Security at the Source.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Copyright © 2002 Dennis Groves, Bill Pennington & Jeremiah Grossman Taking Aim at Web Applications Dennis Groves Bill Pennington.
Module 1: Introduction to SQL Server Reporting Services.
State of Software Security 1 Jeff Ennis, CEH Solutions Architect Veracode.
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
IT Project Management, Third Edition Appendix A1 Appendix A: Guide to Using Microsoft Project 2002.
Server-Side vs. Client-Side Scripting Languages
1 Classic ASP vs. ASP.NET Technical Information and Market Adoption Lance Welker University of San Diego Dr. Rebman MSIT 526 December 20, 2005.
By Ben Pratt and Clint Forseth.  Ben Pratt ◦ Primary Role: Course Mgmt. Sys. Admin ◦ Secondary Roles: Printer Server Admin, Web Application Firewall.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Configuring PHP on IIS7 Making your application rock on IIS7 Taking advantage of the Windows platform Q&A at Open Space.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Microsoft ® Official Course Module 9 Configuring Applications.
Lixin Tao, Li-Chiou Chen & Chienting Lin Pace University
Copyright © 2006, SAS Institute Inc. All rights reserved. What Is New in SAS Profitability Management (PrM) 2.1? Authors: Jack Zhang Solution & Version:
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
A Security Review Process for Existing Software Applications
Adam L. Jacobs, CISSP Principal Program Manager, Oracle 15/16 November 2005 Why is Commercial Software So Vulnerable (and How Can We Fix It)?
COLD FUSION Deepak Sethi. What is it…. Cold fusion is a complete web application server mainly used for developing e-business applications. It allows.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Security Testing Case Study 360logica Software Testing Services.
Introduction to ColdFusion Yu Fu 2003 MEC Candidate.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
ASP (Active Server Pages) by Bülent & Resul. Presentation Outline Introduction What is an ASP file? How does ASP work? What can ASP do? Differences Between.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Stanford GSB High Tech Club Tech 101 – Session 1 Introduction to Software, Distributed Architectures, and ASPs Presented by Shawn Carolan Former Manager.
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
Application & System Development Security Part 1.
Arizona SharePoint Professionals Group.
Best Institutes offering Software Development courses.
Web Application Security
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
WWW and HTTP King Fahd University of Petroleum & Minerals
World Wide Web policy.
Cross-Site Scripting Travis Deyarmin.
Key Points Unfolding the Situations to Drill a Framework in PHP
Introduction and Principles
Владимир Гусаров Директор R&D, Dell Visual Studio ALM MVP ALM Ranger
MICROSOFT OUTLOOK and Outlook service Provider
Appendix A: Guide to Using Microsoft Project 2002
Michael Robertson Yuta Takayama Google Closure Tools.
A Security Review Process for Existing Software Applications
Web Applications Security What are web Applications?
Secure Software Development: Theory and Practice
Computer Security Fundamentals
PHP / MySQL Introduction
Yii - For the Future - Gen Web Development Platform
Computerized and Manual Systems
HTML Level II (CyberAdvantage)
Website Security Testing: Why Business Need It Very Badly.
Database Driven Websites
Web Site Project Management
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
AppExchange Security Certification
CS5123 Software Validation and Quality Assurance
Severity and Exploitability Index
Software Security Slide Set #10 Textbook Chapter 11 Clicker Questions
Appendix A: Guide to Using Microsoft Project 2002
Enterprise Web Services
Web Application Development Using PHP
Presentation transcript:

Security at the Source

Fundamental Security Issues Poor Design Poor Configuration Software Coding Errors Human Error

Software Vulnerabilities Cross Site Scripting SQL Injection Buffer Overflow Unintentional / Intentional Functionality Complexity

Advisories Dec 15, 2004 (MS04-043) Buffer Over In HyperTerminal, Nov 23, 2004 Winamp IN_CDDA Buffer Overflow Nov 23, 2004 SecureCRT - Remote Command Execution Oct 14, 2004 (MS04-033) Buffer Over In Microsoft Excel Oct 14, 2004 (MS04-032) SetWindowLong() Shatter Attacks Jul 14, 2004 (MS04-022) CHM File Heap Overflow Jul 14, 2004 (MS04 -011) Utility Manager Loads Winhlp32 As SYSTEM Nov 11, 2003 (MS03-051) FrontPage Extensions Remote Command Execution Oct 15, 2003 (MS03-045) Listbox and ComboBox Overflow Advisory Jul 16, 2003 (MS03-028) ISA Server XSS Advisory Jun 25, 2003 (MS03-022) Windows Media Services Overflow #2 Advisory May 30, 2003 (MS03-019) Windows Media Services Overflow #1 Advisory

The Cost and Impact Software bugs cost the U.S. economy an estimated $59.5 billion annually. More than a third of those costs, $22.2 billion, could be eliminated with improved testing and earlier identification of errors. “Software vendors need automated tools that look for bugs in their code, but it may be a decade before many of those tools are mature and widely used”, Amit Yoran, former director of cybersecurity for the U.S. Department of Homeland Security.

Some Issues Coding Securely Education Copying Code Open Source Bespoke Development

Current Protections Application Attack and Penetration Automated Attack Tools Configuration Analysis Vulnerability Analysis and Management Code Reviews Inspections Architecture Reviews Peer Reviews

What’s the need? Developers: Include security testing in the development life cycle Auditors: Improved Quality and Reduced Time of Source Code Analysis and Inspection Quality Assurance: Measure quality of code from development or outsourcers Change Control: Retest code in every release rather than on first development

Security at the Source ™ Design Security In Keep up to date with security weaknesses Automate / Reduce the Cost of the Process Build Better Systems

CodeScan Testing Internet application source code for security weaknesses Approach Start with most widely used languages (Microsoft .ASP vbscript, PHP) Start with common coding problems Evolve the product over time to meet ongoing customer requirements

Features Client Based automation of Web Source Code inspection Automated variable tracking Rating of vulnerabilities General and Language Specific testing Includes Emailers Cross Site Scripting SQL Injection User Input Filtering Extensive Reporting and “fix” information Code “Healing”

Outcomes Demonstrable duty of care Reduced development costs Security within the Project Lifecycle Improved Security in end products Third party code inspections at affordable prices

Product Direction Developer Versions (ASP, PHP) Language Directions Microsoft .NET .JSP / Java Higher Level Languages Versions Developer (Mass Market) Consultant (Pay Per Application) Enterprise (Client / Server) Comparative Analysis Enhanced Reporting Web Sales and Support

Demonstration