SlideShare a Scribd company logo
© 2007 NetSol Technologies, Inc. All rights reserved
Application Security
by:
M. Faisal Naqvi, CISSP
Senior Consultant – Information Security
NetSol Technologies Ltd.
© 2007 NetSol Technologies, Inc. All rights reserved
AGENDA
 Programming Concepts
 Threats and Malware
 Software Protection
 Audit & Assurance Mechanisms
 Database Data Warehouse Environment
 Web Application Environment
Programming Concepts
© 2007 NetSol Technologies, Inc. All rights reserved
Application vs. Operating System
 Project Management Controls
Complexity of Systems and Projects
Controls Built into Software
© 2007 NetSol Technologies, Inc. All rights reserved
Generations of Programming
Languages
 Generation I – Machine Language
 Generation II – Assembly Language
 Generation III – High-level Language
 Generation IV – Very high-level Language
 Generation V – Natural Language
© 2007 NetSol Technologies, Inc. All rights reserved
Programming Languages
 COBOL, Fortran
 C, C-Plus, C++
 SmallTalk, Java, Eiffel
 Visual Programming Languages
Visual Basic, Visual C, Delphi
 BASIC, Logo, JavaScript
© 2007 NetSol Technologies, Inc. All rights reserved
HTML, XML and ActiveX
 HTML
 XML
 ActiveX
© 2007 NetSol Technologies, Inc. All rights reserved
Program Utilities
 Assembler
 Compiler
 Interpreter
© 2007 NetSol Technologies, Inc. All rights reserved
Programming Concepts
 System Model
 Von Neumann Architecture
 Object-Oriented Programming (OOP)
Inheritance
Polymorphism
Polyinstantiation
© 2007 NetSol Technologies, Inc. All rights reserved
Programming Concepts (Cont…)
 Distributed Component Object Model (DCOM)
 Common Object Request Broker Architecture (CORBA)
Policy Enforcement Code
ORB Security System
1. Client Application
sends Message
3. Target Object
2. Policy Implemented
here
Threats & Malware
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware
 Buffer Overflow
 Denial of Service
 Time of Check/Time of Use (TOC/TOU)
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware (Cont…)
 Malformed Input Attacks
SQL Injection
Unicode Attack
 Executable Content/Mobile Code
Web Applets
Dynamic E-mail
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware (Cont…)
 Object Reuse
 Garbage Collection
 Trap Door
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware (Cont…)
 Incomplete Parameter Check and
Enforcement
 Covert Channels
 Inadequate Granularity of Controls
 Social Engineering
 Multiple Paths to Information
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware (Cont…)
 Malicious Software
Modern malware is network aware
Compatibility Platform Dominance
Malware Functionality
© 2007 NetSol Technologies, Inc. All rights reserved
Virus
 Reproduction – Central Characteristic
 Generally requires some action by the
user
May or may not carry payloads
© 2007 NetSol Technologies, Inc. All rights reserved
Virus Types
 File Infector
 Boot Sector Infector
 System Infector
 Multipartite
 Macro Virus
 Script Virus
 Hoax
© 2007 NetSol Technologies, Inc. All rights reserved
Virus Anti-Detection
 Stealth
 Tunneling
 Polymorphism
 Antivirus (anti-malware) Disabling
© 2007 NetSol Technologies, Inc. All rights reserved
Virus Structure
 Infection/Reproduction
Target Search
Infection
Avoidance
 Trigger
 Payload
© 2007 NetSol Technologies, Inc. All rights reserved
Worm
 Reproduces
 Generally use loopholes in systems
May not involve user
 Often attacks server software
© 2007 NetSol Technologies, Inc. All rights reserved
Trojan Horse
 Purported to be a positive utility
 Hidden negative payload
 Social Engineering
© 2007 NetSol Technologies, Inc. All rights reserved
Logic Bomb
 Generally Implanted by an Insider
 Waits for condition or time
 Triggers negative payload
© 2007 NetSol Technologies, Inc. All rights reserved
Diddlers Backdoors and Rats
 Data Diddler
 Backdoor, Trapdoor
 RAT (Remote Access Trojan)
© 2007 NetSol Technologies, Inc. All rights reserved
Threats & Malware
 D-DOS Zombie
 Prank
 Spyware and Adware
 Phishing
 BotNets
Software Protection
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle
 Project Management-based Methodology
 Typical Phases of a System Life Cycle
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Project Initiation and Planning
Establish User
Requirements
Identify
Alternatives
Select/Approve
Approach
Determine
Security
Requirements
Conduct Risk
Analysis
Define Security
Strategy
Required Security Activities
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Functional Design Definition
Develop
Project
Plan
Identify
Functional
Requirements
Set
Test
Criteria
Identify
Security
Areas
Security
Tools
Include
Security
Reqs. in
RFP’s
Contracts
Required Security Activities
Define
Strategy
Develop
Functional
Baseline
Establish
Security
Requirements
Include
Functional
Security
Reqs.
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Detailed Design Specifications
Prepare
Detailed
Designs
Update
Testing Goals
and Plans
Develop
Formal
Baseline
Establish
Security
Specifications
Update Security
Test Plans
Document
Security
Baseline
Required Security Activities
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Develop & Document
Develop
System
Unit Testing &
Evaluation
Document
System
Develop
Security Code
Security Code
Evaluation
Document
Security Code
Required Security Activities
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Acceptance, Testing and Transition to Production
Test Validate Implement
Security
Components
Security
Code
Security
Controls
Required Security Activities
Document Certify
Security in
Integrated
System
Secure
Operations
Accept
Secure
System
Security
Components
Integrated
System
Project
Manuals
Security
Performance
Acceptance
Test
System
© 2007 NetSol Technologies, Inc. All rights reserved
System Life Cycle (Cont…)
 Decommissioning / Disposal
Critical Data Recovered or Destroyed
Media sanitized or destroyed
Software removal
© 2007 NetSol Technologies, Inc. All rights reserved
Software Development Methods
 Waterfall
 Spiral
 Clean-room
 Structured Programming Development
© 2007 NetSol Technologies, Inc. All rights reserved
Software Development Methods
(Cont…)
 Iterative Development
 Joint Analysis Development (JAD)
 Prototyping
 Modified Prototype Model (MPM)
 Explanatory Model
 Rapid Application Development (RAD)
© 2007 NetSol Technologies, Inc. All rights reserved
Software Development Methods
 Reuse Model
 Computer Aided Software Engineering
(CASE)
 Component Based Development
 Extreme Programming
© 2007 NetSol Technologies, Inc. All rights reserved
Additional Software Protection
Mechanisms
 Cryptography
 Access Controls
 Open Source
 Social Engineering Awareness
 Backup and Redundancy Controls
 Malicious Code Control
 Documentation and Common Program Controls
 Testing and Evaluation
 Mobile Code Controls
 Data Containment Controls
Audit & Assurance
Mechanisms
© 2007 NetSol Technologies, Inc. All rights reserved
Auditing and Assurance
Mechanisms
 Information Integrity
 Information Auditing
 Malware Assurance
© 2007 NetSol Technologies, Inc. All rights reserved
Change Management Process
 Formal Request for Change
 Analyze Request for feasibility, Impact, timeline
(security)
 Develop Implementation Strategy
 Approval of Change
 Development of Change
 Implementation & testing of Change
 Review of Change Effectiveness
 Report to Management
© 2007 NetSol Technologies, Inc. All rights reserved
