SlideShare a Scribd company logo
1 of 18
 What is software security ?
 Understanding the role that software plays
 in providing security
 as source of insecurity
 Principles, methods & technologies to make
software more secure
 Practical experience with some of these
 Typical threats & vulnerabilities in software, and
how to avoid them
 Software plays a major role in providing
security, and is a major source of security
problems
 Software security does not get much attention
 In programming courses
 Many future programmers have little training on software security
 In software company’s goal
 We focus on software security, but don’t forget that security is
about many things:
 people
 human computer interaction, HCI
 Attackers, users, employees, sys-admins, programmers
 access control, passwords, biometrics
 cryptology, protocols
 Monitoring, auditing, risk management
 Policy, legislation
 public relations, public perception
 ….
 Security Concepts and Goals
 Security is about regulating access to assets
 E.g., information or functionality
 Software provides functionality
 E.g., on-line exam results
 This functionality comes with certain risks
 E.g., what are risks of on-line exam results?
 Privacy (score leakage); Modification
 Software security is about managing these risks
 Software and Security
 Software and Security
 Security is always a secondary concern
 Primary goal of software is to provide functionalities or services
 Managing associated risks is a derived/secondary concern
 There is often a trade-off/conflict between
 security
 functionality & convenience
 Security achievement is hard to evaluate when
nothing bad happens
 Starting Point for Ensuring Security
 Any discussion of security should start with an
inventory of
 the stakeholders (owners, companies…)
 their assets (data, service, customer info…)
 the threats to these assets (erase, steal…)
 Attackers
 employees, clients, script kiddies, criminals
 Any discussion of security without understanding
these issues is meaningless
 Security Objectives: CIA
 Confidentiality (or secrecy)
 unauthorized users cannot read information
 Integrity
 unauthorized users cannot alter information
 Availability
 authorized users can always access information
 Non-repudiation for accountability
-- authorized users cannot deny actions
 The well-known trio
 confidentiality, integrity, avaliability (CIA)
 There are more “concrete” goals
 traceability and auditing (forensics)
 monitoring (real-time auditing)
 multi-level security
 privacy & anonymity
 ...
 and meta-property
 assurance – that the goals are met
Security Goals
 Authentication
 who are you?
 Access control/Authorization
 control who is allowed to do what
 this requires a specification of who is allowed to do what
 Auditing
 check if anything went wrong
 Action
 if so, take action
 How to Realize Security Objectives? AAAA
 information disclosure
 confidentiality
 tampering with information
 integrity
 denial-of-service (DoS)
 availability
 spoofing
 authentication
 unauthorized access
Threats vs Security
Requirements
 SSH was meant to provide security, namely as countermeasure against
eavesdropping on network, but is a source of new vulnerabilities
 Crypto is not the cause of these vulnerabilities, and could not
solve/prevent these vulnerabilities
 Protocol, implementation errors (e.g., WEP in WiFi)
 Programming errors (buffer overflow)
 Distribution errors (trojan)
 Bruce Schneier: “Currently encryption is the strongest link we have. Everything else is
worse: software, networks, people. There's absolutely no value in taking the strongest link
and making it even stronger”
Example: insecurities in SSH
Two Sides to Software Security
 What are the methods and technologies, available to us
if we want to provide security?
 security in the software development lifecycle
 engineering & design principles
 security technologies
 What are the methods and technologies available to
the enemy who wants to break security ?
 What are the threats and vulnerabilities we’re up against?
 What are the resources and tools available to attackers?
Security in Software Development Life Cycle
 Threat Modeling
 Aka security/risk/requirements analysis
 A first step, not just for software
 Identify assets & stakeholders
 Consider architecture of application & its environment
 Brainstorm about known threats
 Define security assumptions
 Rank threats by risk
 ≈ impact x likelihood
 Decide which threats to respond to
 Decide how to mitigate these threats
 which techniques & technologies
 Spoofing Identity
 authentication, protect keys & passwords, ...
 Tampering with Data
 access control, hashes, digital signatures, MACs (message authentication codes), write-once
storage...
 Repudiation
 logging, audit trails, digital signatures, ...
 Information Disclosure
 access control, encryption, not storing secrets, ...
 Denial of Service
 graceful degradation, filtering, increase server resources
 Elevation of Privilege
Example Techniques to Mitigate Threats
 Potential threats to the e-mail system
 Eavesdropping on e-mail
 Communication over the Internet is relatively easy to eavesdrop
 Hence, content of e-mail is by no means confidential
 Critical information can be encrypted and in email attachment
 Modifying e-mail
 Interception of the communication (e.g. between the two MTS’s) allows an attacker to modify the e-mail
 Hence, integrity of the e-mail is not guaranteed
 Spoofing e-mail
 MTS blindly believes other MTS about who the sender of the e-mail is
 Hence, no guarantee about the identity of the sender
 Attacks against the mail servers
 Server is a “trusted software layer”, making a limited functionality (sending/receiving mail) available to all
clients

More Related Content

Similar to Unit-I PPT.pptx

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Importance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxImportance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxwowinfotech
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
Secure Software Development: Why It Matters.
Secure Software Development: Why It Matters.Secure Software Development: Why It Matters.
Secure Software Development: Why It Matters.Arthur Evans
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Computer security priciple and practice
Computer security   priciple and practiceComputer security   priciple and practice
Computer security priciple and practiceYUSRA FERNANDO
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Introduction_Software Security.pptx
Introduction_Software Security.pptxIntroduction_Software Security.pptx
Introduction_Software Security.pptxssuser6e5862
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 

