SlideShare a Scribd company logo
Mike Regan & Alex Keller
Systems Administrators   Academic
                       Technology
     San Francisco State University
 When  purchasing hardware, software, or
 services your greatest leverage with the
 vendor is BEFORE YOU BUY. Establishing
 a solid rapport during the pre-sales
 process is critical.
 What   types of security testing have you
  performed?
 Do you have a security contact/team we can
  speak with?
 Has your device/software/service been
  penetration tested? What where the results?
 What protocols and ports are used/required
  for the functionality required?
 What sort of authentication, authorization,
  and encryption technologies do you employ?
   Obtain a demo/trial system and perform your own
    evaluation:
    •   What network interfaces does it have? (Physical inspection)
    •   What ports are exposed? (Nmap port scan)
    •   Is data encrypted in transit? (Wireshark)
    •   Are there any records in the public vulnerability databases?
    •   Google search?
 Ifyou find something interesting, share it with
  the vendor. Is their response antagonistic,
  dismissive, ambivalent, or responsive?
  Their response can tell you a lot about how
  mature their approach to IT security is.
 Product selection is as much an emotional
  process as a technical one, how do you feel
  about the vendor? Are they transparent and
  forthright?
 Ifa full penetration test is merited (planned
  deployment in a high security
  environment), establish protocol for the
  testing in writing from the vendor.
“Vulnerabilities are going to be discovered. The good guys will discover
some and the bad guys will discover some. …All parties interested in
improving the state of information security are going to have to come
together and compromise. We must find a way to address the issues.
Vendors must be notified and held to timely patch development. The
customer must be given the information they need to defend their
systems. Credit and possibly compensation needs to be given to the
discoverer. Finally every effort must be made to keep automated attack
tools out of the hands of script kiddies. Only by addressing these key
issues can we make the
Internet more secure.”
Stephen Shepherd, SANS:
http://www.sans.org/reading_room/whitepapers/threats/define-
responsible-disclosure_932
 The principles of „secure before you buy‟
 can be applied to servers, workstations,
 laptops, handheld devices, network
 equipment, operating systems, software,
 and services….but for the purposes of a
 scoped discussion, we are going to focus
 on the rapidly proliferating world of
 Appliances.
 Purpose    built closed system.
 Embedded OS (Linux, BusyBox, Android,
  Windows, Java)
 No traditional console, configuration is
  typically done by web page, ssh, or serial,
  or USB drive.
 Single function with an emphasis on
  stability.
 Video  streaming set top boxes
 Environmental controls (Lighting, HVAC,
  etc.)
 Alarm and video surveillance systems
 Network storage
 Ancillary device control (projectors,
  screens, lighting etc.)
• System could be used to interrupt legitimate
    services (denial of service attack).
•   System could be used to provide covert
    illegitimate services (illegal file sharing).
•   System could expose of sensitive information.
•   System could be used as a launch or pivot point to
    attack other systems or perform reconnaissance.
•   Sabotage.
 Vulnerability   Databases:
  • http://web.nvd.nist.gov/view/vuln/search
  • http://cve.mitre.org/cve/cve.html
  • http://www.cert.org
 Known Ports and Protocols (Internet
 Assigned Numbers Authority):
  • http://www.iana.org/assignments/service-names-
    port-numbers/service-names-port-numbers.xml
 BackTrack
  http://www.backtrack-linux.org
We welcome further correspondence on this
topic, please pass on our contact
information to your colleagues.

 Mike Regan <gir@sfsu.edu>
 Alex Keller <alkeller@sfsu.edu>
 VulnerabilitySearch:
 http://cve.mitre.org/cve/cve.html

 IPCamera
 http://128.210.72.31/view/indexFrame.sht
 ml

More Related Content

What's hot

Introduction to Penetration testing and tools
Introduction to Penetration testing and toolsIntroduction to Penetration testing and tools
Introduction to Penetration testing and tools
Vikram Khanna
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
Bhavin Shah
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
Virtue Security
 
The Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing ToolsThe Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing Tools
Hacker Combat
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
Exclusive Networks ME
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
SecurityMetrics
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
Anton Chuvakin
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
Cyber 51 LLC
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
AlienVault
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
sakshisoni076
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Lionel Medina
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
AlienVault
 

