Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Access Control Methodologies
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security+ Guide to Network Security Fundamentals
Building a Successful Security Infrastructure
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
 Background  Penetration Studies  Example Vulnerabilities  Classification Frameworks  Theory of Penetration Analysis Computer Security: Art and Science.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Network Security Testing Techniques Presented By:- Sachin Vador.
Vulnerability Analysis
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
seminar on Intrusion detection system
Stephen S. Yau CSE , Fall Security Strategies.
March 24, 2003Upadhyaya – IWIA A Tamper-resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors R. Chinchani.
Vulnerability Assessments
Payment Card Industry (PCI) Data Security Standard
Department Of Computer Engineering
Network security policy: best practices
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Information Systems Security Computer System Life Cycle Security.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
CS470, A.SelcukThe Big Picture1 The Big Picture Practical, Economic, Legal Considerations CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
CSCE 522 Secure Software Development Best Practices.
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
CSCE 201 Secure Software Development Best Practices.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Design Principles and Common Security Related Programming Problems
Role Of Network IDS in Network Perimeter Defense.
Race conditions and synchronization issues Exploiting UNIX.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Computer Security Sample security policy Dr Alexei Vernitski.
Software Security Q: What does it mean to say that a program is secure? A: There is a sufficient amount of trust that the program maintains _____________,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
CS457 Introduction to Information Security Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Chap 20. Vulnerability Analysis
Chapter3 Security Strategies.
Intrusion Prevention Systems
Operating System Concepts
6. Application Software Security
Presentation transcript:

Vulnerability Analysis

Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design but not in a system Penetration testing Attempt to violate specific constrains stated in a policy Cannot prove correctness but absence of a vulnerability Review 2

Penetration Testing Goals Prove the existence/absence of a previously defined flaw Find vulnerabilities under given restrictions (time, resources,...) Layering of tests External attacker with no knowledge of the system External attacker with knowledge of the system Internal attacker with knowledge of the system 3

Penetration Testing Procedure Information gathering Find problem areas in the specification Flaw hypothesis Derive possible flaws from the information gathered Flaw testing Verify the possible flaws (exploiting, testing) – but no harming! Flaw generalization Generalize the obtained insights Flaw elimination proposal Flaws need to be fixed but sometimes this takes time and than the tester can suggest ways to prevent the exploit 4

Vulnerability Scanners Automated tools to test if the network or host is vulnerable to known attacks Run in batch mode against the system Process A set of system attributes are sampled and stored The results are compared to a reference set and the deviation derived 5

Network Based Analysis Probing the system actively by Looking for weaknesses Derive information from system responses Two different techniques Testing by exploit – really doing the attack Interference Methods – monitoring the system for vulnerable applications 6

Host Based Analysis Assessing system data sources (file contents, configuration setting, status information) to determine vulnerabilities Passive assessment where the tool has legitimated access which mostly involves privilege escalation attacks Targets are password files, SUID, access permissions, anonymous FTP... 7

Advantage/Disadvantage Helping to document the security state of a system Regular application can spot system changes which could lead to problems A way to double-check any changes made to the system Host based are tightly bound to the environment Network based can harm the system and are more prone to false alarms Can misguide a running IDS system May violate legal prescriptions (privacy, others sphere of influence...) 8 + -

Outline 1.Vulnerability Analysis 2.Security Strategies 3.Attack Trees 9

Security Strategies 10 Least Privilege Defense in Depth Diversity of Defense Choke Point Weakest Link Fail-Safe Stance Default Deny Default Permit Universal Participation Simplicity

Least Privilege (LP) Every user, process,.. should only have the privileges needed to solve their tasks. Problems Difficult to achieve as an ”afterthought” Which privileges should a subject have? 11

Defense in Depth Do not let the security of the system stand and fall with one mechanism Total security can never be achieved, but it can be made good enough so that intrusion attempts are: too risky. too costly. 12

Diversity of Defense Use security systems from different suppliers Let different persons configure the systems Problems Flavors of UNIX Drawback High cost 13

Choke Point Force the attacker to use one channel that can be monitored and controlled Example Firewall N.B. No alternative channels may be used. 14

Weakest Link Try to find all the weak points in the system eliminate them monitor them Problem How do you find all the weak points in a system? There will always be a weakest point 15

Fail-Safe Stance A system should fail in a secure manner if a system fails it should not be easier to penetrate the system Flavors Default deny stance define what is permitted and disallow everything else Default permit stance define what is disallowed and permit everything else 16

Universal Participation All personnel needs to participate in order to achieve security. Flavors Voluntary explain the benefits of a secure system/organization educate the staff Mandatory e.g. force the users to change passwords every week 17

Simplicity You can’t know if a system is safe if you don’t understand it. ”It is easier to secure an apartment than a whole block” 18

Summary The security of a system is, among other things, dependent on: How the system is constructed How the system is configured How the users behave 19

Questions ?