Testing
 Last chance to avoid the disaster
 Testing is intended to find the problems
Tests should address all normal and
unexpected entries and conditions
 Do not compromise privacy with test data
© 2007 NetSol Technologies, Inc. All rights reserved
Configuration Management
 Configuration Management
 Patch Management
 Patch Management Process
© 2007 NetSol Technologies, Inc. All rights reserved
Patch Management
 Potential problem areas:
Distribution System Failures
Inadequate Testing & Validation
Patch Rollback
Load on the network
Stability issues and other regression issues
Database & Data
Warehouse Environment
© 2007 NetSol Technologies, Inc. All rights reserved
Database Environment
 Database Management Systems
Databases – Developed to manage
Information from many sources in one
location
 Eliminates duplication of information
 Preserves storage space
 Prevents inconsistency in data by making changes
in one central location
© 2007 NetSol Technologies, Inc. All rights reserved
Database Environment (Cont…)
 Major Elements
 DBMS Should provide
Transaction Persistence
Fault Tolerance and Recovery
Sharing by Multiple Users
Security Controls
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models
 Hierarchical DBMS
Stores Records in
a single Table
Parent/Child
Relationship
Limited to a single
tree
Difficult to link
branches
Car
Toyota Honda Suzuki
Citi Civic Accord
4-door 2-door
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
 Network DBMS
Represents data as network of records and
sets that are related to each other, forming a
network of links
Record types – records of the same type
Set types – relationship between record types
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
Ford Mazda BMW
Regular
Mazda 6
Truck
ESeries
Regular
Mazda 3
4 x 4
x 3
Truck
Freestar
4 x 4
x 5
5 Speed
Transmission
Leather
Interior
Front & Rear
Climate Controls
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
 Relational DBMS
Most Frequently used DBMS model
Data are structured in tables
Columns represent the variables (attributes)
Rows contain the specific instances (records)
of data
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
Author Table
Author No. Last Name First Name State
123456 Smithson Mary CA
234567 Rogers Mike NY
345678 Tucker Sally CT
456789 Gleason Sarah IL
Tuples/
Rows
Attributes/ColumnsPrimary Key
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
Book Table
Book No. Book Title Book Type Book Price Author No.
B1234 Learning Databases Models Computer 1500
B2345 Data Modeling Techniques 1200 234567
B3456 Designing Databases Computer 1600 123456
B4567 Secrets of Databases Computer 1800 345678
Author Table
Author No. Last Name First Name State
123456 Smithson Mary CA
234567 Rogers Mike NY
345678 Tucker Sally CT
456789 Gleason Sarah IL
Primary Keys Foreign Key
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
 Relational Database Security Issues
Ensuring integrity of input data
Preventing deadlocking
 Access Control
© 2007 NetSol Technologies, Inc. All rights reserved
DBMS Models (Cont…)
 OODBMS & ORDBMS
OODBMS (Object Oriented Database
Management System)
ORDBMS (Object Relational Database
Management System)
© 2007 NetSol Technologies, Inc. All rights reserved
Database Interface Language
 Open Database Connectivity (ODBC)
 Java Database Connectivity (JDBC)
 Extensible Markup Language (XML)
 Structured Query Language (SQL)
© 2007 NetSol Technologies, Inc. All rights reserved
Database Security Issues
 Interface
 Aggregation
 Unauthorized
Access
 Improper
Modification of
Data
 Access Availability
 Query Attacks
 Bypass Attacks
 Interception of
Data
 Web Security
 Data Containment
© 2007 NetSol Technologies, Inc. All rights reserved
View Based Access Controls
 Constrained Views
 Sensitive data is hidden from unauthorized
users
 Controls located in the front-end
application (user interface)
© 2007 NetSol Technologies, Inc. All rights reserved
Data Warehouse
 Consolidated view of enterprise data
 Data Mart
 Designed to support decision making
through data mining
© 2007 NetSol Technologies, Inc. All rights reserved
Building Data Warehouse
 Feed all data into large high security
database
 Normalize the data
 Mine the data for correlations to produce
metadata
 Sanitize and export the metadata to its
intended users
© 2007 NetSol Technologies, Inc. All rights reserved
Metadata
 Information about data
 Provides unseen relationships between
data
© 2007 NetSol Technologies, Inc. All rights reserved
Knowledge Discovery in Database
(KDD)
 Methods of Identifying
patterns in data
 Some KDD methods
use artificial
intelligence (AI)
techniques
 Probabilistic Models
 Statistical Approach
 Classification
Approach
 Deviation & Trend
Analysis
 Neural Networks
 Expert System
Approach
© 2007 NetSol Technologies, Inc. All rights reserved
Online Transaction Processing
(OLTP)
 Record Transactions as they occur – in
real time
 Security concerns are concurrency and
atomicity
 Lock controls
© 2007 NetSol Technologies, Inc. All rights reserved
Lock Controls – The ACID Test
 Atomicity
 Consistency
 Isolation
 Durability
Web Application
Environment
© 2007 NetSol Technologies, Inc. All rights reserved
Web Site Incidents
 Vandalism
 Financial Fraud
 Privileged Access
 Theft of Transaction Information
 Theft of Intellectual Property
 Denial of Service (DoS)
© 2007 NetSol Technologies, Inc. All rights reserved
Web Hacks
 Majority of hacks at the application level
 Firewalls provide minimum protection
 Information Gathering
 Administrative Interfaces
 Configuration Management
 Authentication and Access Control
© 2007 NetSol Technologies, Inc. All rights reserved
Web Hacks (Cont…)
 Input validation
 Parameter Manipulation
 Session Management
© 2007 NetSol Technologies, Inc. All rights reserved
Web Application Security Principles
 Validate all input and output
 Fail Secure (closed)
 Fail Safe
 Make it simple
 Defense in depth
 Only as secure as your weakest link
 Security by obscurity
© 2007 NetSol Technologies, Inc. All rights reserved
Web Application Security Principles
(Cont…)
 Don’t cache secure pages
 Ensure all encryption meets industry
standards
 Monitor third party code vendors for security
alerts
 Handle exceptions properly
 Don’t trust any data from client
 Don’t trust any data from other servers,
partners or other parts of the application
Review Questions
© 2007 NetSol Technologies, Inc. All rights reserved
1. Databases are used to combine the data from
many sources into one discrete source which
of the following is not a reason to create a
database:
a. A database will eliminate the need for data
duplication across many systems
b. A database will preserve storage space
c. A database will prevent inconsistencies in the
data by eliminating multiple copies of data
d. A database will deter insider inference attacks
© 2007 NetSol Technologies, Inc. All rights reserved
2. Database design models have changed over the
years which of the following models places the
data in tables where the rows represent
records and the columns represent attributes?
a. Hierarchical database management system
b. Relational database management system
c. Network database management system
d. Divergent database management system
© 2007 NetSol Technologies, Inc. All rights reserved
3. relational database management systems are used to
show associations between objects contained in the
