CS 575 – Drexel University – Fall 2007

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
MyGrid Security Issues Simon Miles University of Southampton.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Database Administration and Security Transparencies 1.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Troy Hutchison Service Oriented Architecture (SOA) Security.
02/12/00 E-Business Architecture
Network Security Testing Techniques Presented By:- Sachin Vador.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
SEC835 Database and Web application security Information Security Architecture.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Future Internet: Sensor Networks Security Yongkoo Han.
Clouding with Microsoft Azure
SIEM Rotem Mesika System security engineering
Chapter 5a - Pretty Good Privacy (PGP)
Design and implementation of Cross domain cooperative firewall Jerry Cheng, Hao Yang, Starsky H.Y. Wong, Petros Zerfos, Songwu Lu UCLA Computer Science.
CPA Gilberto Rivera, VP Compliance and Operational Risk
Working at a Small-to-Medium Business or ISP – Chapter 8
Design for Security Pepper.
VIRTUALIZATION & CLOUD COMPUTING
Tim Carter Sales Director Sybase Confidential Propriety.
Secure Software Confidentiality Integrity Data Security Authentication
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
CS 450/650 Fundamentals of Integrated Computer Security
Lecture 5. Security Threats
Wireless Local Area Network (WLAN)
Cloud Computing Kelley Raines.
Tim Carter Sales Director Sybase Confidential Propriety.
Computer Security Network Security
An Introduction to Web Application Security
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Security Protection Goals
Secure Electronic Transaction (SET)
امنیت شبکه علی فانیان
Understanding Security Layers
Representing Uncertainty
Risks of Wireless Access Points
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
CS3240: Adv. SW Dev. Refactoring and Maintenance
Chapter 27 Security Engineering
How to Mitigate the Consequences What are the Countermeasures?
Chapter 1 – Information Security Overview
Intrusion Detection system
ITU-T Workshop on Security, Seoul (Korea), May 2002
An Overview of Security Issues in Sensor Network
Chapter 5 SNMP Management
Albeado - Enabling Smart Energy
Chapter 5 SNMP Management
Session 1 – Introduction to Information Security
IoT in Healthcare: Life or Death
Presentation transcript:

Addressing Security in SOA Based Systems Throughout the Development Lifecycle CS 575 – Drexel University – Fall 2007 Alan Black, Daniel Moyer, Emily Reider

Some Aspects of Security Authentication Authorization Integrity Confidentiality Reliability Non-repudiation Privacy Some Aspects of Security

Why do we need security? Firewalls are not enough Independent security management Highly networked environments True security is about enabling functionality, not disabling it Why do we need security?

But what about? Complacency Cost New threats "We are not a target" "Our vendors will handle security" "We'll just encrypt our traffic" Cost New threats But what about?

Security Throughout the Lifecycle As Early As Possible Re-engineering may be difficult or impossible Maintenance Phase Encryption techniques for storage Vendors “How can you demonstrate to us that this product is secure?” Testing Security Throughout the Lifecycle

Conclusion Firewalls Early Design True Security - Enabling Manage Risks Maintenance Phase – Storage Vendors Conclusion