password change /reset Yet to prepare slides

Use Case 1 - Sensitive Data Exposure Threat Agents Data at rest Data in transit Data in browsers Attack Vectors Steal Keys Man-in-the-middle attacks Steal clear text Security Weakness Clear text Old / Weak algorithm Weak crypto keys Tools Wireshark Fiddler Yet to prepare slides

Wireshark sample output for sensitive data

Use Case 2 - Broken Authentication and Session Management Threat Agents Anonymous Users with their accounts Attack Vectors Flaws in authentication Flaws in session management Security Weakness Log out Password management Timeouts Tools Burp Suite Jmeter Yet to prepare slides

References & Appendix

Author Biography Srinivas Munigala is a Principal Engineer at Progress Software Pvt Ltd, has working experience on different Progress products and has been associated with OpenEdge AppServer for last 7 years. He has good knowledge of Classic AppServer and its related Adapters (AIA, WSA, REST, sonicMQ and sonicESB), hands-on experience on developing ABL, REST and SOAP applications. His recent interests involve Security in AppServers and OpenEdge products where he did lot of exploration on SSL protocols, ciphers and authentication mechanisms.

Thank You!!!