Database Security Yuli Stremovsky. Agenda Database Security What is GreenSQL ? Management Console Demo GreenSQL Roadmap.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Getting Set-up with Hosting and WordPress Gregory Young Alternative Hosting
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
New trends on cyber security - Cyber Espionage & Identity theft By K S Yash, CRO 1.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Web Services Presentation. Site Management Console (SMC)
Trojan Horse Program Presented by : Lori Agrawal.
Web Server Administration
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Sample School Website Sydney Region ITSU School Support
GreenSQL Yuli Stremovsky /MSN/Gtalk:
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
IDENTIFYING SECURITY ISSUES IN A HIGHER INSTITUTE CMS LAB SITE Panagiotis Loumpardias Konstantinos Chimos.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Staying Safe Online Keep your Information Secure.
Internet Security facilities for secure communication.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Honeypot and Intrusion Detection System
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Web Applications Testing By Jamie Rougvie Supported by.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Topic 5: Basic Security.
What is Spam? d min.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Defense In Depth: Minimizing the Risk of SQL Injection
Top 5 Open Source Firewall Software for Linux User
WEB APPLICATION TESTING
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Introduction to SQL Server 2000 Security
Lecture 2 - SQL Injection
Web Servers / Deployment
Protecting Against Common Web Application Vulnerabilities
WJEC GCSE Computer Science
6. Application Software Security
STATEL an easy way to transfer data
Presentation transcript:

Database Security Yuli Stremovsky

Agenda Database Security What is GreenSQL ? Management Console Demo GreenSQL Roadmap

Hackers have become professional There are business models that finance them SQL Injection attacks are becoming increasingly sophisticated and difficult to combat. It uses stealth techniques to go unnoticed for as long as possible. Hackers create much more SQL Injection attacks The need

Pricelist

Oct One of NASA's was vulnerable to a SQL injection attacks. All of this despite the fact that the agency’s IT budget in fiscal year 2009 was $1.6 billion, of which $15 million was dedicated to IT security. Mar 2009 & Nov SQL injection attack exposes sensitive customer data on Symantec web server. Nov Russian cyber gang uses SQL injection attack crack deep inside the network of a giant U.S. debit and credit-card processor. Nov An SQL injection flaw has been detected on the Yahoo! Website. The vulnerability was on the Yahoo job section. Dec Wall Street Journal website, Intel, Apple Latest Victims

Replication Backup Wiki Blog Reporting Testing Forums High privileged users Application Users Administrators Casual users Application connections User connections CMS Database Monitoring Financial data Private data Customer data E-commerce Who uses the Database ?

Hundreds of websites are on the same database server - hundreds of attack vectors If your neighbor's web site database is vulnerable, then so are you, no matter how carefully you've vetted your own code. Using Shared Hosting Services ? You are under attack !!!

Legitimate Query: SELECT * from users WHERE username = ‘admin’ and password = ‘123’ Injected SQL code: SELECT * from users where username = ‘admin’ and password = ‘XXX’ or ‘1’=‘1’ What is SQL Injection?

Bypass login page DOS - Deny of service Install web shell Iframe injection Access system files Install db backdoor Theft of sensitive information / credit cards Additional step of the attack: – Attack computers on the LAN SQL Injection after effect

Automated SQL Injection Injecting User visits infected site/page Trojan horse drive by installation Your PC is controlled by black hat hackers – Send SPAM – Records all login information – Records all transactions with bank websites – Online money transfer How iframe injection works

Buzus Trojan

Open Source project Started at 2007 Hosted at sourceforce More than 30,000 downloads Version k downloads in it’s first month GreenSQL History

GreenSQL is a database firewall solution Protects against SQL injections and other known and unknown Database attacks Cool web based management interface MySQL / PostgreSQL built in support What is GreenSQL

Database Firewall

SQL Proxy Risk Matrix Calculation SQL Queries /WL/Policy Good / Block/ Warn / Learn Forward and Integration GreenSQL – High Level Architecture DB Server 1DB Server 2DB Server 3DB Server N

Reverse Proxy Number of databases Number of backend DB servers Deployment options: – Can be installed together with the DB server – Can be installed on dedicated server / VPS How it works?

Replication Backup Wiki Blog Reporting Testing Forums High privileged users Application Users Administrators Casual users Application connections User connections CMS Database Monitoring Ecommerce Using the Database Securely

GreenSQL management console

Multiple Databases / Proxies

Alert Example

GreenSQL Advantages Multiple modes – IDS/IPS / learning / Firewall Easy to use Pattern Recognition (signatures) Heuristics (risk calculation) Open Source

GreenSQL Advantages – Cont’ Cross Platform (any Linux and Unix system) Rapid Deployment (pre built packages) Well established (30,000 downloads and counting) Web application independent The only free security solution for MySQL The only security solution for PostgreSQL User Friendly WEB GUI/Management tool

GreenSQL IPS / IDS Sensitive tables Multiple queries ( ; / UNION ) SQL comments Empty password SQL tautology - true statements (1=1) Administrative commands Information disclosure commands

But, I’m a kick ass developer So why should I use GreenSQL Legacy code Not only Web application and web services use your database Protects the database console access 0 day database attacks prevention No direct access to the database machine

GreenSQL: Demonstration

Native Joomla / Drupal / Wordpres plugins Integrated GreenSQL Console as CMS plugin ( you will use Joomla Admin to manage GreenSQL ) Web user name / IP address reporting in GreenSQL alerts Auditing Open Source Roadmap

GreenSQL Optimization Submission Service portal Software Updates Consulting Installation Support GreenSQL Support Program

Questions

Thank You Yuli Stremovsky