What's hot (20)

Introduction to Penetration testing and tools
Introduction to Penetration testing and toolsIntroduction to Penetration testing and tools
Introduction to Penetration testing and tools
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
 
The Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing ToolsThe Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing Tools
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 

Viewers also liked

Pp tik tugas slideshare
Pp tik tugas slidesharePp tik tugas slideshare
Pp tik tugas slidesharedhe_chom
 
De ce european
De ce europeanDe ce european
De ce europeanvasilem
 
Heinsohn Nearshoring capabilities
Heinsohn Nearshoring capabilitiesHeinsohn Nearshoring capabilities
Heinsohn Nearshoring capabilities
castilloce
 
Nascar
NascarNascar
Nascar
xavi96
 
Tximeleta power point
Tximeleta power pointTximeleta power point
Tximeleta power pointluciafu
 
People &amp; Performance
People &amp; PerformancePeople &amp; Performance
People &amp; Performance
Anja_Mansur
 
D. Nolan College of the Sequoias In House Online Teaching Certification
D. Nolan College of the Sequoias In House Online Teaching Certification  D. Nolan College of the Sequoias In House Online Teaching Certification
D. Nolan College of the Sequoias In House Online Teaching Certification
DET/CHE Directors of Educational Technology - California in Higher Education
 

Viewers also liked (7)

Pp tik tugas slideshare
Pp tik tugas slidesharePp tik tugas slideshare
Pp tik tugas slideshare
 
De ce european
De ce europeanDe ce european
De ce european
 
Heinsohn Nearshoring capabilities
Heinsohn Nearshoring capabilitiesHeinsohn Nearshoring capabilities
Heinsohn Nearshoring capabilities
 
Nascar
NascarNascar
Nascar
 
Tximeleta power point
Tximeleta power pointTximeleta power point
Tximeleta power point
 
People &amp; Performance
People &amp; PerformancePeople &amp; Performance
People &amp; Performance
 
D. Nolan College of the Sequoias In House Online Teaching Certification
D. Nolan College of the Sequoias In House Online Teaching Certification  D. Nolan College of the Sequoias In House Online Teaching Certification
D. Nolan College of the Sequoias In House Online Teaching Certification
 

Similar to Regan, Keller, SF State Securing the vendor mr&ak

Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI7
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
Varun Mithran
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
Jorge Orchilles
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
jagadeesh katla
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
Damir Delija
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
Casey Wimmer
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
Affine Analytics
 
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro MagazinePentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
cyberprosocial
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
David Kondrup
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ShivamSharma909
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
centralohioissa
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
Amanda Case
 
NetWitness
NetWitnessNetWitness
Information Security 201
Information Security 201Information Security 201
Information Security 201
Null Bhubaneswar
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
Tim Wright
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
Bluechip Gulf IT Services
 

Similar to Regan, Keller, SF State Securing the vendor mr&ak (20)

Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro MagazinePentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
 

More from DET/CHE Directors of Educational Technology - California in Higher Education

Whitmer, Fernandes, Kodai CSU Chico Learner Analytics
Whitmer, Fernandes, Kodai CSU Chico Learner AnalyticsWhitmer, Fernandes, Kodai CSU Chico Learner Analytics
Whitmer, Fernandes, Kodai CSU Chico Learner Analytics
DET/CHE Directors of Educational Technology - California in Higher Education
 
Horn, UC Santa Cruz Google Plus
Horn, UC Santa Cruz Google PlusHorn, UC Santa Cruz Google Plus
Hanley, Christie, Glapa Grossklag Affordable Learning Solutions
Hanley, Christie, Glapa Grossklag Affordable Learning SolutionsHanley, Christie, Glapa Grossklag Affordable Learning Solutions
Hanley, Christie, Glapa Grossklag Affordable Learning Solutions
DET/CHE Directors of Educational Technology - California in Higher Education
 
