Lecture 15 Page 1 CS 236 Online
Evaluating Existing Systems
- Standards approaches aren’t always
suitable
- Not helpful for evaluating the security
- f running systems
- Not great for custom systems
- What do you do for those problems?
Evaluating Existing Systems Standards approaches arent always - - PowerPoint PPT Presentation
Evaluating Existing Systems Standards approaches arent always suitable Not helpful for evaluating the security of running systems Not great for custom systems What do you do for those problems? Lecture 15 Page 1 CS 236 Online
Lecture 15 Page 1 CS 236 Online
Lecture 15 Page 2 CS 236 Online
Lecture 15 Page 3 CS 236 Online
Lecture 15 Page 4 CS 236 Online
Lecture 15 Page 5 CS 236 Online
Lecture 15 Page 6 CS 236 Online
Lecture 15 Page 7 CS 236 Online
Lecture 15 Page 8 CS 236 Online
Lecture 15 Page 9 CS 236 Online
Lecture 15 Page 10 CS 236 Online
Lecture 15 Page 11 CS 236 Online
1From http://msdn.microsoft.com/en-us/library/ms978527.aspx
Lecture 15 Page 12 CS 236 Online
Lecture 15 Page 13 CS 236 Online
Lecture 15 Page 14 CS 236 Online
Lecture 15 Page 15 CS 236 Online
Lecture 15 Page 16 CS 236 Online
Lecture 15 Page 17 CS 236 Online
personal information
1.1 Gain direct access to database 1.2 Login as target user 1.3 Hijack user session 1.4 Intercept personal data 1.2.1 Brute force password attack 1.2.2 Steal user credentials 1.1.1 Exploit application hole 1.3.1 Steal user cookie 1.4.1 ID user connection 1.4.2 Sniff network
Lecture 15 Page 18 CS 236 Online
1http://blogs.technet.com/b/security/archive/2012/08/23/microsoft-s-free-security-
tools-threat-modeling.aspx
Lecture 15 Page 19 CS 236 Online
Lecture 15 Page 20 CS 236 Online
Lecture 15 Page 21 CS 236 Online
Lecture 15 Page 22 CS 236 Online
Lecture 15 Page 23 CS 236 Online
Lecture 15 Page 24 CS 236 Online