Legitimate Vulnerability Markets By: Jeff Wheeler.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Chapter 28 Promotion and Place Name 12 SAM.
Saving and Investing Tools Carl Johnson Financial Literacy Jenks High School.
1 James Houghton Michael Siegel Advancing Cybersecurity Using System Dynamics Simulation Modeling For Analyzing & Disrupting Cybercrime Ecosystem & Vulnerability.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
ISO How to leverage Dick Hacking Cornerstones of Trust 2014.
Externalities and Property Rights
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 2 SOCIALLY RESPONSIVE MARKETING 2-1The Impact of Marketing 2-2Criticisms of Marketing 2-3Increasing.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
 Creatively joining your company’s capabilities with your customer’s needs.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
“Business applications of E- commerce” Academic Year 2015.
Key Findings : Paying for Self-Management Supports as Part of Integrated Community Health Care Systems July, 2012.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Website Hardening HUIT IT Security | Sep
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
NGAC Interagency Data Sharing and Collaboration Spotlight Session: Best Practices and Lessons Learned Robert F. Austin, PhD, GISP Washington, DC March.
Cooperative Purchasing Who’s Looking Out for Your Interests? Tony Des Chenes, Director Commodities Division Purchasing Operations.
A Politics of Vulnerability Reporting Black Hat Briefings, Europe 2001 Scott Blake Director of Security Strategy BindView Corporation/RAZOR Research.
Information Security Issues at Casinos and eGaming
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
PROCESSING TARS MAINTENANCE OF WEB SITE Prepared by: Sandra Herrera Tamara Mendoza Alejandra Molinar.
Test Organization and Management
10 Two-sided Platforms 1 Aaron Schiff ECON
Information Systems Security Computer System Life Cycle Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
April 9,  Employers  IS Careers  Business Support  Key Trends  Manage your career  Questions 2.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Expense Reduction: the timing has never been better! Lycia Rettig, Director Expense Reduction Analysts
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Introduction to Computer Ethics
Chapter 21 MARKETING - SOCIALLY RESPONSIBLE 1The Impact of Marketing 2Criticisms of Marketing 3Increasing Social Responsibility.
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 2 SOCIALLY RESPONSIVE MARKETING 2-1The Impact of Marketing 2-2Criticisms of Marketing 2-3Increasing.
Topic 6 - A Designing the Compensation Program. 9. Centralization Vs. Decentralization of Pay Decisions 8. Open Vs. Secret Pay 7. Monetary Vs. Non-monetary.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
I Information Systems Technology Ross Malaga 4 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 4-1 DATABASE.
Marketing Management 30 May Marketing Channels Delivering Customer Value.
MARKETING. Standards… BCS-BE-36: The student demonstrates understanding of the concept of marketing and its importance to business ownership. BCS-BE-36:
From « Guidelines on the applicability of Article 81 of the EC Treaty to horizontal cooperation Agreements » The purpose of these guidelines is to provide.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 19: Monetary Policy and the Federal Reserve 1.Describe.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
WEIS Economic Analysis of Incentives to Disclose Software Vulnerabilities Dmitri Nizovtsev Washburn University Marie Thursby Georgia Institute of.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Unit (7) Why businesses make decisions? The decision that they make might include. - what to produces, where to locate the premises, what method of production.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
Elite Events Jason White. Cost focus broad Our goal is to have a low price while having competitive quality, as an event planning business success is.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Phoenix Technology Solutions Products At the highest level, the products offered by Phoenix Technology Solutions are: IT Project/Programme Management.
Marketing Indicator 1.01 Understand marketing’s role and function in business to facilitate economic exchanges with customers.
Marketing Indicator 1.01 Understand marketing’s role and function in business to facilitate economic exchanges with customers.
Is finding security holes a good idea? Presented By: Jeff Wheeler CSC 682.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Marketing Indicator 1.01 Understand marketing’s role and function in business to facilitate economic exchanges with customers.
Chapter 18 Consumer Behavior and Pricing Strategy
Information Security Crisis Management Daryl Goodwin.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
Marketing Indicator 1.01 Understand marketing’s role and function in business to facilitate economic exchanges with customers.
Actuarial Review of Emerging Risks
CompTIA Security+ Study Guide (SY0-401)
Organization and structure
Firewalls.
Consumer Benefits of Web Marketing
Basic Concepts in Data Management
Managed Content Services
Presentation transcript:

