Topics in Security Testing.ppt
《Topics in Security Testing.ppt》由会员分享,可在线阅读,更多相关《Topics in Security Testing.ppt(119页珍藏版)》请在麦多课文档分享上搜索。
1、Topics in Security Testing,Reading assignment: Chapter 13, pp. 193-209. Note that many more topics are covered in these slides and in class.,Computer Security,The goal of computer security is to protect computer assets (e.g., servers, applications, web pages, data) from: corruption unauthorized acce
2、ss denial of authorized access malicious software Security is strengthened by: physically limiting the access of computers to trusted users hardware mechanisms (e.g., biometrics) operating system mechanisms that impose rules on untrusted programs (e.g., role-based access control) anti-virus software
3、 to detect malware secure coding techniques (e.g., array bounds checking) to make code less vulnerable to security attacks.,2,Approach to Software Security,Verify that security mechanisms are trustworthy Verify that security architecture adheres to the security policy Verify that the applications th
4、at constitute the system are trustworthy i.e., they have been developed using secure coding practices, or they are not malware.,3,Security Architecture,A security architecture is a specification that is used as a guide to enforce security constraints It specifies where security mechanisms (e.g., enc
5、ryption, firewalls) need to be positioned in the software architecture The quality of a security architecture also depends on the security of the applications that constitute the system,4,Security Architecture,Security architecture describes the position of security mechanisms in the software archit
6、ecture and comprises: subsystems e.g., web servers, application servers, DBMS, directories, web applications, and legacy applications communication links between the subsystems e.g., local or remote function calls and protocols (SSL, HTTPS, LDAP) position of security mechanisms e.g., authentication
7、and authorization points, encryption methods, audit, logging, monitoring, intrusion detection, registration, backup, recovery,5,Example of a Security Architecture,6,Validating Security Architecture,There are many security faults that arise from a poorly designed security architecture, e.g., unauthor
8、ized access to data and applications confidential and restricted data flowing as unencrypted text over network connections Security architecture is validated using a process called threat modeling. Threat modeling is typically a manual (i.e., not automated) inspection process, similar to code and re
9、quirements inspection.,7,Threat modeling,Threat Modeling is a process for evaluating a software system for security issues. It is a variation of the code and specification inspections processes discussed earlier in the course. The goal is for a review team to look for software features that vulnerab
10、le from a security perspective. Threat modeling is not the responsibility of a software tester, although testers may be involved in the security review team.,Threat modeling process (1),Assemble the treat modeling team Include security experts and consultants Identify the assets E.g., credit card nu
11、mbers, social security numbers, computing resources, trade secrets, financial data Create an architecture overview Define the architecture and identify the trust boundaries and authentication mechanisms Decompose the application E.g., identify data flows, encryption processes, password flows.,Threat
12、 modeling process (2),Identify threats E.g., can data be viewed, changed? Limit access of legitimate users? Unauthorized access of the system? Document threats E.g., describe threat, target, form of attack, counter-measures to prevent an attack, etc. Rank threats (scale: low, medium, high) Damage po
13、tential E.g., property, data integrity, financial loss Reproducibility E.g., probability that an attempt to compromise the system will succeed Exploitability/Discoverability E.g., is it difficult to hack into the system? Affected users How many users will be affected? Who are these users? Are they i
14、mportant?,What is Malware?,Malware (malicious software) is any program that works against the interest of the systems user or owner. Question: Is a program that spies on the web browsing habits of the employees of a company considered malware? What if the CEO authorized the installation of the spyin
15、g program?,Uses of Malware,Why do people develop and deploy malware? Financial gain Psychological urges and childish desires to “beat the system”. Access private data ,Typical purposes of Malware,Backdoor access: Attacker gains unlimited access to the machine. Denial-of-service (DoS) attacks: Infect
16、 a huge number of machines to try simultaneously to connect to a target server in hope of overwhelming it and making it crash. Vandalism: E.g., defacing a web site. Resource Theft: E.g., stealing other users computing and network resources, such as using your neighbors Wireless Network. Information
17、Theft: E.g., stealing other users credit card numbers.,Types of Malware,Viruses Worms Trojan Horses Backdoors Mobile code Adware Sticky software,Antivirus programs,Antivirus programs identify malware by looking for unique signatures in the code of each program (i.e., potential virus) on a computer A
18、 signature is a unique sequence of code found in a part of the malicious program The antivirus program maintains a frequently updated database of virus signatures The goal is for the database to contain a signature for every known malware program Examples of antivirus software: Symantec (http:/) McA
19、fee (http:/),15,Viruses,Viruses are self-replicating programs that usually have a malicious intent. Old fashioned type of malware that has become less popular since the widespread use of the Internet. The unique aspect of computer viruses is their ability to self-replicate. However, someone (e.g., u
20、ser) must execute them in order for them to propagate.,Viruses (Contd),Some viruses are harmful (e.g.,): delete valuable information from a computers disk, freeze the computer. Other viruses are harmless (e.g.,): display annoying messages to attract user attention, just replicate themselves.,Viruses
21、: Operation,Viruses typically attach themselves to executable program files e.g., .exe files in MS Windows Then the virus slowly duplicates itself into many executable files on the infected system. Viruses require human intervention to replicate.,Origin of the term computer virus,The term computer v
22、irus was first used in an academic publication by Fred Cohen in his 1984 paper Experiments with Computer Viruses. However, a mid-1970s science fiction novel by David Gerrold, When H.A.R.L.I.E. was One, includes a description of a fictional computer program called VIRUS. John Brunners 1975 novel The
23、Shockwave Rider describes programs known as tapeworms which spread through a network for deleting data. The term computer virus also appears in the comic book Uncanny X-Men in 1982.,The first computer viruses,A program called Elk Cloner is credited with being the first computer virus to appear “in t
24、he wild“. Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi, operating out of Lahore, Pakistan.,Worms,Worms are
25、malicious programs that use the Internet to spread. Similar to a virus, a worm self-replicates. Unlike a virus, a worm does not need human intervention to replicate. Worms have the ability to spread uncontrollably in a very brief period of time. Almost every computer system in the world is attached
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TOPICSINSECURITYTESTINGPPT
