03 學校網絡安全與防衛

E
eLearning Consortium 電子學習聯盟eLearning Consortium 電子學習聯盟
Experience
Sharing on School
Pentest Project
Eric Fan
Chairman, eLearning Consortium
Agenda
 School Pentest Project
 Our Findings
 Recommendation
 Best Practice for School
 Look Forward in Year 2020
Objective
As an independent consultant in providing a series of
vulnerabilities scanning, penetration tests and reviews
for more then thirty K12 schools’ website security.
Identifying potential areas for further improvement to
protect school’s sensitive data and good will.
30+ Schools
What we do?
Automated
Scan
Manuel
Review
Debriefing
Meeting
Verify the can
result, eliminate
false-positives and
then execute
manual business
logic test.
Application
walkthrough and
threat analysis will
also be conducted
during this stage.
Report and analysis
for the automated
scan and manual
scanning result
with
recommendations.
Step 3Step 2Step 1
Configure and
execute automated
scan, followed by
test plan
development. Risk
assessment will
take place during
the test plan
development.
School Project Findings
20,000+PERSONAL
DATA RECORD
Including public, intranet, internal
applications of 30 schools
78APPLICATIONS
Including public, private,
primary and secondary
schools
30SCHOOLS
240+CRITICAL
VULNERABILITIES
Including email, name, HKID etc
6,000+
Vulnerabilities
Vulnerability
Critical
4%
High
15%
Medium
30%
Low
51%
Overall Findings
0
100
200
300
400
500
600
700
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Critical High Medium Low
185 325 33 39
XSS SQL Injection SSLV2 & V3 Password in Plaintext
Critical Vulnerabilities
Top Security Impact Vulnerabilities
Back Up File Impact
We found plain text database
login credential in the back up
file that may lead to
unauthorize login.
Allow an attacker to
compromise the application,
access or modify data, or
exploit latent vulnerabilities
in the underlying database.
SQL Injection
These outdated software or
operation systems cannot no longer
update to the latest patch that is
vulnerable to exploit
Unsupported Software / OS
Version
Allows anyone who can
read the file access to
the password-protected
resource.
Password In Plaintext
22 16 11
Vendor
Solutions
School’s own
applications
Unsupported
Operation Systems
SQL Injection
SSL Cert
[CATEGORY
NAME]
[PERC
ENTAG
E]
[CATEGORY
NAME]
[PERC
ENTAG
E]
Recommendations
Reliable Vendor Solutions
Software and application
vendors should offer OS or
patch update for use to fix
their software and
application vulnerabilities.
Regular Scanning
Yearly or half-year
vulnerability scanning
and penetration test
is recommended
Regular Patch Operation
Systems
Regular review and
update the hardware and
application operation
systems to the latest
patch, in order to avoid
vulnerable malware and
exploits.
More info: Information Security in Schools - Recommended Practice (Jan 2019)
https://www.edb.gov.hk/en/edu-system/primary-secondary/applicable-to-primary-
secondary/it-in-edu/Information-Security/information-security-in-school.html
Best Practice for Information
Security in School
End Point Computer and Tablets
Firewall and IPS
Data Protection and Back Up
Regular vulnerability scanning and
penetration test
CloudFlare Web Application Firewall
File, DB, Email Servers
Anti-Virus and Anti-Ramsomware
Back Up Storage
Cloud Service Provider
Regular patch update and backup
Prevent SQL Injection and web
security attack
Deny malicious traffic and file download
More info: Information Security in Schools - Recommended Practice (Jan 2019)
https://www.edb.gov.hk/en/edu-system/primary-secondary/applicable-to-primary-
secondary/it-in-edu/Information-Security/information-security-in-school.html
Look Forward in Year 2020
MEET WITH THE
STAKEHOLDERS
To seek resources
for the education
sector on
CyberSecurity
TRAINING TO
PRACTITIONER
Provide training to
the education
practitioner on
cybersecurtiy BEST PRACTICE
Regular update on
education specific
security incident
and best practice
Thank you!
1 of 15

Recommended

Sympathy for the Developer by
Sympathy for the DeveloperSympathy for the Developer
Sympathy for the DeveloperSarah Gibson
494 views18 slides
151eye product presentation by
151eye product presentation151eye product presentation
151eye product presentationBoris Frol
27 views14 slides
Application Security Risk Rating by
Application Security Risk RatingApplication Security Risk Rating
Application Security Risk RatingVaibhav Gupta
2.5K views23 slides
Aldi questions fundamentals of testing by
Aldi questions fundamentals of testingAldi questions fundamentals of testing
Aldi questions fundamentals of testingaldi aulia
45 views11 slides
Fundamentals of testing jef (2) by
Fundamentals of testing jef (2)Fundamentals of testing jef (2)
Fundamentals of testing jef (2)jefri_antoni
23 views11 slides
Healthcare & MedTech - Open Source Security & Risk Analysis by
Healthcare & MedTech - Open Source Security & Risk AnalysisHealthcare & MedTech - Open Source Security & Risk Analysis
Healthcare & MedTech - Open Source Security & Risk AnalysisBlack Duck by Synopsys
165 views1 slide

More Related Content

What's hot

Software Engineering Trends: Vision from Paul Nielsen, SEI by
Software Engineering Trends: Vision from Paul Nielsen, SEISoftware Engineering Trends: Vision from Paul Nielsen, SEI
Software Engineering Trends: Vision from Paul Nielsen, SEIStrongstep - Innovation in software quality
2K views11 slides
Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S... by
Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...
Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...IT Consultant
752 views25 slides
Teacher librarians 3 15 14 to becky by
Teacher librarians 3 15 14 to beckyTeacher librarians 3 15 14 to becky
Teacher librarians 3 15 14 to beckyBecky Russell
391 views10 slides
Technology action plan by
Technology action planTechnology action plan
Technology action plansneadm
225 views10 slides
rbagjani by
rbagjanirbagjani
rbagjanirohit bagjani
216 views3 slides
Ijeee 51-57-preventing sql injection attacks in web application by
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationKumar Goud
249 views7 slides

What's hot(19)

Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S... by IT Consultant
Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...
Beyond Recruitment and Retention: Success via a Data-Centric Technology Eco-S...
IT Consultant752 views
Teacher librarians 3 15 14 to becky by Becky Russell
Teacher librarians 3 15 14 to beckyTeacher librarians 3 15 14 to becky
Teacher librarians 3 15 14 to becky
Becky Russell391 views
Technology action plan by sneadm
Technology action planTechnology action plan
Technology action plan
sneadm225 views
Ijeee 51-57-preventing sql injection attacks in web application by Kumar Goud
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud249 views
Effective Vulnerabilities Management in Simple Ten Steps by Promisec
Effective Vulnerabilities Management in Simple Ten StepsEffective Vulnerabilities Management in Simple Ten Steps
Effective Vulnerabilities Management in Simple Ten Steps
Promisec21 views
Web application security test tools by Phuoc Nguyen
Web application security test toolsWeb application security test tools
Web application security test tools
Phuoc Nguyen1.8K views
Technology action plan by sneadm
Technology action planTechnology action plan
Technology action plan
sneadm190 views
On the Link Between Mobile App Quality and User Reviews by SAIL_QU
On the Link Between Mobile App Quality and User ReviewsOn the Link Between Mobile App Quality and User Reviews
On the Link Between Mobile App Quality and User Reviews
SAIL_QU36 views
Insight Data Science Project: countMyStudent by Marianne Menictas
Insight Data Science Project: countMyStudentInsight Data Science Project: countMyStudent
Insight Data Science Project: countMyStudent
Marianne Menictas328 views
Evaluation "crocodile physics" by Malik
Evaluation "crocodile physics"Evaluation "crocodile physics"
Evaluation "crocodile physics"
Malik384 views

