Security Design Concepts Target Course: Software Engineering, Software Design Version 2 July 20, 2018
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Operating Systems and Virtualisation Security Knowledge Area (Draft for Comment)
OPERATING SYSTEMS AND VIRTUALISATION SECURITY KNOWLEDGE AREA (DRAFT FOR COMMENT) AUTHOR: Herbert Bos – Vrije Universiteit Amsterdam EDITOR: Andrew Martin – Oxford University REVIEWERS: Chris Dalton – Hewlett Packard David Lie – University of Toronto Gernot Heiser – University of New South Wales Mathias Payer – École Polytechnique Fédérale de Lausanne © Crown Copyright, The National Cyber Security Centre 2019. Following wide community consultation with both academia and industry, 19 Knowledge Areas (KAs) have been identified to form the scope of the CyBOK (see diagram below). The Scope document provides an overview of these top-level KAs and the sub-topics that should be covered under each and can be found on the project website: https://www.cybok.org/. We are seeking comments within the scope of the individual KA; readers should note that important related subjects such as risk or human factors have their own knowledge areas. It should be noted that a fully-collated CyBOK document which includes issue 1.0 of all 19 Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas. Operating Systems and Virtualisation Security Herbert Bos Vrije Universiteit Amsterdam April 2019 INTRODUCTION In this knowledge area, we introduce the principles, primitives and practices for ensuring security at the operating system and hypervisor levels. We shall see that the challenges related to operating system security have evolved over the past few decades, even if the principles have stayed mostly the same. For instance, when few people had their own computers and most computing was done on multiuser (often mainframe-based) computer systems with limited connectivity, security was mostly focused on isolating users or classes of users from each other1. -
Malware Information
Malware Information Source: www.onguardonline.gov Malware Quick Facts Malware, short for "malicious software," includes viruses and spyware to steal personal information, send spam, and commit fraud. Criminals create appealing websites, desirable downloads, and compelling stories to lure you to links that will download malware – especially on computers that don't use adequate security software. But you can minimize the havoc that malware can wreak and reclaim your computer and electronic information. If you suspect malware is on your computer: • Stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. • Confirm that your security software is active and current. At a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. • Once your security software is up-to-date, run it to scan your computer for viruses and spyware, deleting anything the program identifies as a problem. • If you suspect your computer is still infected, you may want to run a second anti-virus or anti-spyware program – or call in professional help. • Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. Malware is short for "malicious software;" it includes viruses – programs that copy themselves without your permission – and spyware, programs installed without your consent to monitor or control your computer activity. Criminals are hard at work thinking up creative ways to get malware on your computer. They create appealing web sites, desirable downloads, and compelling stories to lure you to links that will download malware, especially on computers that don't use adequate security software. -
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)?
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)? Hugo Krawczyk?? Abstract. We study the question of how to generically compose sym- metric encryption and authentication when building \secure channels" for the protection of communications over insecure networks. We show that any secure channels protocol designed to work with any combina- tion of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method. We demonstrate this by showing that the other common methods of composing encryp- tion and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show an example of an en- cryption function that provides (Shannon's) perfect secrecy but when combined with any MAC function under the authenticate-then-encrypt method yields a totally insecure protocol (for example, ¯nding passwords or credit card numbers transmitted under the protection of such protocol becomes an easy task for an active attacker). The same applies to the encrypt-and-authenticate method used in SSH. On the positive side we show that the authenticate-then-encrypt method is secure if the encryption method in use is either CBC mode (with an underlying secure block cipher) or a stream cipher (that xor the data with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current practical implementations of the protocol that use the above modes of encryption are safe. 1 Introduction The most widespread application of cryptography in the Internet these days is for implementing a secure channel between two end points and then exchanging information over that channel. -
Opentext Product Security Assurance Program
The Information Company ™ Product Security Assurance Program Contents Objective 03 Scope 03 Sources 03 Introduction 03 Concept and design 04 Development 05 Testing and quality assurance 07 Maintain and support 09 Partnership and responsibility 10 Privavy and Security Policy 11 Product Security Assurance Program 2/11 Objective The goals of the OpenText Product Security Assurance Program (PSAP) are to help ensure that all products, solutions, and services are designed, developed, and maintained with security in mind, and to provide OpenText customers with the assurance that their important assets and information are protected at all times. This document provides a general, public overview of the key aspects and components of the PSAP program. Scope The scope of the PSAP includes all software solutions designed and developed by OpenText and its subsidiaries. All OpenText employees are responsible to uphold and participate in this program. Sources The source of this overview document is the PSAP Standard Operating Procedure (SOP). This SOP is highly confidential in nature, for internal OpenText consumption only. This overview document represents the aspects that are able to be shared with OpenText customers and partners. Introduction OpenText is committed to the confidentiality, integrity, and availability of its customer information. OpenText believes that the foundation of a highly secure system is that the security is built in to the software from the initial stages of its concept, design, development, deployment, and beyond. In this respect, -
Online Payment Fraud Prevention Using Cryptographic Algorithm TDES
S. Aishwarya et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 317-323 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.317 – 323 RESEARCH ARTICLE Online Payment Fraud Prevention Using Cryptographic Algorithm TDES S. AISHWARYA1 K.DEVIKA RANI DHIVYA*2 III MSc (SS), Assistant Professor, Department of CA & SS, Department of CA & SS, Sri Krishna Arts and Science College, Sri Krishna Arts and Science College, Coimbatore, Tamil Nadu, Coimbatore, Tamil Nadu, India India ABSTRACT: Credit card is a small plastic card issued by a bank, building society, etc., allowing the holder to purchase goods or services on credit. Debit card is a card allowing the holder to transfer money electronically from their bank account when making a purchase. The use of credit cards and debit cards are increasing day by day. People are relying more on both cards nowadays than in the previous days. As credit cards and debit cards becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. In this project the process of Cryptography has been followed, it is one of the most important security technologies which used to secure the data transmission and the data itself. -
Ransomware Is Here: What You Can Do About It?