database. Which of the following best describe foreign
key?
a. A foreign key is used to uniquely identify each row in
the database
b. A foreign key is used to index a database
c. A foreign key is used to link elements of a table
d. A foreign key is used to join one table to the primery
key of another table
© 2007 NetSol Technologies, Inc. All rights reserved
4. In a relational database which of the following is true
concerning a primary key?
a. A primary key must contain a common identifier
associated with all entries into a table
b. A primary key must contain a non-null value in order to
uniquely identify the tuple
c. Primary keys can be identified by their unique number
letter format
d. The use of primary keys is only required in network
database management systems, and does not apply to
RDBMS
© 2007 NetSol Technologies, Inc. All rights reserved
5. Anne in the accounting department, and Bill in auditing
are both attempting to assess an identical value on the
accounts receivable database. Anne assesses the
amount normally, but Bill receives an error message
indicating that he has “read only” access. One possible
reason for the error message is that the database
management system (DBMS) has built-in features to
prevent which of the following?
a. Static access retrieval
b. Automated Queries
c. Inference attacks
d. Deadlocking
© 2007 NetSol Technologies, Inc. All rights reserved
6. Which of the following database attacks
describes an attack where the perpetrator uses
information gained thru authorized activity to
reach conclusion relating to unauthorized
data?
a. Unauthorized access attack
b. Bypass attack
c. SQL attack
d. inference
© 2007 NetSol Technologies, Inc. All rights reserved
7. Acme Corp. performs a nightly data transfer
from all their active databases to a centralized
server. The data is then normalized and the
central server is queried to gain performance
results for all sales locations. This activity
describes which of the followings?
a. Data warehouse
b. RDBMS
c. Data performance analysis
d. Metadata
© 2007 NetSol Technologies, Inc. All rights reserved
8. A database that uses pre-defined grouping of
data that can only be accessed based upon a
user authorization level, uses which of the
following access control models?
a. Role based access control
b. Mandatory access control
c. View based access control
d. Front end delineated access control
© 2007 NetSol Technologies, Inc. All rights reserved
9. An artificial intelligence system that gathers
information from subject matter experts and
attempts to use programmed rules to analyze
problems and suggest a recommended course
of action is called which of the following?
a. Classification approach
b. Probabilistic approach
c. Statistical approach
d. Expert system approach
© 2007 NetSol Technologies, Inc. All rights reserved
10. After being closed for the weekend, on Monday
morning Acme Corp. finds that their servers are running
slow. The CPU utilizations are showing 100%
utilization. Network Traffic is also exceptionally high.
On the close of business on Friday, all systems were
behaving normal. Closer examination is likely to reveal
which of the following infestations?
a. Data Diddler
b. D-DOS Attack
c. Virus
d. Worm
© 2007 NetSol Technologies, Inc. All rights reserved
11. A screen saver that opens an encrypted tunnel
to a website under malicious control with the
purpose of allowing attackers access to the
infected machine is an example of which of the
following malware?
a. Logic Bomb
b. Trojan Horse
c. Virtual Private Network
d. Spyware
© 2007 NetSol Technologies, Inc. All rights reserved
12. One of the most significant differences
between the software development life cycle
and the system life cycle is that the software
development life cycle does not include which
of the following phases?
a. Decommissioning/Disposal
b. Startup/requirements
c. Development/construction
d. Operational testing
© 2007 NetSol Technologies, Inc. All rights reserved
13. Which of the following is not a software
development method?
a. Iterative development
b. Joint Interactive
c. Computer Aided Software Engineering
d. Reuse model
© 2007 NetSol Technologies, Inc. All rights reserved
14. One of the major difference between a software
compiler and a software interpreter is that:
a. A software compiler will translate lines of code on the
fly
b. An interpreter will translate lines of code on the fly
c. A software compiler will convert high level
programming language into assembly code
d. An interpreter will convert high level programming
language into assembly code
© 2007 NetSol Technologies, Inc. All rights reserved
15. The primary key is used to uniquely identify records in a
database. By adding additional variables to the primary
key, two items with the same identifier can be
differentiated. This is often used to prevent inference
attack. Which of the following is best described by this
scenario?
a. Polymorphism
b. Poly-alphabetic
c. Polyinstantiation
d. Polyvariabolic
© 2007 NetSol Technologies, Inc. All rights reserved
16. Common Object Request Broker Architecture
(CORBA) is designed to?
a. Control access to called object modules
b. Prevent objects in one class from affecting
objects in another class
c. Ensure that the calling objects use inheritance
properties properly
d. Determine access permissions for message-
passing operations
© 2007 NetSol Technologies, Inc. All rights reserved
17. Applications can NOT use which of the
following methods to detect system
attacks?
a. Known Signature Scanning
b. Activity Monitoring
c. Change Detection
d. Differential Linear Analysis
© 2007 NetSol Technologies, Inc. All rights reserved
18. Configuration management ensures that approved
changes are implemented as approved. Change
management ensures which of the following?
a. Corporate officers aware of all impending changes
b. Applicable regulatory compliance is adhered to.
c. Changes are submitted, approved and recorded
d. Configuration changes are assigned to the most
qualified individuals
© 2007 NetSol Technologies, Inc. All rights reserved
19. Periodic vendor bug and vulnerability fixes
need to be installed by a patch management
system. These systems are limited in scope by
which of the following.
a. Network bandwidth
b. Version of the operating system under test
c. Limits on agent operation
d. Source code avilability
© 2007 NetSol Technologies, Inc. All rights reserved
20. Accreditation and certification deal with similar security issues.
Which of the following statements is true about certification and
accreditation?
a. Accreditation is the technical analysis of a system to ensure that
specific security requirements are met
b. Certification is technical analysis of a system to ensure that
specific security requirements are met
c. Accreditation is the sign of by the IT staff that the system under
test meets manufacture’s security specifications
d. Certification is the sign of by the IT staff that the system under
test meets manufacture’s security specifications
© 2007 NetSol Technologies, Inc. All rights reserved
21. XYZ corp. has created a new application
for tracking customer information as well
as their product database. Of the
following individuals who should be given
full access and control over this
application?
a. Network administrator
b. No one
c. Security administrator
d. Application developer