Similar to 03 學校網絡安全與防衛

Experience Sharing on School Pentest Project (Updated) by
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)eLearning Consortium 電子學習聯盟
475 views40 slides
Experience Sharing on School Pentest Project by
Experience Sharing on School Pentest ProjectExperience Sharing on School Pentest Project
Experience Sharing on School Pentest ProjecteLearning Consortium 電子學習聯盟
202 views46 slides
Pavani Resume-P by
Pavani Resume-PPavani Resume-P
Pavani Resume-PPavani Pathri
223 views2 slides
INTRODUCTION by
INTRODUCTIONINTRODUCTION
INTRODUCTIONSalman Mohd
171 views71 slides
Soumya ranjan dash by
Soumya ranjan dashSoumya ranjan dash
Soumya ranjan dashSoumya Ranjan Dash
635 views3 slides
Saikiran_CV_Operational Risk_updated by
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
56 views2 slides

Similar to 03 學校網絡安全與防衛(20)

Saikiran_CV_Operational Risk_updated by konchada
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
konchada56 views
Saikiran_CV_Operational Risk_updated by konchada
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
konchada35 views
OWASP: Building Secure Web Apps by mlogvinov
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Apps
mlogvinov222 views
CMIT 321 EXECUTIVE PROPOSAL PROJECT by HamesKellor
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
HamesKellor331 views
Executive Proposal ProjectThe purpose of this project is to evalua.docx by rhetttrevannion
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
rhetttrevannion8 views
Focused agile audit planning using analytics by Jim Kaplan CIA CFE
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
Jim Kaplan CIA CFE234 views
Praveen jain-new_mob by praveen jain
Praveen jain-new_mobPraveen jain-new_mob
Praveen jain-new_mob
praveen jain259 views
Software Testing For Software Development Lifecycle by Monroe Anderton
Software Testing For Software Development LifecycleSoftware Testing For Software Development Lifecycle
Software Testing For Software Development Lifecycle
Monroe Anderton2 views
Transforming Education through Disruptive Technologies by Aspire Systems
Transforming Education through Disruptive TechnologiesTransforming Education through Disruptive Technologies
Transforming Education through Disruptive Technologies
Aspire Systems513 views
325838924-Splunk-Use-Case-Framework-Introduction-Session by Ryan Faircloth
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth262 views

More from eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位 by
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位eLearning Consortium 電子學習聯盟
146 views163 slides
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代? by
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?eLearning Consortium 電子學習聯盟
435 views130 slides
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf by
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdfeLearning Consortium 電子學習聯盟
38 views31 slides
1. How Data Analytics Transforming Digital Marketing - Saron Leung by
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron LeungeLearning Consortium 電子學習聯盟
75 views54 slides
HKTVMall: Leading Technology Evolution for eCommerce Industry by
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryeLearning Consortium 電子學習聯盟
657 views47 slides
How Blockchain affecting us - Dr Sin.pdf by
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfeLearning Consortium 電子學習聯盟
222 views51 slides

More from eLearning Consortium 電子學習聯盟(20)

Recently uploaded

The Accursed House by Émile Gaboriau by
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile GaboriauDivyaSheta
223 views15 slides
UNIDAD 3 6º C.MEDIO.pptx by
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptxMarcosRodriguezUcedo
134 views32 slides
Ch. 8 Political Party and Party System.pptx by
Ch. 8 Political Party and Party System.pptxCh. 8 Political Party and Party System.pptx
Ch. 8 Political Party and Party System.pptxRommel Regala
54 views11 slides
CUNY IT Picciano.pptx by
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptxapicciano
54 views17 slides
Relationship of psychology with other subjects. by
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.palswagata2003
52 views16 slides
Sociology KS5 by
Sociology KS5Sociology KS5
Sociology KS5WestHatch
85 views23 slides

Recently uploaded(20)

