Infosecurity 2008 Threat Analysis.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
427_FM.qxd 9/17/07 12:31 PM Page iii Infosecurity 2008 Threat Analysis Your One-Stop Reference Containing the Most Read Topics in the Infosecurity Security Library Protect Your Enterprise from Tomorrow’s Threats Today Botnets Cross Site Scripting Attacks Physical and Logical Security Convergence PCI Compliance Asterisk and VoIP Hacking Social Engineering FOREWORD BY RICHARD FORD INFOSECURITY MAGAZINE BOARD MEMBER 427_FM.qxd 9/17/07 12:31 PM Page iv Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Infosecurity 2008 Threat Analysis Copyright © 2008 by Elsevier, Inc.All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN-13: 978-1-59749-224-9 Publisher:Amorette Pedersen Page Layout and Art: Patricia Lupien Cover Designer: Michael Kavish Indexer: Edmund J. Rush For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, at Syngress Publishing; email [email protected]. 427_FM.qxd 9/17/07 12:31 PM Page v Acknowledgments Syngress would like to acknowledge the following people for their kindness and sup- port in making this book possible. Greg Valero and the team at Infosecurity magazine for their willingness to try and work with the “new kids on the block.” Good things will happen because of Greg’s entrepreneurial approach to publishing and sales. Steve Mathieson at Infosecurity for providing an additional platform for Syngress/Elsevier authors and for helping us pull together this book. Richard Ford for a great foreword and for getting it to us despite an obviously hectic schedule! v 427_FM.qxd 9/17/07 12:31 PM Page vi 427_FM.qxd 9/17/07 12:31 PM Page vii Foreword Dr. Richard Ford graduated from the University of Oxford in 1992 with a D.Phil. in Quantum Physics. Since that time, he has worked extensively in the area of computer security and malicious mobile code prevention. Previous projects include work on the Computer Virus Immune System at IBM Research, and development of the world’s largest web hosting system whilst Director of Engineering for Verio. Ford is currently an Associate Professor at Florida Institute of Technology, and director of the University’s Center for Security Science. His research interests include Biologically- inspired Security Solutions, Rootkit detection, Behaviorally-based Worm Prevention, Development of Meaningful Security Metrics and Computer Forensics. Ford is currently Executive Editor of Reed-Elsevier’s Computers & Security,Virus Bulletin and co-editor of a column in IEEE Security & Privacy with Michael Howard. Dr. Ford lives with his wife Sarah in Florida. Authors Champ Clark III (Da Beave) has been involved in the technology industry for 15 years. Champ is currently employed with Vistech Communications, Inc. providing network support and applications develop- ment. Champ is also employed with Softwink, Inc. which specialized in security monitoring for the financial industry. Champ is one of the founding members of “Telephreak”, an Asterisk hobbyist group, and the Deathrow OpenVMS cluster. When he’s not ripping out code or writing papers, he enjoys playing music and traveling. vii 427_FM.qxd 9/17/07 12:31 PM Page viii Larry Chaffin is the CEO/Chairman of Pluto Networks, a worldwide network consulting company specializing in VoIP,WLAN, and security.An accomplished author, he contributed to Syngress’s Managing Cisco Secure Networks (ISBN: 1931836566); Skype Me! (ISBN: 1597490326); Practical VoIP Security (ISBN: 1597490601); Configuring Check Point NGX VPN- 1/FireWall-1 (ISBN: 1597490318); Configuring Juniper Networks NetScreen and SSG Firewalls (ISBN: 1597491187); and Essential Computer Security: Everyone’s Guide to Email, Internet, and Wireless Security (ISBN: 1597491144). He is the author of Building a VoIP Network with Nortel’s MS5100 (ISBN: 1597490784), and he has coauthored or ghostwritten 11 other technology books on VoIP,WLAN, security, and optical technologies. Larry has over 29 vendor certifications from companies such as Nortel, Cisco Avaya, Juniper, PMI, isc2, Microsoft, IBM, VMware, and HP.Larry has been a principal architect designing VoIP,security,WLAN, and optical net- works in 22 countries for many Fortune 100 companies. He is viewed by his peers as one of the most well respected experts in the field of VoIP and security in the world. Larry has spent countless hours teaching and con- ducting seminars/workshops around the world in the field of voice/VoIP, security, and wireless networks. Larry is currently working on a follow-up to Building a VoIP Network with Nortel’s MCS 5100 as well as new books on Cisco VoIP networks, practical VoIP case studies, and WAN acceleration with Riverbed. Dr. Anton Chuvakin, GCIA, GCIH, GCFA (http://www.chuvakin.org) is a recognized security expert and book author. In his current role as a Director of Product Management with LogLogic, a log management and intelligence company, he is involved with defining and executing on a product vision and strategy, driving the product roadmap, conducting research as well as assisting key customers with their LogLogic implementa- tions. He was previously a Chief Security Strategist with a security infor- mation management company.A frequent conference speaker, he also represents the company at various security meetings and standards organiza- tions. He is an author of a book “Security Warrior” and a contributor to Know Your Enemy II, Information Security Management Handbook, and Hacker’s Challenge 3. Anton also published numerous papers on a broad range of security subjects. In his spare time he maintains his security portal viii 427_FM.qxd 9/17/07 12:31 PM Page ix http://www.info-secure.org and several blogs.Aton would like to thank Jason Chan for his help reviewing my chapters’ contents. Finally,Anton would like to dedicate his book chapters to his lovely wife, Olga. Scott Paladino (CISSP) is a security architect with EDS (www.eds.com), a leading global technology services company. He is the Engineering Organization Leader at EDS supporting identity, access, and other security solutions across a variety of industries. Scott resides in metro Detroit with his wife Linda and his two daughters, to whom he owes pretty much everything. Dan Dunkel brings over 22 years of successful sales, management, and executive experience in the information technology industry to a con- sulting practice focused on the emerging field of security convergence. His background includes domestic and international responsibilities for direct sales organizations, value added reseller channels, and OEM contracts. His product knowledge spans enterprise software, server architectures, and networking technologies. Dan’s employment history includes senior roles in pre-IPO ventures, mid cap IT manufacturers, and Fortune 50 organizations. His firm, New Era Associates, is a privately held consultancy specializing in sales strategy and business partner development between IT and physical security vendors and integrators. NEA client’s range from Fortune 500 enterprises to privately funded and venture backed start-ups.All share a common interest in collaborating on integrated security solutions deployed within the framework of an enterprise policy.The goal is to accelerate secu- rity deployments to defend organizations against both traditional business risk and new global threats. Mr. Dunkel is a frequent speaker at security trade shows and to industry groups worldwide. He writes a twice-monthly column for Today’s System Integrator, (TSI) an online publication of Security Magazine and BNP Publishing. ix 427_FM.qxd 9/17/07 12:31 PM Page x Seth Fogie is the Vice President of Dallas-based Airscanner Corporation where he oversees the research & development of security products for mobile platforms. Seth has co-authored several books, such as Maximum Wireless Security,Aggressive Network Self Defense, Security Warrior, and even contributed to PSP Hacks. Seth also writes articles for various online resources, including Pearson Education’s InformIT.com where he is acting co-host for their security section. In addition, and as time permits, Seth provides training on wireless and web application security and speaks at IT and security related conferences and seminars, such as Blackhat, Defcon, and RSA.