More Related Content

What's hot

Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
majolic
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
North Texas Chapter of the ISSA
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
James W. De Rienzo
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
Maurice Dawson
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
Rishabh Gupta
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
John Kingsley
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
Itex Solutions
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
Twinkle Sebastian
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
TheAnfieldGroup
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
evaleng2
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 

What's hot (20)

Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 

Viewers also liked

Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
Dhani Ahmad
 
Database security issues
Database security issuesDatabase security issues
Database security issues
n|u - The Open Security Community
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
Jon Gatrell
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
Professional Education Services
 
Technology, Is That All It Takes
Technology, Is That All It TakesTechnology, Is That All It Takes
Technology, Is That All It Takes
Dr. Mary Mwangi Ed.D
 
God's Pharmacy
God's PharmacyGod's Pharmacy
God's Pharmacy
sanctuary
 
04 извлечение информации
04 извлечение информации04 извлечение информации
04 извлечение информации
Lidia Pivovarova
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
YoCard Freecard Advertising
YoCard Freecard AdvertisingYoCard Freecard Advertising
YoCard Freecard Advertising
yocard
 
Snapshot: Social Media Considerations for Organizations in 15 minutes!
Snapshot: Social Media Considerations for Organizations in 15 minutes!Snapshot: Social Media Considerations for Organizations in 15 minutes!
Snapshot: Social Media Considerations for Organizations in 15 minutes!
Cindy Kendall
 
Hi! I Am Wayne Rooney
Hi! I Am Wayne RooneyHi! I Am Wayne Rooney
Hi! I Am Wayne Rooney
waynerooney
 
120626 gdansk c ai se2012-2
120626 gdansk c ai se2012-2120626 gdansk c ai se2012-2
120626 gdansk c ai se2012-2
Michele Missikoff
 
Martin karlssons vykortssamling st per
Martin karlssons vykortssamling   st perMartin karlssons vykortssamling   st per
Martin karlssons vykortssamling st per
hembygdsigtuna
 

Viewers also liked (16)

Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
 
Technology, Is That All It Takes
Technology, Is That All It TakesTechnology, Is That All It Takes
Technology, Is That All It Takes
 
God's Pharmacy
God's PharmacyGod's Pharmacy
God's Pharmacy
 
04 извлечение информации
04 извлечение информации04 извлечение информации
04 извлечение информации
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
YoCard Freecard Advertising
YoCard Freecard AdvertisingYoCard Freecard Advertising
YoCard Freecard Advertising
 
Snapshot: Social Media Considerations for Organizations in 15 minutes!
Snapshot: Social Media Considerations for Organizations in 15 minutes!Snapshot: Social Media Considerations for Organizations in 15 minutes!
Snapshot: Social Media Considerations for Organizations in 15 minutes!
 
