secure programming
play

Secure Programming Skoudis, Tom Liston, Prentice Hall Hacking - PDF document

17.2.2016 Course material 2 Counter Hack Reloaded:A Step by Step Guide to Computer Attacks and Effective Defenses, Edward Secure Programming Skoudis, Tom Liston, Prentice Hall Hacking Exposed 7: Network Security Secrets &


  1. 17.2.2016 Course material 2 � Counter Hack Reloaded:A Step by Step Guide to Computer Attacks and Effective Defenses, Edward Secure Programming Skoudis, Tom Liston, Prentice Hall � Hacking Exposed 7: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray, George Kurtz, McGraw Hill Osborne Media Introduction � Secure Coding: Principles and Practices, Mark G. Graff, Kenneth R. Van Wyk, O'Reilly Media 1 � Software Security: Building Security, Ahmet Burak Can Gary McGraw, Addison Wesley Hacettepe University Course material Contents 3 4 � Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a � Introduction to program security, fundementals of secure Networked World, Michael programming Howard, David LeBlanc, 2nd ed. � Attacks based on shell environment flaws Edition, Microsoft Press � Integer overflow attacks � Foundations of Security: What Every � Buffer overflow attacks Programmer Needs To Know, Neil � Input validation attacks, Format string attacks Daswani, Christoph Kern, and Anita � Links and race conditions, Temporary storage and Kesavan randomness problems � Security in Computing, Charles P. � Canonicalization and Directory traversal problems Pfleeger, 3th Edition � Web environment and web applications � And Internet resources.. � Web application and session security, XSS, CSRF attacks, � Security tests and static code analysis tools Grading Policy Which Security Concept? 5 6 � Midterm 45% � Final Exam 50% � Attendance 5% ���������������� ����������������� ����������������� �������������������� 1

  2. 17.2.2016 Security Goals Why Computer Security? 7 8 Computers are under attacks and suffer damages Privacy (secrecy, confidentiality) � � only the intended recipient can see the communication � Who are the attackers? � Authenticity (integrity) � bored teenagers, criminals, organized crime � the communication is generated by the alleged sender organizations, rogue states, industrial espionage, � Authorization angry employees, … � limit the resources that a user can access � Why they do it? � Availability � make the services available 99.999…% of time � enjoyment, fame, profit, … Non repudiation � � computer systems are where the moneys are � no party can refuse the validity of its actions Auditing � � Take a log of everything done in the system How big is the security problem? Computer Security Issues 9 10 CERT Vulnerabilities reported � Computer worms � E.g., Morris worm (1988), Melissa worm (1999) � Computer viruses � Distributed denial of service attacks � Computer break ins � Email spams � E.g., Nigerian scam, stock recommendations � Identity theft � Botnets � Serious security flaws in many important systems � electronic voting machines � Spyware CERT Vulnerabities in 2012 Why does this happen? 11 12 � Lots of buggy software & wrong configurations... � Awareness is the main issue � Some contributing factors � Few courses in computer security � Programming text books do not emphasize security � Few security audits � Unsafe program languages � Programmers are lazy � Consumers do not care about security � Security may make things harder to use � Security is difficult, expensive and takes time https://www.us cert.gov/sites/default/files/US CERT_2012_Trends In_Retrospect.pdf 2

  3. 17.2.2016 What is This Course About? Terminologies 13 14 � Learn how to prevent attacks and/or limit their � Vulnerabilities (weaknesses) : A flaw in software, consequences. hardware, or a protocol that can be leveraged to violate security policies � No silver bullet; man made complex systems will have errors; errors may be exploited � Threats (potential scenario of attack) � Large number of ways to attack � Attack � Large collection of specific methods for specific purposes � Exploit (n) Code that takes advantage of a vulnerability � Learn to think about security when doing things � Exploit (v) To use an exploit to compromise a system through a vulnerability � Learn to understand and apply security principles � Controls (security measures) Security Principles Layers of Computer Systems 15 16 � Principle of weakest link � Computer systems has multiple layers � Principle of adequate protection � Hardware � Goal is not to maximize security, but to maximize utility while limiting risk to an acceptable level within � Operating systems reasonable cost � System software, e.g., databases � Principle of effectiveness � Applications � Controls must be used − and used properly − to be effective. they must be efficient, easy to use, and � Computer systems are connected through networks appropriate � Computer systems are used by humans � Psychological acceptability � Principle of defense in depth � Security by obscurity doesn’t work Why old software can Ethical use of security information 17 18 become insecure? � Security objectives or policies have changed � We discuss vulnerabilities and attacks � Laws have changed � Most vulnerabilities have been fixed � Business model changed � Some attacks may still cause harm � Company processes changed Environment has changed � Do ����� try these at home � � Configuration is out of date � Purpose of this class � Operating system has changed � Learn to prevent malicious attacks � Risks are different � Use knowledge for good purposes � Protections have changed (e.g., firewall rules) � Employees, units responsibilities have changed � Learn about cyber crimes: Vulnerabilities have been found � � https://tr.wikipedia.org/wiki/BiliLim_suçları � Exploits, worms, viruses exploit them � http://www.atamer.av.tr/bilisim suclari/ � Input has changed � e.g., old application made to work online (with a wrapper) � Protocol changed 3

  4. 17.2.2016 Law enforcement 19 � David Smith � Melissa virus: 20 months in prison � Ehud Tenenbaum (“The Analyzer”) � Broke into US DoD computers � sentenced to 18 months in prison, served 8 months � Dmitry Sklyarov � Broke Adobe ebooks � Arrested by the FBI, prosecuted under DMCA, stayed in jail for 20 days � Onur Kıpçak � http://www.hurriyet.com.tr/bilgisayar korsanina 135 yil hapis cezasi daha 40038386 4

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend