SOFTWARE SECURITY EDUCATION WHAT NEXT???? Submitted by Srinath Viswanathan 006329076 Srinivas Gudisagar 006376734 1.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Protection of Information Assets I. Joko Dewanto 1.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Protecting the World from Cybercrime Neil Daswani August 27, 2008.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Security Certification
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
A First Course in Information Security
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Computer & Network Security
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Software Security Testing Vinay Srinivasan cell:
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 1  Introduction 1 Chapter 1: Introduction.
IS Network and Telecommunications Risks Chapter Six.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Introduction to Information Security
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Computer Security By Duncan Hall.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Securing Information Systems
Computer Security Introduction
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Network Security (the Internet Security)
Cyber Defence Intelligence
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Chapter 1: Introduction
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
SUBMISSION TITLE Srinivas Munigala & Principal QA Engineer
Li Yang, Carson Woods (University of Tennessee at Chattanooga
Web Programming Language
Security: Exploits & Countermeasures
Introduction Security Intro 1.
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Module 4 System and Application Security
Security: Attacks & Countermeasures
ECCouncil v10 Certified Ethical Hacker Exam (CEH V10) Get certified in one attempt!
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

SOFTWARE SECURITY EDUCATION WHAT NEXT???? Submitted by Srinath Viswanathan Srinivas Gudisagar

AGENDA Introduction Security types Certification’s Courses Conclusion 2

Introduction What is Security Software Education? Software security essentially deals with what are the security risks and how would one manage them. Security space can be cleanly divided into two distinct subfields:  Information Security  Application Security Information security concerns confidentiality, integrity and availability. 3

Information Security Secure both the information and the information systems. Classic Threats Disclosure ◦ Snooping, Trojan Horses Deception ◦ Modification, spoofing, repudiation of origin, denial of receipt Disruption ◦ Modification Usurpation ◦ Modification, spoofing, delay, denial of service 4

Application Security Application security applies security throughout the application’s life cycle. Protect from attacks from design defects, deployment and maintenance of the application. Application level security threats. Session Threat: Session Hijacking, Session replay, Man in the middle attack. Auditing and Logging: Non Repudiation Input Threats: Cross Site scripting, SQL injection 5

SQL Injection Username & Password SELECT passwd FROM USERS WHERE uname IS ‘$username’ Normal Query Web Browser Web Server Database

SQL Injection SELECT passwd FROM USERS WHERE uname IS ‘’; DROP TABLE USERS; -- ' Malicious Query Eliminates all user accounts “Username & Password” Web Browser Web Server Database

Cross Site Scripting Cross Site Scripting /viewbalance Cookie: sessionid=40a4c04de “Your balance is $25,000” Alice bank.com /login.html /auth uname=alice&pass=ilovebob Cookie: sessionid=40a4c04de

evil.com Cross Site Scripting Cross Site Scripting Alice bank.com /login.html /auth uname=alice&pass=ilovebob Cookie: sessionid=40a4c04de /evil.html /paybill?addr=123 evil st, amt=$10000 Cookie: sessionid=40a4c04de “OK. Payment Sent!”

Why Security Certification? Professional validation of skills Exposure to industry standards Best practices Baseline skills for a specific role Quality of work & productivity Differentiation of your organization or group 10

Security Certifications Classifications: ◦ Benchmark  Wide recognition by professionals in all sectors  Advanced level  Prerequisite for many senior jobs ◦ Foundation  Introductory certifications  One to four years of experience

Security Certifications Classifications: ◦ Intermediate  3 to 4 years of networking experience  2 years of IT Security experience ◦ Advanced  Expert level  Minimum of 4 years of IT Security experience

Security Certifications Benchmark certifications: CISSP  ISC2.org  Common Body of Knowledge  Access Control Systems and Methodology  Applications & Systems Development  Business Continuity Planning  Cryptography  Law, Investigation & Ethics Cost $600 Average Annual Salary- $115,000

Security Certifications Foundation level: SANS GIAC Security Essentials (GSEC)  Basic understanding of the CBK  Basic skills to incorporate good information security practices GIAC IT Security Audit Essentials  Developing audit checklists  Perform limited risk assessment Cost $450 Average Annual Salary- $70,000

GIAC Secure Software Programmer:  Find Programming flaws.  Comes in 3 flavors.  Things provided by this certificate: a) It teaches some basic security concepts as well as advanced topics. b) Learning to write code with security in mind. Advantages: Learners can demonstrate mastery of security knowledge in the programming language. 15

Anti-Hacking Certification:  Thinking in Hackers Perspective.  Teaches different network security testing tools.  Things provided by this certificate: a) Learning Hacking tools like HTTPPort, BackStealth. b) Hacking SSL enabled sites. Advantages: a) It Complements CEH, and learners are able to come out with a complete security education. b) Learn to defend network from Trojans, virus. 16

EC-Council Certified Security Analyst (ECSA):  Analyze outcome of security tests.  Differentiating with Ethical hacker.  Things provided by this certificate: a) Methods and tool to test security. b) Performing network security testing and doing an Exhaustive analysis.  Advantages: a) Boosts your resume, by making you stand out as a better security professional. b) Makes you skillful in using security tools and techniques. 17

Courses: Wireless Security  Distinguished based on their range.  General threats Denial Of Service, Eaves dropping, man in the middle attack, replaying message, and hacker analyses patterns.  Defenses are Encryption, applying algorithms, using timestamp, authentication, IDS.  Defenses implemented with the base knowledge of network security. 18

VPN Security  Connect different nodes by a virtual network.  Methods to keep the communication and data secure are: a) Firewall b) Encryption c) IPSec d) Building AAA server. 19

Stanford Advanced Computer Security Certificate  Six Courses to be done.  The courses are: a) Using Cryptography Correctly - Avoid Programming mistakes b) Writing secure code – Secure code tools. c) Security Protocols – Design SSL,WEP, IPSec, Kerberos correctly. d) Software Secure Foundation – Secure Programming techniques. e) Web Security – Security issues with web 2.0, Face book lab. f) Securing Web Application – Secure website design, SQL injection lab.  1100$ at Stanford, 495$ online.  participants from organizations like Yahoo! Inc, Cisco Systems, Oracle. 20

Conclusion Software security is every engineer's problem! Certification and some of the courses that we mentioned is a great way to complement the network security course. Better Security for Organizations. 21

Reference: Hacking_Certificate_Mgrs.php r1.pdf cs673/index.html cs673/index.html 22

THANK YOU 23

? 24