Prietenie
PrieteniePrietenie
Prietenie
 
Hi! I Am Wayne Rooney
Hi! I Am Wayne RooneyHi! I Am Wayne Rooney
Hi! I Am Wayne Rooney
 
120626 gdansk c ai se2012-2
120626 gdansk c ai se2012-2120626 gdansk c ai se2012-2
120626 gdansk c ai se2012-2
 
Martin karlssons vykortssamling st per
Martin karlssons vykortssamling   st perMartin karlssons vykortssamling   st per
Martin karlssons vykortssamling st per
 

Similar to Application Security

Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
Resume_Kapil
Resume_KapilResume_Kapil
Resume_Kapil
Kapil Thakare
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET Journal
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
cscpconf
 
JRBResume
JRBResumeJRBResume
JRBResume
Randy Brown
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
WildhaniIhyaraRahman1
 
Resume_tanmay
Resume_tanmayResume_tanmay
Resume_tanmay
Tanmoy Mitra
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
John572978
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
Java Micro Edition (ME) 8 Deep Dive
Java Micro Edition (ME) 8 Deep DiveJava Micro Edition (ME) 8 Deep Dive
Java Micro Edition (ME) 8 Deep Dive
terrencebarr
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and security
Denis Jakuzza
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
Norman Mayes
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)
Digital Bond
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
Scientia Groups
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
Anil Kumar Pugalia
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 

Similar to Application Security (20)

Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Resume_Kapil
Resume_KapilResume_Kapil
Resume_Kapil
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
JRBResume
JRBResumeJRBResume
JRBResume
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Resume_tanmay
Resume_tanmayResume_tanmay
Resume_tanmay
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Java Micro Edition (ME) 8 Deep Dive
Java Micro Edition (ME) 8 Deep DiveJava Micro Edition (ME) 8 Deep Dive
Java Micro Edition (ME) 8 Deep Dive
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and security
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 

More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master

Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
E commerce Security for end Users
E commerce Security for end UsersE commerce Security for end Users
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Integrating Multiple IT Security Standards
Integrating Multiple IT Security StandardsIntegrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Response To Criticism On E Crime Law
Response To Criticism On E Crime LawResponse To Criticism On E Crime Law

More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master (9)

Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
E commerce Security for end Users
E commerce Security for end UsersE commerce Security for end Users
E commerce Security for end Users
 
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Integrating Multiple IT Security Standards
Integrating Multiple IT Security StandardsIntegrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Response To Criticism On E Crime Law
Response To Criticism On E Crime LawResponse To Criticism On E Crime Law
Response To Criticism On E Crime Law
 

Recently uploaded

Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
AnkitaPandya11
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 

Recently uploaded (20)

Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 

Application Security

  • 1. © 2007 NetSol Technologies, Inc. All rights reserved Application Security by: M. Faisal Naqvi, CISSP Senior Consultant – Information Security NetSol Technologies Ltd.
  • 2. © 2007 NetSol Technologies, Inc. All rights reserved AGENDA  Programming Concepts  Threats and Malware  Software Protection  Audit & Assurance Mechanisms  Database Data Warehouse Environment  Web Application Environment
  • 4. © 2007 NetSol Technologies, Inc. All rights reserved Application vs. Operating System  Project Management Controls Complexity of Systems and Projects Controls Built into Software
  • 5. © 2007 NetSol Technologies, Inc. All rights reserved Generations of Programming Languages  Generation I – Machine Language  Generation II – Assembly Language  Generation III – High-level Language  Generation IV – Very high-level Language  Generation V – Natural Language
  • 6. © 2007 NetSol Technologies, Inc. All rights reserved Programming Languages  COBOL, Fortran  C, C-Plus, C++  SmallTalk, Java, Eiffel  Visual Programming Languages Visual Basic, Visual C, Delphi  BASIC, Logo, JavaScript
  • 7. © 2007 NetSol Technologies, Inc. All rights reserved HTML, XML and ActiveX  HTML  XML  ActiveX
  • 8. © 2007 NetSol Technologies, Inc. All rights reserved Program Utilities  Assembler  Compiler  Interpreter
  • 9. © 2007 NetSol Technologies, Inc. All rights reserved Programming Concepts  System Model  Von Neumann Architecture  Object-Oriented Programming (OOP) Inheritance Polymorphism Polyinstantiation
  • 10. © 2007 NetSol Technologies, Inc. All rights reserved Programming Concepts (Cont…)  Distributed Component Object Model (DCOM)  Common Object Request Broker Architecture (CORBA) Policy Enforcement Code ORB Security System 1. Client Application sends Message 3. Target Object 2. Policy Implemented here
  • 12. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware  Buffer Overflow  Denial of Service  Time of Check/Time of Use (TOC/TOU)
  • 13. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware (Cont…)  Malformed Input Attacks SQL Injection Unicode Attack  Executable Content/Mobile Code Web Applets Dynamic E-mail
  • 14. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware (Cont…)  Object Reuse  Garbage Collection  Trap Door
  • 15. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware (Cont…)  Incomplete Parameter Check and Enforcement  Covert Channels  Inadequate Granularity of Controls  Social Engineering  Multiple Paths to Information
  • 16. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware (Cont…)  Malicious Software Modern malware is network aware Compatibility Platform Dominance Malware Functionality
  • 17. © 2007 NetSol Technologies, Inc. All rights reserved Virus  Reproduction – Central Characteristic  Generally requires some action by the user May or may not carry payloads
  • 18. © 2007 NetSol Technologies, Inc. All rights reserved Virus Types  File Infector  Boot Sector Infector  System Infector  Multipartite  Macro Virus  Script Virus  Hoax
  • 19. © 2007 NetSol Technologies, Inc. All rights reserved Virus Anti-Detection  Stealth  Tunneling  Polymorphism  Antivirus (anti-malware) Disabling
  • 20. © 2007 NetSol Technologies, Inc. All rights reserved Virus Structure  Infection/Reproduction Target Search Infection Avoidance  Trigger  Payload
  • 21. © 2007 NetSol Technologies, Inc. All rights reserved Worm  Reproduces  Generally use loopholes in systems May not involve user  Often attacks server software
  • 22. © 2007 NetSol Technologies, Inc. All rights reserved Trojan Horse  Purported to be a positive utility  Hidden negative payload  Social Engineering
  • 23. © 2007 NetSol Technologies, Inc. All rights reserved Logic Bomb  Generally Implanted by an Insider  Waits for condition or time  Triggers negative payload
  • 24. © 2007 NetSol Technologies, Inc. All rights reserved Diddlers Backdoors and Rats  Data Diddler  Backdoor, Trapdoor  RAT (Remote Access Trojan)
  • 25. © 2007 NetSol Technologies, Inc. All rights reserved Threats & Malware  D-DOS Zombie  Prank  Spyware and Adware  Phishing  BotNets
  • 27. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle  Project Management-based Methodology  Typical Phases of a System Life Cycle
  • 28. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Project Initiation and Planning Establish User Requirements Identify Alternatives Select/Approve Approach Determine Security Requirements Conduct Risk Analysis Define Security Strategy Required Security Activities
  • 29. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Functional Design Definition Develop Project Plan Identify Functional Requirements Set Test Criteria Identify Security Areas Security Tools Include Security Reqs. in RFP’s Contracts Required Security Activities Define Strategy Develop Functional Baseline Establish Security Requirements Include Functional Security Reqs.
  • 30. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Detailed Design Specifications Prepare Detailed Designs Update Testing Goals and Plans Develop Formal Baseline Establish Security Specifications Update Security Test Plans Document Security Baseline Required Security Activities
  • 31. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Develop & Document Develop System Unit Testing & Evaluation Document System Develop Security Code Security Code Evaluation Document Security Code Required Security Activities
  • 32. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Acceptance, Testing and Transition to Production Test Validate Implement Security Components Security Code Security Controls Required Security Activities Document Certify Security in Integrated System Secure Operations Accept Secure System Security Components Integrated System Project Manuals Security Performance Acceptance Test System
  • 33. © 2007 NetSol Technologies, Inc. All rights reserved System Life Cycle (Cont…)  Decommissioning / Disposal Critical Data Recovered or Destroyed Media sanitized or destroyed Software removal
  • 34. © 2007 NetSol Technologies, Inc. All rights reserved Software Development Methods  Waterfall  Spiral  Clean-room  Structured Programming Development
  • 35. © 2007 NetSol Technologies, Inc. All rights reserved Software Development Methods (Cont…)  Iterative Development  Joint Analysis Development (JAD)  Prototyping  Modified Prototype Model (MPM)  Explanatory Model  Rapid Application Development (RAD)
  • 36. © 2007 NetSol Technologies, Inc. All rights reserved Software Development Methods  Reuse Model  Computer Aided Software Engineering (CASE)  Component Based Development  Extreme Programming
  • 37. © 2007 NetSol Technologies, Inc. All rights reserved Additional Software Protection Mechanisms  Cryptography  Access Controls  Open Source  Social Engineering Awareness  Backup and Redundancy Controls  Malicious Code Control  Documentation and Common Program Controls  Testing and Evaluation  Mobile Code Controls  Data Containment Controls
  • 39. © 2007 NetSol Technologies, Inc. All rights reserved Auditing and Assurance Mechanisms  Information Integrity  Information Auditing  Malware Assurance
  • 40. © 2007 NetSol Technologies, Inc. All rights reserved Change Management Process  Formal Request for Change  Analyze Request for feasibility, Impact, timeline (security)  Develop Implementation Strategy  Approval of Change  Development of Change  Implementation & testing of Change  Review of Change Effectiveness  Report to Management
