Академический Документы
Профессиональный Документы
Культура Документы
Lecture 3
Week 3
Topics
Vulnerabilities
Secure Program
Malicious Code
Top 10 Web application vulnerabilities
Secure Programs
Secure Programs
Types of Flaws:
validation error
domain error
serialization and aliasing
inadequate identification and
authentication
boundary condition violation
other exploitable logic errors
Malicious
Malicious
Malicious
Malicious
Malicious Codes
unanticipated
damage
could be in form of :
modification/destruction
stolen data
unauthorized access
damage on system
or other forms not intended by users
Other Malicious
Need Host
Independent
Program
Trapdoors
Logic
Bombs
Trojan
Horses
Viruses
Bacteria
Worms
Virus
10
11
PopUp ads
Slow down your computer
Crash your computer
12
13
Viruses
Personal
Surround
Integrated
15
Original
Program, A
or
Virus, B
Original
Program, A
+
Virus, B
Original
Program, A
+
Virus, B
16
One
Another
Another
Memory
Other
Even
Types of Viruses
Parasitic Virus
Memory-resident Virus
Boot
Stealth Virus
Polymorphic Virus
19
Original
Worm, B
Program, A
Original Worm, B
Program, A
Worm, B
21
Worms
Characteristics
of a worm:
Worms
Worms
Protection against Worms
requires a combination of basic system security and good
network security
add-on tools:
configuration review tools
checksum-based change detection tools
intrusion detection tools
network security tools:
wrapper program : filter network connections
firewall system
The
Salami Attack
24
Causes of Trapdoors:
Programmer forgets to remove them.
Programmer intentionally leaves them in for testing.
Leaves them in intentionally for maintenance of the
finished product.
Virus Signatures
Virus
The
Usually
If
But
28
29
Might
The
30
Virus Phases
against viruses
detection tools
example : scanners, vulnerability monitors,
modification detection programs
identification tools
example : scanners
removal tools
example : disinfectors
Scanners
33
Input validation.
Do not use GET requests (URLs) for sensitive data or to perform value
transactions
errors from all layers are adequately checked and configured to prevent
error messages from being exploited by intruders
Encrypt Password
Check the old password when the user changes to a new password
Ensure the access control matrix is part of the business, architecture, and
design of the application
http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf
34
35
Risk Management
Touchpoints
Knowledge
36
Risk Management
37
Touchpoints
38
Knowledge catalog
Principles
Guidelines
Rules
Attack patterns
Vulnerabilities
Historical Risks
39
40
There
42
Summary
43