Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Don't Judge a Website by its Icon - Read the Label!

921 views

Published on

Jeff Williams presentation at OWASP AppSecDC 2010. see https://www.owasp.org/index.php/Don%27t_Judge_a_Website_by_its_Icon_-_Read_the_Label! for more details

Published in: Technology
  • Be the first to comment

Don't Judge a Website by its Icon - Read the Label!

  1. 1. Don’t Judge an by its ICON Jeff Williams Aspect Security CEO OWASP Chair jeff.williams@aspectsecurity.com twitter @planetlevel
  2. 2. • iPhone• Android• tinyURL• installer
  3. 3. http://tinyurl.com/y6ddmqu
  4. 4. BACKER STANDARD DETAIL ENFORCEDNutrition Facts Gov’t Open Complex* MandatoryNew Car Labels Gov’t Open Complex* MandatoryMovie Ratings Private Closed Simple VoluntaryMusic Labels Private Closed Simple VoluntaryTelevision Programs Private Closed Simple MandatoryVideo Games Private Closed Simple VoluntaryDrug Facts Gov’t Open Complex* MandatoryEnergy Guide Gov’t Open Simple* MandatorySmart Choices Private Open Simple* VoluntarySmoking Gov’t Open Terrifying Mandatory * Leverages significant other standards
  5. 5. USDA - “The Economics of Food Labeling”• Voluntary labels – for promotion• Mandatory labels – fill information gaps• Mandatory labeling may initially have a larger impact on manufacturers’ production decisions than on consumers’ choices.
  6. 6. Security Label … … …Software SoftwareProducers Consumers
  7. 7. Software Facts Expected Number of Users 15 Typical Roles per Instance 4 Modules 155 Modules from Libraries 120 % Vulnerability* Cross Site Scripting 22 65% Reflected 12 Stored 10 SQL Injection 2 Buffer Overflow 5 95% Total Security Mechanisms 3 Modularity .035 Cyclomatic Complexity 323 Encryption 3 Authentication 15 Access Control 3 Input Validation 233 Logging 33 * % Vulnerability values are based on typical use scenarios for this product. Your Vulnerability Values may be higher or lower depending on your software security needs: Usage Intranet InternetIngredients: Sun Java 1.5 runtime, Sun Cross Site Scripting Less Than 10 5J2EE 1.2.2, Jakarta log4j 1.5, Jakarta Reflected Stored Less Than Less Than 10 10 5 5 SQL Injection Less Than 20 2Commons 2.1, Jakarta Struts 2.0, Buffer Overflow Less Than 20 2 Security Mechanisms 10 14Harold XOM 1.1rc4, Hunter JDOMv1 Encryption 3 15
  8. 8. Hook: Starts Displays Pop-UpsAutomaticallyDial: Places a Call Remote ControlModify: Alters OS Self-UpdatesMonitors you when Stuck: Cannot benot active program Uninstalled
  9. 9. OWASP OpenSAMMOWASP T10http://www.aspectsecurity.com/SecurityFacts/
  10. 10. “Security in Sunshine” Architects Research Create Security Define Security Developers Architecture Requirements Monitor Implement Threat Controls AppSec InfosecUsers Visibility Understand Cycle Share Stakeholders Findings Business Understand Verify Audit Laws Compliance Legal

×