  • 41. © 2007 NetSol Technologies, Inc. All rights reserved Testing  Last chance to avoid the disaster  Testing is intended to find the problems Tests should address all normal and unexpected entries and conditions  Do not compromise privacy with test data
  • 42. © 2007 NetSol Technologies, Inc. All rights reserved Configuration Management  Configuration Management  Patch Management  Patch Management Process
  • 43. © 2007 NetSol Technologies, Inc. All rights reserved Patch Management  Potential problem areas: Distribution System Failures Inadequate Testing & Validation Patch Rollback Load on the network Stability issues and other regression issues
  • 45. © 2007 NetSol Technologies, Inc. All rights reserved Database Environment  Database Management Systems Databases – Developed to manage Information from many sources in one location  Eliminates duplication of information  Preserves storage space  Prevents inconsistency in data by making changes in one central location
  • 46. © 2007 NetSol Technologies, Inc. All rights reserved Database Environment (Cont…)  Major Elements  DBMS Should provide Transaction Persistence Fault Tolerance and Recovery Sharing by Multiple Users Security Controls
  • 47. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models  Hierarchical DBMS Stores Records in a single Table Parent/Child Relationship Limited to a single tree Difficult to link branches Car Toyota Honda Suzuki Citi Civic Accord 4-door 2-door
  • 48. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…)  Network DBMS Represents data as network of records and sets that are related to each other, forming a network of links Record types – records of the same type Set types – relationship between record types
  • 49. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…) Ford Mazda BMW Regular Mazda 6 Truck ESeries Regular Mazda 3 4 x 4 x 3 Truck Freestar 4 x 4 x 5 5 Speed Transmission Leather Interior Front & Rear Climate Controls
  • 50. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…)  Relational DBMS Most Frequently used DBMS model Data are structured in tables Columns represent the variables (attributes) Rows contain the specific instances (records) of data
  • 51. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…) Author Table Author No. Last Name First Name State 123456 Smithson Mary CA 234567 Rogers Mike NY 345678 Tucker Sally CT 456789 Gleason Sarah IL Tuples/ Rows Attributes/ColumnsPrimary Key
  • 52. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…) Book Table Book No. Book Title Book Type Book Price Author No. B1234 Learning Databases Models Computer 1500 B2345 Data Modeling Techniques 1200 234567 B3456 Designing Databases Computer 1600 123456 B4567 Secrets of Databases Computer 1800 345678 Author Table Author No. Last Name First Name State 123456 Smithson Mary CA 234567 Rogers Mike NY 345678 Tucker Sally CT 456789 Gleason Sarah IL Primary Keys Foreign Key
  • 53. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…)  Relational Database Security Issues Ensuring integrity of input data Preventing deadlocking  Access Control
  • 54. © 2007 NetSol Technologies, Inc. All rights reserved DBMS Models (Cont…)  OODBMS & ORDBMS OODBMS (Object Oriented Database Management System) ORDBMS (Object Relational Database Management System)
  • 55. © 2007 NetSol Technologies, Inc. All rights reserved Database Interface Language  Open Database Connectivity (ODBC)  Java Database Connectivity (JDBC)  Extensible Markup Language (XML)  Structured Query Language (SQL)
  • 56. © 2007 NetSol Technologies, Inc. All rights reserved Database Security Issues  Interface  Aggregation  Unauthorized Access  Improper Modification of Data  Access Availability  Query Attacks  Bypass Attacks  Interception of Data  Web Security  Data Containment
  • 57. © 2007 NetSol Technologies, Inc. All rights reserved View Based Access Controls  Constrained Views  Sensitive data is hidden from unauthorized users  Controls located in the front-end application (user interface)
  • 58. © 2007 NetSol Technologies, Inc. All rights reserved Data Warehouse  Consolidated view of enterprise data  Data Mart  Designed to support decision making through data mining
  • 59. © 2007 NetSol Technologies, Inc. All rights reserved Building Data Warehouse  Feed all data into large high security database  Normalize the data  Mine the data for correlations to produce metadata  Sanitize and export the metadata to its intended users
  • 60. © 2007 NetSol Technologies, Inc. All rights reserved Metadata  Information about data  Provides unseen relationships between data
  • 61. © 2007 NetSol Technologies, Inc. All rights reserved Knowledge Discovery in Database (KDD)  Methods of Identifying patterns in data  Some KDD methods use artificial intelligence (AI) techniques  Probabilistic Models  Statistical Approach  Classification Approach  Deviation & Trend Analysis  Neural Networks  Expert System Approach
  • 62. © 2007 NetSol Technologies, Inc. All rights reserved Online Transaction Processing (OLTP)  Record Transactions as they occur – in real time  Security concerns are concurrency and atomicity  Lock controls
  • 63. © 2007 NetSol Technologies, Inc. All rights reserved Lock Controls – The ACID Test  Atomicity  Consistency  Isolation  Durability
  • 65. © 2007 NetSol Technologies, Inc. All rights reserved Web Site Incidents  Vandalism  Financial Fraud  Privileged Access  Theft of Transaction Information  Theft of Intellectual Property  Denial of Service (DoS)
  • 66. © 2007 NetSol Technologies, Inc. All rights reserved Web Hacks  Majority of hacks at the application level  Firewalls provide minimum protection  Information Gathering  Administrative Interfaces  Configuration Management  Authentication and Access Control
  • 67. © 2007 NetSol Technologies, Inc. All rights reserved Web Hacks (Cont…)  Input validation  Parameter Manipulation  Session Management
  • 68. © 2007 NetSol Technologies, Inc. All rights reserved Web Application Security Principles  Validate all input and output  Fail Secure (closed)  Fail Safe  Make it simple  Defense in depth  Only as secure as your weakest link  Security by obscurity
  • 69. © 2007 NetSol Technologies, Inc. All rights reserved Web Application Security Principles (Cont…)  Don’t cache secure pages  Ensure all encryption meets industry standards  Monitor third party code vendors for security alerts  Handle exceptions properly  Don’t trust any data from client  Don’t trust any data from other servers, partners or other parts of the application
  • 71. © 2007 NetSol Technologies, Inc. All rights reserved 1. Databases are used to combine the data from many sources into one discrete source which of the following is not a reason to create a database: a. A database will eliminate the need for data duplication across many systems b. A database will preserve storage space c. A database will prevent inconsistencies in the data by eliminating multiple copies of data d. A database will deter insider inference attacks
  • 72. © 2007 NetSol Technologies, Inc. All rights reserved 2. Database design models have changed over the years which of the following models places the data in tables where the rows represent records and the columns represent attributes? a. Hierarchical database management system b. Relational database management system c. Network database management system d. Divergent database management system