WHITEPAPER Ransomware is Here: What you can do about it? Overview Over the last few years, ransomware has emerged as one of the most devastating and costly attacks in the hacker arsenal. Cyber thieves are increasingly using this form of attack to target individuals, corporate entities and public sector organizations alike by holding your system or files for ransom. Unlike other forms of cyber theft that often involve stolen financial or healthcare information, ransomware cuts out the middleman. In cases where an attacker steals health or financial documents, they must sell them on to third parties to make money. As far as ransomware is concerned, the money comes directly from the victim. Ransomware is a quickly growing threat vector. According to the FBI’s Internet Crime Complaint center (IC3), infected users made complaints about ransomware 2,453 times in 2015—nearly double the figure for 2014. What’s more, these figures most likely represent only the tip of the iceberg, as many users pay their ransom without making a report to the authorities. A recent survey conducted by a Cyber Security Research Center at the University of Kent found that over 40% of those infected with CryptoLocker actually agreed to pay the ransom demanded, which is a big incentive for hackers to target more systems. Lastly, hackers are rapidly iterating both malware and distribution techniques. In early Q2 of 2016, a new variant of ransomware, known as CryptXXX, emerged on the scene. This program is packed in such a way that users and antivirus software may initially confuse it for a Windows DLL file. -
Security, Encryption, and Certificates FAQ
Security, Encryption, and Certificates FAQ Overview In Security Center 5.4, several new capabilities will be added that further strengthen the security of the platform itself, as well as the privacy of data. The aim is to prevent unauthorized access to stored and transmitted messages and data, as well as prevent attacks through the use of stronger encryption and authentication mechanisms. With growing demand for privacy, new capabilities in Security Center 5.4 will strengthen Genetec’s position and overall value proposition. This FAQ addresses some of the most common questions in relation to the new capabilities of Security Center: Encryption, Authentication, and Digital Certificates. These concepts are first described in generic terms; the FAQ then outlines how these new measures are used within Security Center 5.4. Encryption vs. Authentication vs. Authorization What is the difference between encryption, authentication, and authorization? Encryption is used to encrypt data so that only authorized users can see it. Authentication determines whether an entity is who they claim to be, eg. in the case of an individual, it is usually based on a username/password combination. Authentication does not actually say anything about what someone is authorized to do or has the right to do. o Client-side authentication uses username/password combinations, tokens (dual authentication), and other techniques. o Server-side authentication uses certificates to identify trusted third parties. Authorization is the function of specifying the rights, eg. defining the access rights someone has over a set of recourses such as a private data, computing resources, or an application. When users log into a Security Center system, what they are allowed or authorized to do depends on the set of privileges assigned to them by administrators. -
Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. -
E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It Is a Process of Presenting and Detecting Unauthorized Use of Your Computer
36 E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It is a process of presenting and detecting unauthorized use of your computer. Prevention is measures help you stop unauthorized users (hackers) System often they want to gain control of your computer so they can use it to launch attack on other computer systems. Need for computer security Threats & Count measures Introduction to Cryptography Authentication and integrity Key Management Security in Practice – secure email & SMTP User Identification Trusted Computer System CMW SECMAN standards. The Importance of computer security: A computer security its very important, primarily to keep your information protected. Its also important for your computer overall health, helping to prevent various and malware and allowing program to run more smoothly. Computer Security – Why? Information is a strategic resource. A Significant portion of organizational budget is spent on managing information. Have several security related objectives. Threats to information security. The Security addressed here to general areas: Secure file / information transfers, including secure transactions. Security of information’s as stored on Internet – connected hosts. Secure enterprise networks, when used to support web commerce. Protecting Resources: The term computer and network security refers in a board sense to confidence that information and services available on a network cannot be accessed by unauthorized users. Security implies safety, including assurance to data integrity, freedom from unauthorized access, freedom snooping or wiretapping and freedom from distribution of service. Reasons for information security The requirements of information’s security in an organization have undergone two major changes in the last several decades. Types of Risks As the number of peoples utilizing the internet increases, the risks of security violations increases, with it. -
Secure by Design, Secure by Default: Requirements and Guidance
