CVE.

Slides:



Advertisements
Similar presentations
COUNTER: improving usage statistics Peter Shepherd Director COUNTER December 2006.
Advertisements

Usage statistics in context - panel discussion on understanding usage, measuring success Peter Shepherd Project Director COUNTER AAP/PSP 9 February 2005.
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
The COUNTER Code of Practice for Books and Reference Works Peter Shepherd Project Director COUNTER UKSG E-Books Seminar, 9 November 2005.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
The Development of a Common Vulnerability Enumeration Vulnerabilities and Exposures List Steven M. Christey David W. Baker William H. Hill David E. Mann.
Common Vulnerabilities and Exposures
THE DATA CITATION INDEX AN INNOVATIVE SOLUTION TO EASE THE DISCOVERY, USE AND ATTRIBUTION OF RESEARCH DATA MEGAN FORCE 22 FEBRUARY 2014.
A Model for Exchanging Vulnerability Information draft-booth-sacm-vuln-model-01 David Waltermire.
My Resource for Excellence. Canadian Heritage Information Network Creation of the Collections Management Software Review (CMSR) Heather Dunn, CHIN.
Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Basic Profile 1.0 August 12, 2003 Copyright © 2003 by.
Chapter 1 Database Systems
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Security Automation May 26th, Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
Database Administration
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2010, The World Bank Group. All Rights Reserved. Recommended Tabulations and Dissemination Section B.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
STESEG taskforce on timeliness and benchmarkingJune The Short-term economic statistics: STES Timeliness Framework Richard McKenzie OECD.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
Chapter 25 – Configuration Management 1Chapter 25 Configuration management.
PHC Meeting the global challenge of unique identification of medicinal products SMS, RMS and OMS : Common Terminologies for enabling ISO IDMP.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
1 January 14, Evaluating Open Source Software William Cohen NCSU CSC 591W January 14, 2008 Based on David Wheeler, “How to Evaluate Open Source.
Open Source Security Updates Why it's Different; What you Should Know Josh Bressers Friday, 11 May 2007.
Integrated Public Alert and Warning System
Tool Support for Testing
PIRUS PIRUS -Publisher and Institutional Repository Usage Statistics
Configuration Management
Software Project Configuration Management
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
The Five Secrets of Project Scheduling A PMO Approach
Making Sense of the Alphabet Soup of Standards
Configuration Management
ServiceNow Implementation Knowledge Management
Introduction to OVAL to SACM Info Model Paper
Scotland’s Environment Web Environmental Data Portal Joanna Muse Scottish Environment Protection Agency.
Applications of Data Mining in Software Engineering
The Standards Development Process
I have many checklists: how do I get started with cyber security?
Becoming a CNA CVE Team.
CNA Processes CVE Team.
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
Tools of Software Development
Chapter 1 Database Systems
Well Identification Industry Meeting
Common Vulnerabilities and Exposures
Health Ingenuity Exchange - HingX
EPAN - eGovernment EPAN Administrative Framework
Introduction to the PRISM Framework
HingX Project Overview
COUNTER Update February 2006.
Metadata The metadata contains
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Chapter 1 Database Systems
Becoming a CNA CVE Team.
OWASP Application Security Verification Standard
Introducing the GSBPM Steven Vale UNECE
School of Information Studies, Syracuse University, Syracuse, NY, USA
Why IIIF? Shane Huddleston Jeff Mixter Dave Collins Product Manager
Experimental Internet Resource Allocations
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 Tools of Software Development l 2 types of tools used by software engineers:
EDITORIAL SELECTION JOURNAL COVERAGE – ESCI
Implementation Business Case
OWASP Application Security Verification Standard
Cultivating Semantics for Data in Agriculture and Nutrition
Presentation transcript:

CVE

https://cyberthreatsummit.com/speakers.php

What is a CVE Common Vulnerabilities and Exposures (CVE®) is a list of common identifiers for publicly known cyber security vulnerabilities. Use of "CVE Identifiers (CVE IDs)," which are assigned by CVE Numbering Authorities (CNAs) from around the world, ensures confidence among parties when used to discuss or share information about a unique software vulnerability, provides a baseline for tool evaluation, and enables data exchange for cyber security automation.

