Академический Документы
Профессиональный Документы
Культура Документы
ISI trademark Diamonds Certified Professionals Brands China made, Nokia, HTC Software?
Operating Systems Websites Application Software etc.
2
WEBSITE: www.thefrenchybee.com STATUS : McAfee Secure CERTIFICATION 13-JUL-2009 This site is tested and certified daily to pass the McAfee Secure Security Scan. To help address concerns about possible hacker access to your confidential data, and the safety of visiting this site, the "live" McAfee Secure mark appears only when this site passes the daily McAfee Secure tests.
Against
Software
should not break down as enormous investment on part of developer and users are at stake, so proper tests should b performed to check the reliability of software The software reliability improves during testing as bugs are found and removed. Once the software is released, its reliability is xed, as long as the operating environment remains the same, and no modifying patches are applied.
vulnerability is defined as a defect which enables an attacker to bypass security measures. The databases for the vulnerabilities are maintained by organizations such as National Vulnerabilities Database [2], MITRE Corporation [3], Security Focus [4] and individual software developers.
6
Input
Validation Error (IVE) (Boundary condition error (BCE), Buffer overflow (BOF)) Access Validation Error (AVE): Exceptional Condition Error Handling (ECHE) Environmental Error (EE) Configuration Error (CE) . Race Condition Error (RC) Design Error (DE)
7
Network
Security Testing
about the integrity of an organization's networks and associated systems through testing and verification of network-related security controls on a regular basis.
Complex systems Large volumes of code Complex internal interactions Interoperability with external
Uncover
design, implementation and operational flaws that could allow the violation of security policy Determine the adequacy of security mechanisms, assurances and other properties to enforce the security policy Assess the degree of consistency between the system documentation and its implementation.
10
11
12
Network scanning (NMAP) Vulnerability scanning (NESSUS, Retina) Password cracking (john the ripper, LC5) Log review Integrity checkers (Tripwire, LANGuard) Virus detection War dialing Penetration testing
13
Check for unauthorized hosts connected to the organizations network, Identify vulnerable services, Identify deviations from the allowed services defined in the organizations security policy, Prepare for penetration testing, Assist in the configuration of the intrusion detection system (IDS), and Collect forensics evidence. Investigate and disconnect unauthorized hosts, Disable or remove unnecessary and vulnerable services, Modify vulnerable hosts to restrict access to vulnerable services to a limited number of required hosts (e.g., host level firewall or TCP wrappers), and Modify enterprise firewalls to restrict outside access to known vulnerable services.
14
Identifying active hosts on network Identifying active and vulnerable services (ports) on hosts. Identifying applications and banner grabbing. Identifying operating systems. Identifying vulnerabilities associated with discovered operating systems and applications. Identifying wrongly configured settings. Testing compliance with host application usage/security policies. Establishing a foundation for penetration testing. Upgrade or patch vulnerable systems to mitigate identified vulnerabilities as appropriate. Deploy mitigating measures (technical or procedural) if the system cannot be immediately patched (e.g., operating system upgrade will make the application running on top of the operating system inoperable), in order to minimize the probability of this system being compromised. Improve configuration management program and procedures to ensure that systems are upgraded routinely. Assign a staff member to monitor vulnerability alerts and mailing lists, examine their applicability to the organization's environment and initiate appropriate system changes. Modify the organization's security policies, architecture, or other documentation to ensure that security practices include timely system updates and upgrades.
15
Penetration
testing is security testing in which evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation. The purpose of penetration testing is to identify methods of gaining access to a system by using common tools and techniques used by attackers. Two types of penetration testing are commonly referred to as Blue Teaming and Red Teaming.
16
Additional Discovery
Planning
Discovery
Attack
Reporting
17
Domain Name System (DNS) interrogation Search of the target organizations web server(s) for information Search of the organizations Lightweight Directory Access Protocol server(s) (LDAP) for information Packet capture (generally only during internal tests) NetBIOS enumeration (generally only during internal tests) Network Information System ([NIS] generally only during internal tests) Banner grabbing
18
Discovery Phase
Gaining Access
Escalating Privilege
System Browsing
19
Buffer Overflows Symbolic Links File Descriptor attacks Race Conditions File and Directory Permissions Trojans Social Engineering
20
Analyze
Design
Code
Unit testing No Yes Integration and acceptance tests Integration and acceptance
Security Tests
21
Analyze
Design
No Yes
Security Tests
22
US
Center(NCSC)
DIT,
Certification (STQC)
National
Security
mechanisms to store and manage sensitive information Accounting software Ability to handle sensitive information of different lives
24
Gemini Trusted Network Processor, Honeywell SCOMP Getronics Wang Federal XTS-300 Honeywell MULTICS ,Trusted Xenix HP UX BLS, Cray Research trusted Unicos 8.0 Windows NT, IBM AS/400, Novell Netware Earlier versions of UNIX
25
C1
All users will be at same security level as in the
C2
B1
Labeled security protection Compulsory security labeling of objects Auditing of all labeled objects Enhanced protection of OS
26
B2
B3
Structured Protection System Hierarchical Device Labels Improved Security Testing Updates, patch analysis
A1
Security Domains Based on Formal TCB models Minimum implementation flaws Verified Designs Theoretical Principles formal methods Proof of integrity
27
Numerical grade from EAL 1- 7 For an IT product or system (since 1999) www.niap-ccevs.org National Information Assurance Partnership (NIAP) NIAP Common Criteria Evaluation and Validation Scheme for IT Security Common Criteria security evaluation Increasing assurance level reflect higher confidence that systems principal security features are reliably implemented Does system meet the requirements as in Protection Profile
28
document used as part of the certification process according to the Common Criteria Implementation dependent specification of information assurance security requirements PP is a combination of
Threats Security Objectives Security functional requirement
29
Anti Virus Biometrics DBMS Firewall IDS/IPS Multi function device Operating system PKI Wireless LAN Web Server
30
Products [Windows 2000, XP, server 2003, Vista, Server 2008], AIX, HP-UX, FreeBSD Advanced Server version 4, version 5, SuSE Linux enterprise Server 10 SP1 Advanced Server version 4 on UniSys ES7000 OS X and Apple MAC OS X Server
32
operations and administration Test the most important systems first Security policy should reflect the organizations needs System are up-to-date with patches
33
34