C. Fornadley UCLA Collab Hosting of Moodle-v2
C. Fornadley UCLA Collab Hosting of Moodle-v2C. Fornadley UCLA Collab Hosting of Moodle-v2
I. Temple CISCO Fueling the Innovative Engine
I. Temple CISCO Fueling the Innovative EngineI. Temple CISCO Fueling the Innovative Engine
G. Pillsbury Stanislaus Online Readiness at Stanislaus
G. Pillsbury Stanislaus Online Readiness at StanislausG. Pillsbury Stanislaus Online Readiness at Stanislaus
G. Pillsbury Stanislaus Online Readiness at Stanislaus
DET/CHE Directors of Educational Technology - California in Higher Education
 
Welcome to DET/CHE
Welcome to DET/CHEWelcome to DET/CHE
Hadsell, Kent Faculty Perceptions of Online Engagement
Hadsell, Kent Faculty Perceptions of Online EngagementHadsell, Kent Faculty Perceptions of Online Engagement
Hadsell, Kent Faculty Perceptions of Online Engagement
DET/CHE Directors of Educational Technology - California in Higher Education
 
R. Katz, Scholars and Scholarship in the Age of Digital Disruption
R. Katz,  Scholars and Scholarship in the Age of Digital DisruptionR. Katz,  Scholars and Scholarship in the Age of Digital Disruption
R. Katz, Scholars and Scholarship in the Age of Digital Disruption
DET/CHE Directors of Educational Technology - California in Higher Education
 
A. Skylar CSUN Online student self assessment
A. Skylar CSUN Online student self assessmentA. Skylar CSUN Online student self assessment

More from DET/CHE Directors of Educational Technology - California in Higher Education (10)

Whitmer, Fernandes, Kodai CSU Chico Learner Analytics
Whitmer, Fernandes, Kodai CSU Chico Learner AnalyticsWhitmer, Fernandes, Kodai CSU Chico Learner Analytics
Whitmer, Fernandes, Kodai CSU Chico Learner Analytics
 
Horn, UC Santa Cruz Google Plus
Horn, UC Santa Cruz Google PlusHorn, UC Santa Cruz Google Plus
Horn, UC Santa Cruz Google Plus
 
Hanley, Christie, Glapa Grossklag Affordable Learning Solutions
Hanley, Christie, Glapa Grossklag Affordable Learning SolutionsHanley, Christie, Glapa Grossklag Affordable Learning Solutions
Hanley, Christie, Glapa Grossklag Affordable Learning Solutions
 
C. Fornadley UCLA Collab Hosting of Moodle-v2
C. Fornadley UCLA Collab Hosting of Moodle-v2C. Fornadley UCLA Collab Hosting of Moodle-v2
C. Fornadley UCLA Collab Hosting of Moodle-v2
 
I. Temple CISCO Fueling the Innovative Engine
I. Temple CISCO Fueling the Innovative EngineI. Temple CISCO Fueling the Innovative Engine
I. Temple CISCO Fueling the Innovative Engine
 
G. Pillsbury Stanislaus Online Readiness at Stanislaus
G. Pillsbury Stanislaus Online Readiness at StanislausG. Pillsbury Stanislaus Online Readiness at Stanislaus
G. Pillsbury Stanislaus Online Readiness at Stanislaus
 
Welcome to DET/CHE
Welcome to DET/CHEWelcome to DET/CHE
Welcome to DET/CHE
 
Hadsell, Kent Faculty Perceptions of Online Engagement
Hadsell, Kent Faculty Perceptions of Online EngagementHadsell, Kent Faculty Perceptions of Online Engagement
Hadsell, Kent Faculty Perceptions of Online Engagement
 
R. Katz, Scholars and Scholarship in the Age of Digital Disruption
R. Katz,  Scholars and Scholarship in the Age of Digital DisruptionR. Katz,  Scholars and Scholarship in the Age of Digital Disruption
R. Katz, Scholars and Scholarship in the Age of Digital Disruption
 
A. Skylar CSUN Online student self assessment
A. Skylar CSUN Online student self assessmentA. Skylar CSUN Online student self assessment
A. Skylar CSUN Online student self assessment
 

Recently uploaded

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Regan, Keller, SF State Securing the vendor mr&ak

