CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.

Slides:



Advertisements
Similar presentations
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
Advertisements

What is an operating system? Is it software?
MS Access.
CSCD 303 Essential Computer Security Fall 2010 Lecture 5 - Desktop Security Vulnerabilities Reading: Chapter Security Hole.
Professor J. JOHNSON, MSMIS.  History of Computers  Operating Systems  Microsoft Windows  Networking Concepts  Internet vs. WWW  Browsers 4/29/2015Prof.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Miles McQueen, Jason Wright, Lawrence Wellman Idaho National Laboratory and University of Idaho September, 2011 Banff Metrisec Are Vulnerability Disclosure.
Security and Open Source: the 2-Edged Sword Crispin Cowan, Ph.D WireX Communications, Inc wirex.com.
COMPUTER SYSTEMS OPERATING SYSTEMS AND SOFTWARE NEXT.
Upgrading Software CIT 1100 Chapter4.
Assignment Marking via Online Self Assess Margot Schuhmacher, Lecturer Higher Education Development Unit, Centre for Learning and Teaching Support, Monash.
Operating Systems CS101 – Autumn 2005 Wk04 - Lecture 1.
Advanced Security Center Overview Northern Illinois University.
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Server Operating Systems Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
IT:Network:Microsoft Applications
The Death of Windows XP End of the line for venerable operating system Dr. Jan Vanderpool
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
ABSTRACT Before the evolution of computers, all the details in a banking systems used to be maintained manually. This is not advisable because maintenance.
HWINTRO1 OPERATING INSTALLING AN OPERATING SYSTEM.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Technology in Focus: Computing Alternatives.
IDENTIFYING SECURITY ISSUES IN A HIGHER INSTITUTE CMS LAB SITE Panagiotis Loumpardias Konstantinos Chimos.
From Item To Information SIR Databases in BGU School of Medicine David de Leeuw Ben Gurion University of the Negev June 2001.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
Unit 1 – Digital Literacy – Computer Terms Mr. M. Goldberg, Martingrove C.I., 2011 Digital Literacy Review By Mr. M. Goldberg – Martingrove C.I. October,
PREVIOUS GNEWS. 2 Patches / 3 Vulns – 1 Critical Affecting Windows XP, Vista, 7, 2003, 2008 Other updates, MSRT, Defender Definitions, Junk Mail Filter.
September 2015 LCCU Meeting How can you manage the Adobe Flash security risk? How can you keep Flash and other software updated? We’ll answers members’
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Buffer Overflow Attack Proofing of Code Binary Gopal Gupta, Parag Doshi, R. Reghuramalingam, Doug Harris The University of Texas at Dallas.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Operating Systems Security
CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
XP Class Agenda – 09/05/2013 Answer questions about the course logistics for tutorials and assignments. Reminder about team declaration. Present concepts.
Previous Gnews. Patch Tuesday April – 8 Patches (5 high/critical), Windows, Excel, ISA, IE, HTTP Services MS thru MS May – 1 Patch (critical)
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Writing Security Alerts tbird Last modified 2/25/2016 8:55 PM.
Magic Bullets, Free Lunch, and other myths Ben Staab COSC5010 Computer Security.
Thobani Shaba COSC 101.  What is an Operating System  What is iOS?  History  Features  iOS Jailbreaking  Conclusion.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
EN Lecture Notes Spring 2016 ASSURANCE AND EVALUATION.
보안 취약점 비교 Linux vs. Windows
GNU and Linux.
ITC 4 ESO 3rd TERM Operating Systems YEAR
Systems Analysis and Design in a Changing World, Fifth Edition
Fundamentals of Information Systems, Sixth Edition
CSCE 548 Student Presentation By Manasa Suthram
Operating System & Application Software
Securing services in a unix-based environment
Unit 2 Computer Systems Operating Systems Windows MAC & Linux.
Popular Operating System Chapter 8
Securing services in a unix-based environment
Discussion about 'Shellshock' fixes--Ubuntu and OS X
Introduction to System Administration
Introduction to System Administration
Computer Software CS 107 Lecture 2 September 1, :53 PM.
Nessus Vulnerability Scanning
Booting Up 15-Nov-18 boot.ppt.
Chapter 6 System and Application Software
Lecture 2 - SQL Injection
Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Empowering Security Communities
Presentation transcript:

CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References

Overview Briefly, Overview of Linux Security OS Vulnerabilities Linux Windows Max OS X

National Vulnerability Database Classifies and organizes reported vulnerabilities for various software programs and systems Mitre has the contract to maintain this database You can search this database for all the vulnerabilities associated with a system

Evaluation: Windows Vs. Linux Vulnerabilities The United States Computer Emergency Readiness Team (CERT) uses its own set of metrics to evaluate severity of any given security flaw Query CERT vulnerabilities notes database for “Windows” and “Linux” keywords to examine metrics for 40 most recent reported vulnerabilities A number between 0 and 180 expresses final metric, where number 180 represents the most serious vulnerability The ranking is not linear – In other words, a vulnerability ranked 100 is not twice as serious as a vulnerability ranked at 50 CERT considers any vulnerability with a score of 40 or higher to be serious enough to be a candidate for a special CERT Advisory and US-CERT technical alert

CERT: Query Result for Keyword “Microsoft”

CERT: Query Result for Keyword “Microsoft” (continued)

CERT: Query Result for Keyword “Linux”

CERT: Query Result for Keyword “Linux” (continued)

CERT: Evaluation of Query Results for Microsoft and Linux CERT web search capabilities do not produce perfectly desirable results in terms of granularity or longevity – Especially True for Linux The “Linux” search results include a number of Oracle security vulnerabilities that are common to Linux, UNIX, and Windows – In Top 40 CERT results for “Microsoft”, Top entry containing the severity metric of 78 5 entries have a severity rating of 40 or greater – In Top 40 CERT results for Linux Top entry containing the severity metric of None other entry have a severity rating 27 or greater

Vulnerabilities Recent years, lots of comparisons – 2007 brought improved security with Windows Vista and Mac OS X Leopard – Compiled security flaws in Mac OS X and Windows XP and Vista and placed them side by side – Vulnerability statistics from third party vendor Secunia and broke them down by Windows XP flaws, Vista flaws, and Mac OS X flaws

Table of Flaws Windows vs. Mac Windows XP, Vista, and Mac OS X vulnerability stats for 2007 XP Vista XP + Vista Mac OS X Total extremely critical Total highly critical Total moderately critical Total less critical Total flaws Average flaws/month

Analysis of Data Apple had more than 5 times number of flaws per month than Windows XP and Vista in 2007 – Most of these flaws were serious – This seems to go against conventional wisdom Noteworthy... – Windows Vista showed fewer flaws than Windows XP, Windows Defender and Sidebar added 4 highly critical flaws to Vista that weren’t present in Windows XP

Update - Pwn2Own 2009 Want to guess the results of 2009? – Charlie Miller has done it again – 2nd consecutive year, security researcher hacked into a fully patched MacBook computer by exploiting a security vulnerability in Apple’s Safari browser – Miller launched his drive-by attack and claimed the $10,000 top prize. He also got to keep the MacBook machine – Miller said he came to the CanSecWest security conference with a plan to hack into Safari and had tested the exploit carefully to ensure “it worked the first time.” falls-in-seconds/2917 Current results beyond

Microsoft Vulnerabilities September 2009 Over 90% of the attacks recorded for Microsoft targeted the buffer overflow vulnerability described in the Microsoft Security Bulletin MS08-067

References The Register Security Report: Linux vs. Windows nux/#execsummary ty_showdown_mac_os_v Security vulnerability showdown, Mac vs. Linux vs. Ubuntu erability_showdown_mac_os_v IBM report: Vulnerabilities still going unpatched Mac versus Windows vulnerability stats for

The End