Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.

Slides:



Advertisements
Similar presentations
1 Computational Asset Description for Cyber Experiment Support using OWL Telcordia Contact: Marian Nodine Telcordia Technologies Applied Research
Advertisements

New Security Issues Raised by Open Cards Pierre GirardJean-Louis Lanet GERMPLUS R&D.
Addressing IPv6 Vulnerabilities on Small Business Networks Bradley HainesVincent Pullano University of Cincinnati College of Education, Criminal Justice,
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Ch 4 The Process page 1CS 368 Building Software is Difficult often delivered late often over budget always with errors must be a custom solution complexity.
Computer Security and Penetration Testing
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
ITIS3100 By Fei Xu. Acknowledge This document is basically a digest from “Wireshark User's Guide for Wireshark 1.0.0” You can download the software.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Introduction to Software Testing
Installing software on personal computer
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Software Construction and Evolution - CSSE 375 Software Documentation 1 Shawn & Steve Right – For programmers, it’s a cultural perspective. He’d feel almost.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
The Business of Penetration Testing
IT:Network:Microsoft Applications
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
Name: Abdullah Mohammed Alhatmi ID:86497 Course: Quality &Assurance Name: Abdullah Mohammed Alhatmi ID:86497 Course: Quality &Assurance Start.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Part 2- An IT Auditing Framework
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
Information Security Issues at Casinos and eGaming
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
An Introduction to Software Engineering. What is Software?
Archivists' Toolkit - CRADLE Presentation, 10 Feb The Archivists’ Toolkit CRADLE Presentation 10 Feb
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Module 7 Configure User and Computer Environments By Using Group Policy.
Archivists' Toolkit - CDL Presentation, October 17, 2005 The Archivists’ Toolkit Lee Mandell Brad Westbrook.
Getting the most out of ArcGIS Web Application Templates
Linux Networking and Security
An Introduction to Software Engineering. Communication Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Cisco Discovery Home and Small Business Networking Chapter 2 – Operating Systems Jeopardy Review Darren Shaver – Kubasaki High School – Okinawa, Japan.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Database Administration
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
 Programming - the process of creating computer programs.
(1) Test Driven Development Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of Hawaii Honolulu.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft.
5. 2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the activities of the requirements discipline  Describe the difference.
2: Operating Systems Networking for Home & Small Business.
CS223: Software Engineering Lecture 32: Software Maintenance.
By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
BEST PRACTICES FOR DYNAMICS NAV ADMINISTRATION AND SECURITY Per Mogensen.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Continuous Automated Chatbot Testing
Networking for Home and Small Businesses – Chapter 2
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Technical Capabilities
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Online health and community indicator platforms
Instructor Materials Chapter 5: Windows Installation
Best Practices for Using LogicalLABS in the Classroom
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny was Helpless to Stop It: A Study on Project Usability from a Cyber-Security Professionals Perspective John Paul Dunning Rajesh Gangam Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Agenda Problem Motivation Related Work Usability Study Analysis Usability Attributes Application of Usability Attributes Conclusion and Future Work Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Problem Security Professionals are in need of usable security tools and applications. Why?  Security is the primary functionality.  Dynamic Environment: Security Tools and App’s always have upgrades and patches.  Collaborative Tools. What do you Gain?  Better Security. Better Support. Faster Solutions.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Motivation Little research has been done on usable security applications for security professionals on a broad scale. Administrators design, configure, troubleshoot, and maintain complex computer system comprised of a multitude of components.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Related Work User End Usability  Kazaa  Johnny  Johnny 2 Problems faced by System Administrators.  Field Studies of Computer System Administrators  I Know My Network: Collaboration and Expertise in Intrusion Detection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Definitions: Administrators  Individuals who are responsible for the well being of systems on a large scale. Project Vs Application Usability.  Usability concerns at a project level where application is only a part. Contains Product Support, Access to Source Code, Environment, Cost, Scale, Target.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Usability Study We have surveyed 50 Administrators. The Participants belonged to  Virginia Tech Technical Listserv  The Army Network Engineering Listserv  University Security Operations Group Listserv of SANS.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Usability Study

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Findings From the Survey Popular Security Tools  Nmap A Network Scanner which tries to identify the services and machine configurations on the network.  Nessus A Network Vulnerability Scanner.  Wireshark Network Packet Analyzer used for network troubleshooting.  Snort A Network Intrusion Prevention and Detection System,  TcpDump Network Packet Analyzer.  *----Short Descriptions please

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Observations: Preferred Operating System.  The Host Environment of the application.  Windows is the Most Preferred..  It is recognized as the primary attribute.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Observations: Preferred Interface  Identify the popular user interface.  Graphical User Interface and CLI.  Recognized as primary attribute.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Observations: Preferred Openness  Offers Customization to the tools.`  Open Source is Most preferred.  Recognized as primary attribute.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Observations: Preferred OS and UI  Users Preferred Command Line Interface on both Linux and OSX.  Similarly Windows Users would need GUI.  Developers are recommended to provide both GUI and CLI interfaces interchangebly.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Observations: Project Openness vs Supported OS  Availability of Open Projects on all the Operating Systems.  A Higher Range of Openness is expected only in Linux.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Usability Attributes Attribute Primary Attributes Check List  Operating System  User Interface  Community Involvement  Target System

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech PUA CheckList

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Secondary Attributes Secondary attributes in the area of interest to administrators. We found 18 distinct attributes from the survey results.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Secondary Attributes Documentation Customer Support Customizable Development Practices Cost Scale of Developed Maintenance Complexity Installation and Setup System Resources Default Settings Code Availability Platform Unique Effectiveness Scope Feedback Demographic

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech SUA Framework Documentation: Is the project well documented? This includes information on the purpose of the project, the functionality of the project, instructions on project use, etc? Customer Support: Is project support provided? Does the support come directly from the project developing entity or is it supported by a third party, like a community forum? Customizable: Does the project allow for customization or is it static? Can users change settings, add/remove components, etc? Development Practices: Where adequate coding development enforced during application development to ensure code security, test for correct functionality, minimize side effects, document code, etc? Cost: Is the price reasonable for the intended customer base?

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Application to Project Pwntooth is a fully automated "search and destroy" project designed to automate Bluetooth pen-testing. Applying the PUA CheckList. Applying the SUA Framework.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Applying the PUA CheckList

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Applying the PUA CheckList

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Applying SUA Framework AttributeDescription DocumentationDocumentation is provided through execution of the application with the -h flag. The documentation includes a brief description of the tool as well as a description the functionality availably thought invoking various flags. The project is also accompanied by a changelog and installation instructions. Customer SupportCustomer support is mainly by the developer, but also through the user community. CustomizableUsers can customize which exploits are conducted and in what manner. The project is also customizable through the addition and removal of other Bluetooth auditing command line projects. Development Practices The project testing was done on a small scale by a single individual. Testing was expected of the community. CostFree of charge.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusions and Future Work We have Identify Primary and Secondary attributes of a Security Project and Application. We Have applied this Attributes to the Security Application (PwnTooth). One-on-One Guided Interview. More Study on Day-to-Day issues.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Thank You!