Similar to Unit-I PPT.pptx (20)

Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Importance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxImportance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptx
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
Secure Software Development: Why It Matters.
Secure Software Development: Why It Matters.Secure Software Development: Why It Matters.
Secure Software Development: Why It Matters.
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
information security management
information security managementinformation security management
information security management
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Computer security priciple and practice
Computer security   priciple and practiceComputer security   priciple and practice
Computer security priciple and practice
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Introduction_Software Security.pptx
Introduction_Software Security.pptxIntroduction_Software Security.pptx
Introduction_Software Security.pptx
 
Website security
Website securityWebsite security
Website security
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 

Recently uploaded

Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 

Recently uploaded (20)

Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 

Unit-I PPT.pptx

  • 1.  What is software security ?  Understanding the role that software plays  in providing security  as source of insecurity  Principles, methods & technologies to make software more secure  Practical experience with some of these  Typical threats & vulnerabilities in software, and how to avoid them
  • 2.  Software plays a major role in providing security, and is a major source of security problems  Software security does not get much attention  In programming courses  Many future programmers have little training on software security  In software company’s goal
  • 3.  We focus on software security, but don’t forget that security is about many things:  people  human computer interaction, HCI  Attackers, users, employees, sys-admins, programmers  access control, passwords, biometrics  cryptology, protocols  Monitoring, auditing, risk management  Policy, legislation  public relations, public perception  ….
  • 5.  Security is about regulating access to assets  E.g., information or functionality  Software provides functionality  E.g., on-line exam results  This functionality comes with certain risks  E.g., what are risks of on-line exam results?  Privacy (score leakage); Modification  Software security is about managing these risks  Software and Security
  • 6.  Software and Security  Security is always a secondary concern  Primary goal of software is to provide functionalities or services  Managing associated risks is a derived/secondary concern  There is often a trade-off/conflict between  security  functionality & convenience  Security achievement is hard to evaluate when nothing bad happens
  • 7.  Starting Point for Ensuring Security  Any discussion of security should start with an inventory of  the stakeholders (owners, companies…)  their assets (data, service, customer info…)  the threats to these assets (erase, steal…)  Attackers  employees, clients, script kiddies, criminals  Any discussion of security without understanding these issues is meaningless
  • 8.
  • 9.  Security Objectives: CIA  Confidentiality (or secrecy)  unauthorized users cannot read information  Integrity  unauthorized users cannot alter information  Availability  authorized users can always access information  Non-repudiation for accountability -- authorized users cannot deny actions
  • 10.  The well-known trio  confidentiality, integrity, avaliability (CIA)  There are more “concrete” goals  traceability and auditing (forensics)  monitoring (real-time auditing)  multi-level security  privacy & anonymity  ...  and meta-property  assurance – that the goals are met Security Goals
  • 11.  Authentication  who are you?  Access control/Authorization  control who is allowed to do what  this requires a specification of who is allowed to do what  Auditing  check if anything went wrong  Action  if so, take action  How to Realize Security Objectives? AAAA
  • 12.  information disclosure  confidentiality  tampering with information  integrity  denial-of-service (DoS)  availability  spoofing  authentication  unauthorized access Threats vs Security Requirements
  • 13.  SSH was meant to provide security, namely as countermeasure against eavesdropping on network, but is a source of new vulnerabilities  Crypto is not the cause of these vulnerabilities, and could not solve/prevent these vulnerabilities  Protocol, implementation errors (e.g., WEP in WiFi)  Programming errors (buffer overflow)  Distribution errors (trojan)  Bruce Schneier: “Currently encryption is the strongest link we have. Everything else is worse: software, networks, people. There's absolutely no value in taking the strongest link and making it even stronger” Example: insecurities in SSH
  • 14. Two Sides to Software Security  What are the methods and technologies, available to us if we want to provide security?  security in the software development lifecycle  engineering & design principles  security technologies  What are the methods and technologies available to the enemy who wants to break security ?  What are the threats and vulnerabilities we’re up against?  What are the resources and tools available to attackers?
  • 15. Security in Software Development Life Cycle
  • 16.  Threat Modeling  Aka security/risk/requirements analysis  A first step, not just for software  Identify assets & stakeholders  Consider architecture of application & its environment  Brainstorm about known threats  Define security assumptions  Rank threats by risk  ≈ impact x likelihood  Decide which threats to respond to  Decide how to mitigate these threats  which techniques & technologies
  • 17.  Spoofing Identity  authentication, protect keys & passwords, ...  Tampering with Data  access control, hashes, digital signatures, MACs (message authentication codes), write-once storage...  Repudiation  logging, audit trails, digital signatures, ...  Information Disclosure  access control, encryption, not storing secrets, ...  Denial of Service  graceful degradation, filtering, increase server resources  Elevation of Privilege Example Techniques to Mitigate Threats
  • 18.  Potential threats to the e-mail system  Eavesdropping on e-mail  Communication over the Internet is relatively easy to eavesdrop  Hence, content of e-mail is by no means confidential  Critical information can be encrypted and in email attachment  Modifying e-mail  Interception of the communication (e.g. between the two MTS’s) allows an attacker to modify the e-mail  Hence, integrity of the e-mail is not guaranteed  Spoofing e-mail  MTS blindly believes other MTS about who the sender of the e-mail is  Hence, no guarantee about the identity of the sender  Attacks against the mail servers  Server is a “trusted software layer”, making a limited functionality (sending/receiving mail) available to all clients