  • 1. Mike Regan & Alex Keller Systems Administrators Academic Technology San Francisco State University
  • 2.  When purchasing hardware, software, or services your greatest leverage with the vendor is BEFORE YOU BUY. Establishing a solid rapport during the pre-sales process is critical.
  • 3.  What types of security testing have you performed?  Do you have a security contact/team we can speak with?  Has your device/software/service been penetration tested? What where the results?  What protocols and ports are used/required for the functionality required?  What sort of authentication, authorization, and encryption technologies do you employ?
  • 4. Obtain a demo/trial system and perform your own evaluation: • What network interfaces does it have? (Physical inspection) • What ports are exposed? (Nmap port scan) • Is data encrypted in transit? (Wireshark) • Are there any records in the public vulnerability databases? • Google search?
  • 5.  Ifyou find something interesting, share it with the vendor. Is their response antagonistic, dismissive, ambivalent, or responsive? Their response can tell you a lot about how mature their approach to IT security is.  Product selection is as much an emotional process as a technical one, how do you feel about the vendor? Are they transparent and forthright?
  • 6.  Ifa full penetration test is merited (planned deployment in a high security environment), establish protocol for the testing in writing from the vendor.
  • 7. “Vulnerabilities are going to be discovered. The good guys will discover some and the bad guys will discover some. …All parties interested in improving the state of information security are going to have to come together and compromise. We must find a way to address the issues. Vendors must be notified and held to timely patch development. The customer must be given the information they need to defend their systems. Credit and possibly compensation needs to be given to the discoverer. Finally every effort must be made to keep automated attack tools out of the hands of script kiddies. Only by addressing these key issues can we make the Internet more secure.” Stephen Shepherd, SANS: http://www.sans.org/reading_room/whitepapers/threats/define- responsible-disclosure_932
  • 8.  The principles of „secure before you buy‟ can be applied to servers, workstations, laptops, handheld devices, network equipment, operating systems, software, and services….but for the purposes of a scoped discussion, we are going to focus on the rapidly proliferating world of Appliances.
  • 9.  Purpose built closed system.  Embedded OS (Linux, BusyBox, Android, Windows, Java)  No traditional console, configuration is typically done by web page, ssh, or serial, or USB drive.  Single function with an emphasis on stability.
  • 10.  Video streaming set top boxes  Environmental controls (Lighting, HVAC, etc.)  Alarm and video surveillance systems  Network storage  Ancillary device control (projectors, screens, lighting etc.)
  • 11.
  • 12. • System could be used to interrupt legitimate services (denial of service attack). • System could be used to provide covert illegitimate services (illegal file sharing). • System could expose of sensitive information. • System could be used as a launch or pivot point to attack other systems or perform reconnaissance. • Sabotage.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.  Vulnerability Databases: • http://web.nvd.nist.gov/view/vuln/search • http://cve.mitre.org/cve/cve.html • http://www.cert.org  Known Ports and Protocols (Internet Assigned Numbers Authority): • http://www.iana.org/assignments/service-names- port-numbers/service-names-port-numbers.xml  BackTrack http://www.backtrack-linux.org
  • 18. We welcome further correspondence on this topic, please pass on our contact information to your colleagues. Mike Regan <gir@sfsu.edu> Alex Keller <alkeller@sfsu.edu>
  • 19.  VulnerabilitySearch: http://cve.mitre.org/cve/cve.html  IPCamera http://128.210.72.31/view/indexFrame.sht ml

Editor's Notes

  1. Throw in the floor mats before you sign the papers.
  2. ISO 9001quality and business management framework
  3. Matrix with values to quantify how you feel about it.
  4. Their response will tell you a lot about them.If they are antagonist, they may be uninformed or trying to hide something. Share/compare your penetration test results with the vendor. Buying decisions are usually emotional not logical. You’re going to buy the product you feel the best about. This should help you get a better feeling for the most secure one.
  5. Washing machine. Closed systems present a unique security challenge in that the customer has little visibility into the device.Depend on the Maytag repair man for fixes.
  6. http://72.55.9.132/#http://70.119.185.121/user_view_S.htmintitle:”Toshiba Network Camera” user login