Biometrics and Surveillance Camera Commissioner Secure by Design, Secure by Default Video Surveillance Products Introduction This guidance is for any organisation manufacturing Video Surveillance Systems (VSS), or manufacturing or assembling components intended to be utilised as part of a VSS. It is intended to layout the Biometrics and Surveillance Camera Commissioners (BSCC) minimum requirements to ensure such systems are designed and manufactured in a manner that assures they are Secure by Design. It also contains certain component requirements that will ensure a configuration that is Secure by Default when the component is shipped, thereby making it more likely that the system will be installed and left in a secure state. This guidance forms part of a wider suite of documentation being developed as part of the SCC Strategy, in support of the SCC Code of Practice. Background and Context The nature of the Internet means that connected devices can be subjected to a cyber attack from anywhere in the world. Widespread attacks on connected products is a current and real threat, and a number of highly publicised attacks have already occurred. The Mirai malware targeted devices such as internet-enabled cameras (IP cameras). Mirai was successful because it exploited the use of common default credentials (such as a username and password being set by the manufacturer as ‘admin’) and poor security configuration of devices. Ultimately, this facilitated attacks on a range of commercial and social media services and included an outage of streaming services such as Netflix. An evolution of Mirai, called Reaper, has also been discovered. Reaper used publicly and easily available exploits that remained unfixed (patched) and highlighted the problem around non patching of known security vulnerabilities, allowing attackers to utilise them to cause harm. -
FANS: Fuzzing Android Native System Services Via Automated Interface Analysis
FANS: Fuzzing Android Native System Services via Automated Interface Analysis Baozheng Liu1;2,∗ Chao Zhang1;2 , Guang Gong3, Yishun Zeng1;2, Haifeng Ruan4, Jianwei Zhuge1;2 1Institute of Network Science and Cyberspace, Tsinghua University [email protected] 2Beijing National Research Center for Information Science and Technology [email protected] 3Alpha Lab, 360 Internet Security Center 4Department of Computer Science and Technology, Tsinghua University Abstract 1 Introduction Android has become the most popular mobile operating sys- Android native system services provide essential supports and tem, taking over 85% markets according to International Data fundamental functionalities for user apps. Finding vulnerabil- Corporation1. The most fundamental functions of Android ities in them is crucial for Android security. Fuzzing is one of are provided by Android system services, e.g., the camera the most popular vulnerability discovery solutions, yet faces service. Until October 2019, hundreds of vulnerabilities re- several challenges when applied to Android native system lated to Android system services had been reported to Google, services. First, such services are invoked via a special inter- revealing that Android system services are still vulnerable and process communication (IPC) mechanism, namely binder, attractive for attackers. A large portion of these vulnerabilities via service-specific interfaces. Thus, the fuzzer has to recog- reside in native system services, i.e., those mainly written in nize all interfaces and generate interface-specific test cases C++. Vulnerabilities in Android native system services could automatically. Second, effective test cases should satisfy the allow remote attackers to compromise the Android system, interface model of each interface. Third, the test cases should e.g., performing privilege escalation, by means of launching also satisfy the semantic requirements, including variable IPC requests with crafted inputs from third-party applications. -
A United States Perspective on the Ethical and Legal Issues of Spyware Janice C
A United States Perspective on the Ethical and Legal Issues of Spyware Janice C. Sipior Burke T. Ward Georgina R. Roselli College of Commerce & Finance College of Commerce & Finance College of Commerce & Finance Villanova University Villanova University Villanova University Villanova, PA 19085 USA Villanova, PA 19085 USA Villanova, PA 19085 USA +1-610-519-4347 +1-610-519-4375 +1-610-519-4347 [email protected] [email protected] [email protected] ABSTRACT While information concerning user characteristics and Spyware is regarded as the largest threat to internet users since preferences may be used beneficially to improve product and spam, yet most users do not even know spyware is on their service offerings, the surreptitious nature of its acquisition personal computers. Ethical and legal concerns associated with coupled with no indication of its intended use may raise ethical spyware call for a response. A balance must be found between and legal issues regarding its acceptability. Ethically, spyware legitimate interests of spyware installers, who have obtained installers have an obligation to users to obtain informed consent informed consent of users who accept advertisements or other for the collection and use of personal information. However, in marketing devices, and users who are unwitting targets. the commercially competitive environment of electronic Currently, there is not widespread awareness or understanding commerce, information gathering may be undertaken without of the existence of spyware, its effects, and what remedies are users’ knowledge or permission. available to defend against it. For industry sectors subject to For industry sectors which are subject to data collection laws, data collection and protection laws, spyware results in “spyware can be an unwitting avenue to noncompliance” [9].