Build It Right; Build It Secure Tom Neff USAF Software Engineer & Process Improvement Specialist CERT Conference ‘99CERT Conference ‘99.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

Project Connect Online Affordable, Secure and Easy to Use Collaboration for Project Teams 01/21/2009.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
TEMPLATE DESIGN © Bluetooth Login Key RIT Computer Engineering Senior Design Project Tim Wesley, Dan Chen Spring 2009.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Chapter 4 Hackers: How they get into Computers. Synopsis (I) What is a hacker? What is a cracker and what is the difference? Who are the crackers? What.
Free Software Alternatives: Avast! Anti-virus
C HAPTER 4 W EB H OSTING. I. I NTRODUCTION To make your Web site visible to the world, it has to be hosted on a Web server. In this tutorial we will teach.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
1 Computer Security: Protect your PC and Protect Yourself.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Vulnerabilities. flaws in systems that allow them to be exploited provide means for attackers to compromise hosts, servers and networks.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Final Presentation 4/21/2010 By Guofu Xiong, Yuli Deng.
SEC835 Database and Web application security Information Security Architecture.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ECE 578: COMPUTER NETWORK AND SECURITY
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Computer and Network Security Issues –the Security Officer’s Perspective Jeff Savoy, Information Security Officer.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Chapter 1 Assuming the Role of the Systems Analyst Systems Analysis and Design Kendall & Kendall Sixth Edition.
ColdFusion Security Michael Smith President TeraTech, Inc ColdFusion, Database & VB custom development
August Mr. Mike Finley, CISSP Senior Security Engineer Computer Science Corporation.
Android Mobile Security Krystal Salerno. Introductions.
Introduction to Unix Security Greg Porter Data Processing Manager USPFO For California.
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Improving Security through Software Dr Warren Toomey School of Computer Science Australian Defence Force Academy.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Wireless and Mobile Security
OLMEK Mach 2006 Olmek is an innovative solution developed by Item Centric to protect digital data’s storage and exchange with an unprecedented level of.
Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Computer Security By Duncan Hall.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 st PeriodAP Computer Science 2 nd PeriodComputer Science I 3 rd PeriodIntroduction to Programming 4 th PeriodComputer Science I/ Advanced Projects Lunch.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
CAESked Computer Aided Engineering Scheduler. Introduction Team Members: Chris Fruin & Jerry Grochowski What CAESked is: Web based class scheduling application.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
PDF Recovery Tool Fix Portable Document File Format.
Using the Communicator. This brief presentation will assist you with learning the basic functions of the Communicator. Please note that Mobile App methodology.
Windows Tutorial 5 Protecting Your Computer
IT Security Awareness Day October 19, 2016
Firewall Technology Planning and Implementation
L25 - PlantPAx Process Application Development Lab I
Patch Management Patch Management Best Practices
People used to install software on their computers
CompTIA Server+ Certification (Exam SK0-004)
Network security threats
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
CANVAS Report for CTF Event at USAFA on 4/25/2007
Fix Bitdefender 2018 not Updating Error
Fix Bitdefender Antivirus Error Code 1605 Give a Ring on: Bitdefender Customer Support Service.
Call AVG Antivirus Support | Fix Your PC
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Internet Security Submitted to Professor Mort Anvari
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
CSC-682 Advanced Computer Security
IT Management, Simplified
Final exam question format
Final exam question format
Presentation transcript:

Build It Right; Build It Secure Tom Neff USAF Software Engineer & Process Improvement Specialist CERT Conference ‘99CERT Conference ‘99

CERT Conference ‘99 The Perfect Solution... 2

CERT Conference ‘99...How Secure Is It?... 3

CERT Conference ‘99...Absolutely Impenetrable!!!... 4

CERT Conference ‘99 We need to communicate with the world to do our jobs....The Problem... 5

CERT Conference ‘99...The Solution... 6

CERT Conference ‘99 …The BIGGER Problem... 7

CERT Conference ‘99...The REAL Solution. 8

CERT Conference ‘99 Let’s Cover... A quick review of a typical product development lifecycle Where are folks CURRENTLY implementing security procedures? Where SHOULD you implement security? What can you do to decrease your cost for IT security? How can you make your IT security program more effective? 9

CERT Conference ‘99 Typical Product Development Explore a concept Determine what the requirements are Turn the requirements into a valid design Convert the design into a viable product Put the product to daily use Perform maintenance as needed 10

CERT Conference ‘99 Where does security get implemented? Concept Exploration? Requirements? Design? Development? Operations? Maintenance? 11

CERT Conference ‘99 Maintenance Where currently MOST security is executed. Closing the door after the cows left. Many COTS products Cost 100x 12

CERT Conference ‘99 Operations (1/2) Where currently most security problems are identified. Found by... trial and error intrusion corrupt data problems 13

CERT Conference ‘99 Operations (2/2) Where currently most security problems are identified. Attacks occur here Problems trigger search for resolution Some attempt to be proactive Help from CERT/CC Cost 90x 14

CERT Conference ‘99 Development A good start Product inspections: invite security folks Consider Ada; advantages… Cost 50x 15

CERT Conference ‘99 Design A better start Design security INTO the product Have security folks assist with design Keep it flexible Cost 10x 16

CERT Conference ‘99 Requirements An even BETTER start Include security features in the requirements Defer any feature that may cause security problems Cost 2x 17

CERT Conference ‘99 Concept Exploration Best Place to Start Looking at Security!!! Think security from the very beginning Involve security in the whole process Cheapest cost to implement security: 1x 18

CERT Conference ‘99 *PC Computing’s Helpful Hints Operations: Hack your own site Use a port scanner to see what doors are open Download Rhino9’s Ogre 0.9b at *PC Computing magazine Sep 99 issue. 19

CERT Conference ‘99 *PC Computing’s Helpful Hints Development: Encrypt everything that leaves your control. If using Windows, will need 3rd party product. PC Computing recommends Network Associates’ McAfee PGP Personal Privacy Others include WinMagic’s SecureDoc and RSA Data Security’s SecurPC. Courtesy PC Computing magazine Sep 99 issue. ( 20

CERT Conference ‘99 *PC Computing’s Helpful Hints Design: “You need to get up to speed on... security issues now.” Useful sites: – security – 21 – – – –

CERT Conference ‘99 +Software Development’s Helpful Hints Requirements: Be aware of all vulnerabilities of your hardware, software, and comm. Useful tools: E-commerce: Linux: Mobile code: Software Development Magazine, Aug 99 issue Dynamic passwords: Black box: Net scanner: SW Dongle :

CERT Conference ‘99 Tom Neff’s Helpful Hints Concept Exploration: Attend CERT Conf ‘

CERT Conference ‘99 Tom Neff’s Helpful Hints Process is EVERYTHING! Climb the process improvement ladder Form a CERT & Red Team Register with CERT/CC Info Cons Remember superchicken 24

CERT Conference ‘99 Tom Neff’s Helpful Hints You can’t control what you can’t control Outsourcing is a double-edged sword –Gives you flexibility and possible savings –Gives others intimate access to your system (Gardner Group: Y2K) 25

CERT Conference ‘99 24 Final thoughts: READ (you can get a free subscription to almost any magazine. Use the web Think like a hacker, act like a CEO