Beruflich Dokumente
Kultur Dokumente
Vocabulary: Incident
Vocabulary: Threat
Vocabulary: Vulnerability
Flaw in a system that could allow a threat to violate the security policy
Can be a result of oversight or architecture
Vocabulary: Exploit
Vocabulary: Malware
Software that does bad stuff Malware include virus and worm code Includes software designed to modify legitimate systems to:
What is Security?
Security Concepts
Authentication
Users are who they claim to be, or at least can present credentials Data has not been altered and remains true to its original form The system can track what activity, data and users
Copyright Justin C. Klein Keane
Authenticity
Audit
Confidentiality
Access
Security Lifecycle
0 day
0 day is a vulnerability for which there is no patch available If 0 day cannot be predicted, how can we defend against it?
Defense in depth is often the only defense against 0 day When evaluating security you should assume 0 day
Copyright Justin C. Klein Keane
Configuration problems:
Default or weak credentials Improper trust model Etc. Fundamentally insecure design Software functions exactly as designed but the result is an unintended vulnerability
Logic flaws
Vulnerability Synergy
Even if highest risk bugs are all patched, a combination of low risk bugs could lead to compromise
Sisyphean Task
The security lifecycle, also known as the security hamster wheel of pain EVERY step is critical Detection is dependent on observation and reporting Logs are some of the best places to do detection More on each step later
Copyright Justin C. Klein Keane
The protect/detect/react cycle often requires an incident to move from detect/react to better protection It is important to keep the cycle moving independently of a security incident
Collecting metrics is key to making informed decisions Start with security first...
Copyright Justin C. Klein Keane
Secure Design
Threat modeling
Applications should protect against unexpected actions This includes good exception handling
Penetration Testing
Black box
Penetration testing Some level of access and documentation available Full code review, often combined with other testing tools
Copyright Justin C. Klein Keane
Gray box
White box
Using Automation
Demonstration of exploit
List of suggested mitigation and work around strategies
Resource Allocation
Risk Calculations
Likelihood can never actually be measured because it is within the attackers control
How can you quantify what you don't know?
Home user doesn't protect their machine because they have no data of value
Risk = medium likelihood x low impact
Attacker can use webcam Attacker can use mic to record conversations Attacker can use connection to compromise wireless router to allow anonymous wireless
Copyright Justin C. Klein Keane
Many risk calculations fail because the assessor measures risk based on:
Without understanding what an attacker is after there is no effective way to protect resources
Industry best practice may provide a guide
Moving Forward