Legitimate Vulnerability Markets By: Jeff Wheeler

Introduction Software Vulnerability Markets –Why do they exist? Vendors create vulnerable software –Rush to market –Inadequate testing To make money –On the Black Market –In Legitimate Markets –Who participates? White hat parties Black hat parties Vendors

Introduction –Who facilitates the transactions? Government, Open Market, Software Vendors –How can these markets operate? Auction based Computer Emergency Response Team(CERT) Consortium Based Federally Funded –What are the incentives to or not to participate in these markets? Non-disclosure Partial-disclosure Full-disclosure

A simple Software Lifecycle

Why do Vulnerability Markets Exist? Rush to market –Software Vendors agendas are not necessarily in our best interest Increasing Software Complexity Software Testing only works so well Software will have bugs the developer does not find People are willing to pay for bug information –White Hat –Black Hat

White Hat versus Black Hat White Hat Community –Exist for the greater good of all or specific groups –Does not use vulnerability information to harm others –In general, attempt to bring about more secure software Black Hat Community –Use vulnerabilities to gain access or harm others –In general, breaking one or many laws Liberal Democrats

Bug Lifecycle

Who Facilitates these Transactions? Government Motivation –National Security Prevent Attacks that could leak government secrets Gain access to foreign networks for preventative information retrieval Cyber Warfare –Espionage, propaganda, DOS –Social Welfare

Who Facilitates these Transactions? Open Market –Profit motivation –Product is unique vulnerability information Are not necessarily disclosed to the vendor –Vendor disclosure is not always the best option This information is valuable to companies with secure infrastructure needs –Capable of offering the most compensation for information Creates a larger community of software testers

Who Facilitates these Transactions? Software Vendor –Motivations Looks Bad when other markets exist that do better than the vendor at securing their own product –Problems Do not usually offer money –It is the right thing to do to submit bugs to the vendor to fix –They have not done it in the past –It will create a battleground for vulnerability information between them and competition –Make them subject to blackmail

How can these markets operate? Auction Like –Benefit Increases participation –Fair market price –Compensation increases based on severity of bug –A well setup market High initial bug value Combine monetary and reputation reward –Monetary reward less if found in forums or black market Guaranteed minimum amount of money available to market Guaranteed minimum amount of time the market will be open for participation

How can these markets operate? Computer Emergency Response Team Model –Collection - We collect vulnerability reports in two ways: monitoring public sources of vulnerability information and processing reports sent directly to us. After receiving reports, we perform an initial surface analysis to eliminate duplicates and false alarms, and then catalog the reports in our database. –Analysis - Once the vulnerabilities are cataloged, we determine general severity, considering factors such as the number of affected systems, impact, and attack scenarios. Based on severity and other attributes, we select vulnerabilities for further analysis. Our analysis includes background research, runtime and static analysis, reproduction in our test facilities, and consultation with vendors and other experts. –Coordination - When handling direct reports, we work privately with vendors to address vulnerabilities before widespread public disclosure. We have established, secure communication channels with hundreds of technology producers, both directly and through relationships with computer security incident response teams (CSIRTs) all over the world. We have years of experience successfully coordinating responses to vulnerabilities that affect multiple vendors.computer security incident response teams (CSIRTs) –Disclosure - After coordinating with vendors, we take steps to notify critical audiences and the public about the vulnerabilities. To the best of our ability, we produce accurate, objective technical information focused on solutions and mitigation techniques. Targeting a technical audience (administrators and others who are responsible for securing systems), we provide sufficient information to make an informed decision about risk.

How can these markets operate? Consortium Model –Group of organizations gather together funds to cover expenses involved in the gathering of vulnerability information –Not for profit –Only helps those within the consortiums members, unless they disclose

How can these markets operate? Federally Funded –Government supplies funds for the purchase of vulnerability information –No direct charge to users –Helps largest amount of users Organizations still require the other models –Makes the public feel safe –Allows for easier government eavesdropping if they operate

Incentives and disincentives for Disclosure Non-Disclosure –Always benefits aware black hat parties –Individual white hat discovery and disclosure would cause many systems to become vulnerable during patching Partial Disclosure (vendor disclosure) –Vendor may determine it will not be found again, so why patch? –After patch release, many systems will remain un-patched and vulnerable

Incentives and disincentives for Disclosure Full-Disclosure –Ensures black hat and white hat community is aware of vulnerability –Gives everyone a fair shot at protecting themselves –Vendor patch will be released sooner, assumption –Leads to negative software vendor image, possibly leading to more time testing?