Improving Security through Software Dr Warren Toomey School of Computer Science Australian Defence Force Academy.

Slides:



Advertisements
Similar presentations
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Wireless.ubc.ca Balancing security and usability on the world’s largest Wi-Fi campus network Jonn Martell Wireless Project Manager, UBC
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Introduction To Windows NT ® Server And Internet Information Server.
Information Networking Security and Assurance Lab National Chung Cheng University Introduction to Software Security Jared 2004/03/17.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 2000 by Carnegie Mellon.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
IT:Network:Microsoft Applications
Introduction to Computer Administration System Administration
Internet Security In the 21st Century Presented by Daniel Mills.
Website Hardening HUIT IT Security | Sep
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Setting up a Grid-CERT Experiences of an academic CSIRT TERENA Networking Conference May, Lyngby, Denmark Klaus Möller DFN-CERT Services GmbH.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
Honeypot and Intrusion Detection System
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Open Source Software Bangladesh University of Business and Technology Nizar Saadi Dahir M.Sc. Computer Engineering Computer Center- Kufa University
Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!
Auditing Information Systems (AIS)
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
David Cheung, CECID/HKU 1 Open Source Software and It’s Impact to Technology Development Dr. David Wai-lok Cheung ( 張偉犖博士 ) Director Center for E-Commerce.
Chapter 2 Securing Network Server and User Workstations.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Security Advisories – Sources and examples Presented by Srujan Baddam.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CSCE 548 Secure Software Development Security Operations.
ORISE OAK RIDGE INSTITUTE FOR SCIENCE AND EDUCATION Travel Managers Meeting April 14, 2003.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
GVF CyberSecurity Task Force Rakesh Bharania Chair, GVF Security Task Force Network Consulting Engineer, Cisco Tactical Operations 2015 Update on Activities.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Writing Security Alerts tbird Last modified 2/25/2016 8:55 PM.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managed IT Services JND Consulting Group LLC
By: Joshua DeLong Computer Security and Privacy.
PRESENTED BY : Bhupendra Singh
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
보안 취약점 비교 Linux vs. Windows
Web Applications Security Cryptography 1
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Operating System Concepts
Cloud Computing for Wireless Networks
Presentation transcript:

Improving Security through Software Dr Warren Toomey School of Computer Science Australian Defence Force Academy

Introduction Software insecurity causes most system vulnerabilities 1998 Internet survey –85% of the 36 million systems examined –1% (450,000) systems had software holes New software holes found on a daily basis –35 Microsoft bulletins in last 12 months –22 from SGI, 14 from Sun, 10 from Cisco

Assumptions All software has bugs – “there’s always one more bug” Some bugs are security holes Software configuration causes holes Software use causes security holes Many attacks come from inside Moral: Audit & fix your software base

Audit Software In-House: Use Y2K audit to help find holes Use existing programmers’ knowledge Put your programmers on security courses Otherwise, get consultants to do audit Off the Shelf Software: not easy to audit Don't trust vendors' own opinion of security Find & use independent reports/surveys

Read Security Bulletins Many vendors put out security bulletins –Microsoft, Sun, Cisco, Netscape, SGI, HP... These announce newly found holes, their significance & how to fix them Also read bulletins/advisories from CERT, AUSCERT, FIRST Verify bulletins’ authenticity: PGP etc. Fix security holes quickly: day-zero attacks

Read Security Maillists Examples: Bugtraq, NT Bugtraq mail lists URLs: securityfocus.com, ntbugtraq.com Public arena for –Discussion of new vulnerabilities –Dissemination of detection/exploit code Both white-hats & hackers read these lists Hackers use this information for day-zero attacks

Read Security Maillists Not as trustworthy as vendor, CERT bulletins However, new holes are described here weeks before vendor bulletins Some individuals are trustworthy Some are unofficial representatives of software vendors

Reconfigure Software Configuration creates many security holes Consult software install/configure manuals for security recommendations Consult vendors, 3rd parties for security recommendations Use vulnerability detection software to audit configuration, monitor changes Keep good backups: you will need them when you are broken into

Open Source Software Consider using Open Source software for new/replacement software Distributed in source form –Thousands of people read the source –Hackers find weaknesses quickly –Good guys can fix the problem quickly –Fast understanding of new security attacks You can buy support for these products

Open Source Software In general, Open Source more trustworthy than proprietary software –The code you see is the code you get Ditto for published encryption techniques: DES, RSA, AES etc. Open Source very useful for server deployment, not quite ready for desktop –Apache, Perl, PGP, Gnu C, Bind, Sendmail, Linux, FreeBSD

Software for Security Encryption at application level: PGP, ssh, SSL, S/Key Encryption at network level: SKIP, VPN Intrusion Detection software: various Anti-virus software: various, for both desktop & server Configuration vulnerabilities: various Configuration change detection: various

Change Use of Software Software use also causes many holes –Opening of virus-infected programs, documents Make users aware of software security Encourage users to report issues, react positively. Encourage technical staff to report deficiencies, suggest improvements Send the message: security is important to us all

Conclusion Software will always be vulnerable to attack Intense effort by hackers to find new holes & exploit them Audit, find & fix holes in your existing software base Audit, find & fix holes in your software configuration Follow bulletins, mail lists to keep abreast of new holes

Conclusion Think security when replacing software, procuring new software Deploy software to enhance your security Encourage all to use software with security in mind