PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Snejina Lazarova Senior QA Engineer, Team Lead CRMTeam Dimo Mitev Senior QA Engineer, Team Lead SystemIntegrationTeam Telerik QA Academy SOAP-based Web.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Chapter 7 HARDENING SERVERS.
Server-Side vs. Client-Side Scripting Languages
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Data Security in Local Networks using Distributed Firewalls
Lesson 19: Configuring Windows Firewall
Computer Science 101 Web Access to Databases Overview of Web Access to Databases.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Charlie Crocker Vice President Farallon Geographics, Inc. An Overview of Internet Mapping Technology.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Chapter 6: Hostile Code Guide to Computer Network Security.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
INTRODUCTION TO WEB DATABASE PROGRAMMING
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Web Application Security Implementation - © 2007 GIAC Web Application Security Implementation SANS MSISE GDWP Kevin Bong John Brozycki July 26, 2007.
11/16/2012ISC329 Isabelle Bichindaritz1 Web Database Application Development.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Creating Web Applications Using ASP.NET Chapter Microsoft Visual Basic.NET: Reloaded 1.
Web Server Administration Web Services XML SOAP. Overview What are web services and what do they do? What is XML? What is SOAP? How are they all connected?
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Computer Emergency Notification System (CENS)
Protecting Students on the School Computer Network Enfield High School.
NMD202 Web Scripting Week3. What we will cover today Includes Exercises PHP Forms Exercises Server side validation Exercises.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Module 7: Advanced Application and Web Filtering.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich MIT, Stanford University USENIX 09’ Nemesis: Preventing Authentication & Access Control Vulnerabilities.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
WEB SERVER SOFTWARE FEATURE SETS
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
Role Of Network IDS in Network Perimeter Defense.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
System Architecture CS 560. Project Design The requirements describe the function of a system as seen by the client. The software team must design a system.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
12. DISTRIBUTED WEB-BASED SYSTEMS Nov SUSMITHA KOTA KRANTHI KOYA LIANG YI.
Web Application Security
Chapter 7: Identifying Advanced Attacks
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection.
A Security Review Process for Existing Software Applications
Database Driven Websites
IS 4506 Server Configuration (HTTP Server)
Firewalls.
Presentation transcript:

PwC New Technologies New Risks

PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security –Internal user authentication –Access Control List on single host

PricewaterhouseCoopers Technology and Security Evolution Network Technology –Multiple Trusted hosts –Multiple Trusted users Security –Access Control Lists on multiple trusted hosts –Internal user authentication –Network segmentation

PricewaterhouseCoopers Technology and Security Evolution Internet Technology –Large number of untrusted users –Untrusted network –Complexity Network Configuration Security –Access Control Lists on multiple untrusted hosts –External user authentication –Network segmentation and filtering (Firewalls)

PricewaterhouseCoopers Technology Evolution E-commerce and Web services Critical Data Complexity –Network –Configuration –Development Business 2 Business (B2B) Business 2 Clients (B2C)

PwC E-commerce and Web services New Risks

PricewaterhouseCoopers Access to Critical data over trusted communication ports

PricewaterhouseCoopers Rapid development Complex Development Framework Competitive Market Development Cost Automation Tools

PricewaterhouseCoopers High level language for complex tasks New languages hide complexity Development Complexity is hidden Template and Wizards Distributed Programming Architecture

PricewaterhouseCoopers Scripting language Not compiled Process flow can be modified at run time Rely on compiled languages Used in untrusted environment to access critical data

PricewaterhouseCoopers Dynamic Environment High level of customization Different integration requirements Custom development

PwC How web application works?

PricewaterhouseCoopers Web Application Process

PricewaterhouseCoopers Terminology Script Argument argument1=somedata Script Argument Data argument1=somedata1

PricewaterhouseCoopers Web communication GET –Most widely used request method used. –Simplest request method. –Consist of resource and argument –Example: argument1=data POST –Used to transfer data with server. –Mostly used in conjunction with HTML form

PwC Current Attack Methods

PricewaterhouseCoopers SQL Injection SQL injection is the process of modifying the internal SQL query of the server side script to perform actions not intended by the developers. SQL injection can have serious security implications from data loss to full infiltration of your internal network. Widely used and most documented type of web application attack Can be used against most language used to develop web applications Only impact application using back end SQL server to store data

PricewaterhouseCoopers Code Injection Code injection is the process of injecting code that will be processed by the server. Code injection is extremely dangerous since the remote attacker can make the server run is code.. Code injection is not widely used and is cause by file access abstraction. Not all programming language are affected.

PricewaterhouseCoopers Application Discovery with Program Error Like normal applications, web application will display error messages when something goes wrong Error messages will often display a lot of information on the environment and the cause of the error. Often the information displayed give to much information Error messages are often used by attackers to help them gain a better understanding of the environment they are attacking and can help them construct very precise attacks.

PricewaterhouseCoopers Error Reporting Example

PwC Development Considerations to Prevent Attacks

PricewaterhouseCoopers Dealing with Hostile Environment  All incoming data should be threaded as potentially invalid  All outgoing data should be documented and all undocumented data should not be sent to the client  All error messages should be standardized

PricewaterhouseCoopers Dealing with Error Reporting  All error should be catched by the application  When an error occur, the user should be directed to a standard page indicating an that an error as occurred.  The full error message should be sent to the development team.

PricewaterhouseCoopers Programming Language - Application Programming Interface  Developers and Software engineer should review all functions used and the full impact they might have.  A detailed list of valid characters should be made and all other should be rejected.

PricewaterhouseCoopers Platform Configuration  Administrators should read the documentation of the specified platform used to run the web applications.  Administrators and developers should be aware of the types of internal and external communication it may use with other applications (single sign on, data base, LDAP,...).

PricewaterhouseCoopers Network Configuration  Only port used by your web server (often 80(HTTP) and 443(HTTP-SSL) should be allowed as incoming communication.  Outgoing communication should be restricted to limit many types of attack.  All communication between the various servers used in your environment should be documented and all other types of communication should be restricted.  For added security, all traffic between servers that should not be talking to each other should be flagged and investigated immediately.

PwC PricewaterhouseCoopers GRMS

PricewaterhouseCoopers GRMS - Information Security Solutions Web Application Assessment –Input Validation –Configuration –Assessment of platform Attack and Penetration –Network Security Assessment –Penetration Tests –Host Security Assessment Source Code review –Security Architecture review –Identification of vulnerable functions calls –Integrity