Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

OWASP Secure Coding Practices Quick Reference Guide
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2005 – Biz/ed Functional Areas of Business What do the different parts of a business do?
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Privileged Identity Management Enterprise Password Vault
Copyright 2002: LIIF Technology Architecture Review Database Application Architecture Database Application Architecture Collaborative Workgroup Architecture.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Integrated Site Security.
Information Security Policies and Standards
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
IS Network and Telecommunications Risks
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Network security policy: best practices
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Unit 4 – Impact of the use of IT on Business Systems.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
This communication does not constitute an offer to sell or the solicitation of an offer to buy any securities or a solicitation of any vote or approval.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CS CS 5150 Software Engineering Lecture 18 Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
September 23, 2015 Sacramento, CA Frédéric DINGUIRARD PMR Expert Overview Presentation on Registry Procurement and Specifications Workshop “Building Registries.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
IS Network and Telecommunications Risks Chapter Six.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Phishing: Trends and Countermeasures Blaine Wilson.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
MIS323 – Business Telecommunications Chapter 10 Security.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Reach us at Call: | Visit:
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
3.1 Types of Servers.
3.1 Types of Servers.
BACHELOR’S THESIS DEFENSE
Security week 1 Introductions Class website Syllabus review
6. Application Software Security
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Financial Real-Time Threats: Impacting Trading Floor Operations Dr Yiannis Pavlosoglou OWASP Project Leader Information Risk Management September 6 th, 2007

OWASP 2 Outline  Background  Motivation  Architecture  Findings  Scenario  Conclusions

OWASP 3 Background  PhD in Information Security  Emergence in Designing Routing Protocols  UK Security Scientist  DefCon 2007, IEEE, IEE, BCS, CISSP  Java Developer Background  J2SE, JEE  OWASP Project Leader  JBroFuzz  Employer: Information Risk Management, UK 

OWASP 4 Motivation “the cash desk, the derivatives desk, the program desk … bring them all together” “ Do you have trading technology that allows you to trade across every asset in every country? ” “Our traders can trade across multiple asset classes simultaneously” “We offer you the ability to trade from your PDA”  How long can you be out of the market for?

OWASP 5 Motivation  How long can you be out of the market for?  Regulatory requirements  Business loss opportunities  Liability issues regarding prices  Increase in number of people on the floor

OWASP 6 The Freakonomics of Security and Personel  Scenario: Member of Staff A, holds a password of ‘operational importance’ Technical Attack Approach  Password is stored in the form of a 128 bit hash  The cost of obtaining the hash would require an insider’s presence  To check for a single value would cost: $  To check for more than half of the values: ≈$ 184 million Human Attack Approach  Clerical A Staff Salary pays: $ 40 K / Year  A successful career of, say 25 years  Total Earnings: ≈ $ 1 million …

OWASP 7 Trading Floor Security Testing Architecture

OWASP 8 Trading Floor Security Testing Architecture Penetration Test Application Security Test Software Product Review Application Architecture Assessment Console Audit Test Application Assessment Network Assessment Secure Development Training Application Assessment Network Assessment VPN / RAS Test Firewall Review VPN / RAS Test Messaging System Audit

OWASP 9 Typical Assessment Findings

OWASP 10 Scenario Operational System Risk Assessment Initiated Initial Internal Assessment External Penetration Test

OWASP 11 Scenario Results External Penetration Test  A1: Cross Site Scripting  A2: Cross Site Request Forgery  A4: Web Application DoS  A7: Weak Session Cookies  A9: Insecure Communications Final Risk Assessment  A1: Non Internet Facing Application  A2: Scarce Data Manipulation Attacks  A4: Application recovers successfully  A7: Users not technical enough  A9: Internal Switched Network Fun and Profit Enterprise Attack  A4: Cause a Web Denial of Service  A1: Mass Internal Phishing  A2: Manipulate Data being on the fly  A7: Hijack administrator’s data  A9: Bounce data off mail gateway

OWASP 12 Conclusions  Complex “Enterprise Level” applications will experience “Enterprise Level” attacks  An application, subsystem or component must be able to withstand a targeted specialized attack  Simplicity is key for a Secure System Implementation