  • 73. © 2007 NetSol Technologies, Inc. All rights reserved 3. relational database management systems are used to show associations between objects contained in the database. Which of the following best describe foreign key? a. A foreign key is used to uniquely identify each row in the database b. A foreign key is used to index a database c. A foreign key is used to link elements of a table d. A foreign key is used to join one table to the primery key of another table
  • 74. © 2007 NetSol Technologies, Inc. All rights reserved 4. In a relational database which of the following is true concerning a primary key? a. A primary key must contain a common identifier associated with all entries into a table b. A primary key must contain a non-null value in order to uniquely identify the tuple c. Primary keys can be identified by their unique number letter format d. The use of primary keys is only required in network database management systems, and does not apply to RDBMS
  • 75. © 2007 NetSol Technologies, Inc. All rights reserved 5. Anne in the accounting department, and Bill in auditing are both attempting to assess an identical value on the accounts receivable database. Anne assesses the amount normally, but Bill receives an error message indicating that he has “read only” access. One possible reason for the error message is that the database management system (DBMS) has built-in features to prevent which of the following? a. Static access retrieval b. Automated Queries c. Inference attacks d. Deadlocking
  • 76. © 2007 NetSol Technologies, Inc. All rights reserved 6. Which of the following database attacks describes an attack where the perpetrator uses information gained thru authorized activity to reach conclusion relating to unauthorized data? a. Unauthorized access attack b. Bypass attack c. SQL attack d. inference
  • 77. © 2007 NetSol Technologies, Inc. All rights reserved 7. Acme Corp. performs a nightly data transfer from all their active databases to a centralized server. The data is then normalized and the central server is queried to gain performance results for all sales locations. This activity describes which of the followings? a. Data warehouse b. RDBMS c. Data performance analysis d. Metadata
  • 78. © 2007 NetSol Technologies, Inc. All rights reserved 8. A database that uses pre-defined grouping of data that can only be accessed based upon a user authorization level, uses which of the following access control models? a. Role based access control b. Mandatory access control c. View based access control d. Front end delineated access control
  • 79. © 2007 NetSol Technologies, Inc. All rights reserved 9. An artificial intelligence system that gathers information from subject matter experts and attempts to use programmed rules to analyze problems and suggest a recommended course of action is called which of the following? a. Classification approach b. Probabilistic approach c. Statistical approach d. Expert system approach
  • 80. © 2007 NetSol Technologies, Inc. All rights reserved 10. After being closed for the weekend, on Monday morning Acme Corp. finds that their servers are running slow. The CPU utilizations are showing 100% utilization. Network Traffic is also exceptionally high. On the close of business on Friday, all systems were behaving normal. Closer examination is likely to reveal which of the following infestations? a. Data Diddler b. D-DOS Attack c. Virus d. Worm
  • 81. © 2007 NetSol Technologies, Inc. All rights reserved 11. A screen saver that opens an encrypted tunnel to a website under malicious control with the purpose of allowing attackers access to the infected machine is an example of which of the following malware? a. Logic Bomb b. Trojan Horse c. Virtual Private Network d. Spyware
  • 82. © 2007 NetSol Technologies, Inc. All rights reserved 12. One of the most significant differences between the software development life cycle and the system life cycle is that the software development life cycle does not include which of the following phases? a. Decommissioning/Disposal b. Startup/requirements c. Development/construction d. Operational testing
  • 83. © 2007 NetSol Technologies, Inc. All rights reserved 13. Which of the following is not a software development method? a. Iterative development b. Joint Interactive c. Computer Aided Software Engineering d. Reuse model
  • 84. © 2007 NetSol Technologies, Inc. All rights reserved 14. One of the major difference between a software compiler and a software interpreter is that: a. A software compiler will translate lines of code on the fly b. An interpreter will translate lines of code on the fly c. A software compiler will convert high level programming language into assembly code d. An interpreter will convert high level programming language into assembly code
  • 85. © 2007 NetSol Technologies, Inc. All rights reserved 15. The primary key is used to uniquely identify records in a database. By adding additional variables to the primary key, two items with the same identifier can be differentiated. This is often used to prevent inference attack. Which of the following is best described by this scenario? a. Polymorphism b. Poly-alphabetic c. Polyinstantiation d. Polyvariabolic
  • 86. © 2007 NetSol Technologies, Inc. All rights reserved 16. Common Object Request Broker Architecture (CORBA) is designed to? a. Control access to called object modules b. Prevent objects in one class from affecting objects in another class c. Ensure that the calling objects use inheritance properties properly d. Determine access permissions for message- passing operations
  • 87. © 2007 NetSol Technologies, Inc. All rights reserved 17. Applications can NOT use which of the following methods to detect system attacks? a. Known Signature Scanning b. Activity Monitoring c. Change Detection d. Differential Linear Analysis
  • 88. © 2007 NetSol Technologies, Inc. All rights reserved 18. Configuration management ensures that approved changes are implemented as approved. Change management ensures which of the following? a. Corporate officers aware of all impending changes b. Applicable regulatory compliance is adhered to. c. Changes are submitted, approved and recorded d. Configuration changes are assigned to the most qualified individuals
  • 89. © 2007 NetSol Technologies, Inc. All rights reserved 19. Periodic vendor bug and vulnerability fixes need to be installed by a patch management system. These systems are limited in scope by which of the following. a. Network bandwidth b. Version of the operating system under test c. Limits on agent operation d. Source code avilability
  • 90. © 2007 NetSol Technologies, Inc. All rights reserved 20. Accreditation and certification deal with similar security issues. Which of the following statements is true about certification and accreditation? a. Accreditation is the technical analysis of a system to ensure that specific security requirements are met b. Certification is technical analysis of a system to ensure that specific security requirements are met c. Accreditation is the sign of by the IT staff that the system under test meets manufacture’s security specifications d. Certification is the sign of by the IT staff that the system under test meets manufacture’s security specifications
  • 91. © 2007 NetSol Technologies, Inc. All rights reserved 21. XYZ corp. has created a new application for tracking customer information as well as their product database. Of the following individuals who should be given full access and control over this application? a. Network administrator b. No one c. Security administrator d. Application developer