“A Map of Security Risks Associated with Using COTS” Ulf Lindqvist, Erland Jonssson IEEE Computer, June 1998 “Combining Internet connectivity and COTS-based.

Slides:



Advertisements
Similar presentations
Incident Response Managing Security at Microsoft Published: April 2004.
Advertisements

Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Project What is a project A temporary endeavor undertaken to create a unique product, service or result.
Software Fault Injection for Survivability Jeffrey M. Voas & Anup K. Ghosh Presented by Alison Teoh.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
Lecture 1: Overview modified from slides of Lawrie Brown.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Introducing Computer and Network Security
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lecture 11 Reliability and Security in IT infrastructure.
(Geneva, Switzerland, September 2014)
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
1 Security Risk Analysis of Computer Networks: Techniques and Challenges Anoop Singhal Computer Security Division National Institute of Standards and Technology.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Storage Security and Management: Security Framework
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
The CERN WhiteHat Challenge CERN Computer Security Team.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
CSCE 548 Secure Software Development Test 1 Review.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Security Introduction. Security is a system It is important to realize that security is a system of individual measures, each of which is not fully effective.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Information Security What is Information Security?
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
SecSDLC Chapter 2.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Software Testing Mehwish Shafiq. Testing Testing is carried out to validate and verify the piece developed in order to give user a confidence to use reliable.
Computer Security By Duncan Hall.
Describe the potential of IT to improve internal and external communications By Jim Green.
Safe’n’Sec IT security solutions for enterprises of any size.
CS223: Software Engineering Lecture 15: Software construction.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Basic Terms and Concepts – 1/3
ISSeG Integrated Site Security for Grids WP2 - Methodology
Data and database administration
Security Testing Methods
McAfee Customer Support Number
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Presentation transcript:

“A Map of Security Risks Associated with Using COTS” Ulf Lindqvist, Erland Jonssson IEEE Computer, June 1998 “Combining Internet connectivity and COTS-based systems results in increased threats from both internal and external sources.”

Outline of Presentation Definition of COTS software components Outline of security issues in COTS components Analysis of risks in COTS products Controlled intrusion experiment A risk management approach

COTS = Commercial Off-The-Shelf Products Use of customer-specific solutions is dwindling –COTS usage is typically cheaper and less time- consuming –Less prone to error “More and more members of the security community realize the impracticability and insufficiency of risk avoidance as the sole doctrine.”

Security Issues in COTS Components “Any type of COTS component might have an impact on the overall system security…” Not all COTS products are designed with adequate focus on security What level of security can be obtained when using combinations of COTS products? –Difficult to make overall system security independent of behaviour of individual components. Security often enforced directly and indirectly by using COTS components –Operating systems are one of the more widespread COTS products and exhibit different levels of security functionality.

Main Risks With COTS Usage Component Design –COTS component may be inadvertently or intentionally flawed, either through bugs or intentional security flaws such as backdoors. Component Procurement and Integration –Security requirement of customer may not correspond with that of the component, and often the security level “must be set to the lowest common denominator to make the products work together.” Internet Connection of System –Provides communication path to system for potential attackers that would not otherwise be available. –Intrusion tools and information readily available for potential attackers. System Use –Insufficient user understanding of security limitations of system and subsequent use of system in a unintended manner.

Controlled Intrusion Experiment Experiments carried out using “ordinary” students granted with user accounts –Insider threat monitored –Performed on SunOS 4.x and Novel NetWare systems Results of experiment: –“Almost all attackers performed successful intrusions” –Several severe intrusions performed, granting users administration privileges –Known vulnerabilities exploited without technical expertise

Risk Management Approach Confinement of Untrusted Components –Desirable for COTS products –Difficult to determine level of resources required for component to function Flaw Remediation –“A system owner should strive to remove all known vulnerabilities in a system as soon as they are discovered.” –Particularly important with COTS components, as exploit scripts are readily available for known vulnerabilities

Question The article states that more and more members of the security community realise that insufficiency of risk avoidance as the sole doctrine. Especially with respect to COTS components, why is this the case?