The Accursed House by Émile Gaboriau by DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta223 views
Ch. 8 Political Party and Party System.pptx by Rommel Regala
Ch. 8 Political Party and Party System.pptxCh. 8 Political Party and Party System.pptx
Ch. 8 Political Party and Party System.pptx
Rommel Regala54 views
CUNY IT Picciano.pptx by apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 views
Relationship of psychology with other subjects. by palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200352 views
Sociology KS5 by WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch85 views
Dance KS5 Breakdown by WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch99 views
Drama KS5 Breakdown by WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch98 views
Narration lesson plan by TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN61 views
How to empty an One2many field in Odoo by Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George87 views
Solar System and Galaxies.pptx by DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar106 views
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx by Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Ms. Pooja Bhandare113 views
Class 9 lesson plans by TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN51 views
Education and Diversity.pptx by DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar193 views

03 學校網絡安全與防衛

  • 1. Experience Sharing on School Pentest Project Eric Fan Chairman, eLearning Consortium
  • 2. Agenda  School Pentest Project  Our Findings  Recommendation  Best Practice for School  Look Forward in Year 2020
  • 3. Objective As an independent consultant in providing a series of vulnerabilities scanning, penetration tests and reviews for more then thirty K12 schools’ website security. Identifying potential areas for further improvement to protect school’s sensitive data and good will. 30+ Schools
  • 4. What we do? Automated Scan Manuel Review Debriefing Meeting Verify the can result, eliminate false-positives and then execute manual business logic test. Application walkthrough and threat analysis will also be conducted during this stage. Report and analysis for the automated scan and manual scanning result with recommendations. Step 3Step 2Step 1 Configure and execute automated scan, followed by test plan development. Risk assessment will take place during the test plan development.
  • 5. School Project Findings 20,000+PERSONAL DATA RECORD Including public, intranet, internal applications of 30 schools 78APPLICATIONS Including public, private, primary and secondary schools 30SCHOOLS 240+CRITICAL VULNERABILITIES Including email, name, HKID etc
  • 7. Overall Findings 0 100 200 300 400 500 600 700 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Critical High Medium Low
  • 8. 185 325 33 39 XSS SQL Injection SSLV2 & V3 Password in Plaintext Critical Vulnerabilities
  • 9. Top Security Impact Vulnerabilities Back Up File Impact We found plain text database login credential in the back up file that may lead to unauthorize login. Allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. SQL Injection These outdated software or operation systems cannot no longer update to the latest patch that is vulnerable to exploit Unsupported Software / OS Version Allows anyone who can read the file access to the password-protected resource. Password In Plaintext
  • 10. 22 16 11 Vendor Solutions School’s own applications Unsupported Operation Systems SQL Injection
  • 12. Recommendations Reliable Vendor Solutions Software and application vendors should offer OS or patch update for use to fix their software and application vulnerabilities. Regular Scanning Yearly or half-year vulnerability scanning and penetration test is recommended Regular Patch Operation Systems Regular review and update the hardware and application operation systems to the latest patch, in order to avoid vulnerable malware and exploits. More info: Information Security in Schools - Recommended Practice (Jan 2019) https://www.edb.gov.hk/en/edu-system/primary-secondary/applicable-to-primary- secondary/it-in-edu/Information-Security/information-security-in-school.html
  • 13. Best Practice for Information Security in School End Point Computer and Tablets Firewall and IPS Data Protection and Back Up Regular vulnerability scanning and penetration test CloudFlare Web Application Firewall File, DB, Email Servers Anti-Virus and Anti-Ramsomware Back Up Storage Cloud Service Provider Regular patch update and backup Prevent SQL Injection and web security attack Deny malicious traffic and file download More info: Information Security in Schools - Recommended Practice (Jan 2019) https://www.edb.gov.hk/en/edu-system/primary-secondary/applicable-to-primary- secondary/it-in-edu/Information-Security/information-security-in-school.html
  • 14. Look Forward in Year 2020 MEET WITH THE STAKEHOLDERS To seek resources for the education sector on CyberSecurity TRAINING TO PRACTITIONER Provide training to the education practitioner on cybersecurtiy BEST PRACTICE Regular update on education specific security incident and best practice