Context: The Vulnerability Life Cycle Mailing lists, Newsgroups, Hacker sites Start Here Discovery Incident Response Teams Incident Reports Academic Study Advisories Incident Handling Analysis CVE Intrusion Detection Systems Databases Newsletters Detection Collection Protection Vulnerability Assessment Tools

Implications Difficult to correlate data across multiple organizations and tools E.g. IDS and assessment tools E.g. security tools and fix information Incident information Difficult to conduct a detailed comparison of tools or databases Vulnerabilities are counted differently Which is more comprehensive?

Common Vulnerabilities and Exposures (CVE): One Common Language Lists all publicly known security problems Assigns unique identifier to each problem Remains independent of multiple perspectives Is publicly open and shareable Community-wide effort via the CVE Editorial Board

Addressing Common Misconceptions of CVE Not a full-fledged vulnerability database Simplicity avoids competition, limits debate Intended for use by vulnerability database maintainers Not a taxonomy or classification scheme Focuses on vulnerabilities instead of attacks Does not cover activities such as port mapping Not just “vulnerabilities” in the classical sense Definitions of “vulnerability” vary greatly “Exposure” covers a broader notion of “vulnerability” Competing vendors are working together to adopt CVE

CVE Editorial Board Members from 25 different organizations including researchers, tool vendors, response teams, and end users Mostly technical representatives Review and approve CVE entries Discuss issues related to CVE maintenance Monthly meetings (face-to-face or phone) Publicly viewable mailing list archives

Adding new entries Board member submits raw information to MITRE Submissions are grouped, refined, and proposed back to the Board as candidates Form: CAN-YYYY-NNNN Strong likelihood of becoming CVE-YYYY-NNNN Delicate balance between timeliness and accuracy Board reviews and votes on candidates Accept, modify, recast, reject, reviewing If approved, the candidate becomes a CVE entry Entry is included in a subsequent CVE version Published on CVE web site Entries may later be modified or deprecated

CVE is: One name for one vulnerability or exposure One standardized description for each vulnerability or exposure A dictionary rather than a database How disparate databases and tools can "speak" the same language The way to interoperability and better security coverage A basis for evaluation among tools and databases Free for public download and use Industry-endorsed via the CVE Numbering Authorities, CVE Board, and CVE-Compatible Products

Why CVE CVE was launched in 1999, as a government US program different metrics to state the number of vulnerabilities or exposures they detected CVE is now the industry standard for vulnerability and exposure names.

CVE Identifier CVE Identifiers (also referred to by the community as "CVE IDs," "CVE entries," "CVE names," "CVE numbers," and "CVEs") are unique, common identifiers for publicly known cyber security vulnerabilities. Each CVE Identifier includes the following: CVE identifier number with four or more digits in the sequence number portion of the ID (i.e., "CVE-1999-0067", "CVE-2014-12345", "CVE-2016-7654321"). Brief description of the security vulnerability or exposure. Any pertinent references (i.e., vulnerability reports and advisories). CVE Identifiers are used by information security product/service vendors and researchers as a standard method for identifying vulnerabilities and for cross- linking with other repositories that also use CVE Identifiers.

CVE IDs have the format CVE-YYYY-NNNNN. The YYYY portion is the year that the CVE ID was assigned OR the year the vulnerability was made public (if before the CVE ID was assigned). The "Description" portion of CVE Identifier (CVE ID) entries are typically written by CVE Numbering Authorities (CNAs), MITRE's CVE Content Team, or individuals requesting a CVE ID. to write a CVE Description, the MITRE CVE Content Team analyzes public, third- party reports of vulnerabilities (i.e., "references"); extracts the relevant information from each reference; resolves any conflicting information or inconsistent usage of terminology; and then writes the description. Each CVE Identifier includes appropriate References. Each reference used in CVE identifies the source, includes a well-defined identifier to facilitate searching on a source's website, and notes the associated CVE Identifier.

State of CVE IDs RESERVED -> it has been reserved for use by a CVE Numbering Authority (CNA) the CVE is populated with details and published on the CVE List, it will become available in the U.S. National Vulnerability Database (NVD) As one of the final steps in the process, the NVD Common Vulnerability Scoring System (CVSS) scores for the CVE ID are assigned by the NIST NVD team. DISPUTED -> When one party disagrees with another party's assertion that a particular issue in software is a vulnerability REJECT -> Not accepted as CVE

The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.