Sunteți pe pagina 1din 36

Applications ::

The new Cybersecurity frontier

Mano Paul
CSSLP, CISSP, MCAD, MCSD, CompTIA Network+, ECSA
CEO, SecuRisk Solutions
Mano.Paul(at)SecuRiskSolutions(dot)com

Securitybyte & OWASP Confidential


Who am I?

 (ISC)2’s Software Assurance Advisor


 Founder - SecuRisk Solutions, Express Certifications & AppSentinel
 ISSA – Industry Representative
 Invited Speaker @ OWASP, CSI, Catalyst, SC World Congress, …
 Information Security Program Manager – Dell Inc.
 Author
– Official (ISC)2 Guide to the CSSLP
– Information Security Management Handbook
 Shark Biologist, Bahamas
 SharkTalk podcaster
 On LinkedIn/Facebook/Twitter

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 2
Who I am NOT!

NOT
ME

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 3
What are we here to talk about?

 Cybersecurity
 Applications

 Applications and Cybersecurity

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 4
Live Free or Die Hard

 Matt Farrell: Jesus Christ. It's a fire sale.


 John McClane: What?
 Matt Farrell: It's a fire sale.
 Deputy Director Miguel Bowman: Hey! We don't
know that yet.
 Taylor: Yeah, it's a myth anyway. It can't be done.
 Matt Farrell: Oh, it's a myth? Really? <censored>
 John McClane: Hey, what's a fire sale?
 Matt Farrell: It's a three-step... it's a three-step
systematic attack on the entire national
infrastructure. Okay, step one: take out all the
transportation. Step two: the financial base and
telecoms. Step three: You get rid of all the
utilities. Gas, water, electric, nuclear. Pretty much
anything that's run by computers which... which
today is almost everything. So that's why they call
it a fire sale, because everything must go.
Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 5
Hollywood – not too far from reality

 2007 : Estonia hacked


– Government Ministry & Political parties (Defense)
– Newspapers (Communications)
– Banking and Private Companies (Financial/Utilities)
 2008 : Nation State Georgia – First Cyberwar
 2009 : The Shadow of the Gaza Conflict –
Cyberwar against Israel
 2009 : Brazil Broken (Nov 6th, 2009)
 2010 : Digital Hackistan ?

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 6
Cybersecurity

 Pronounciation: sai-ber-si-kyur-a-te
 Securing Cyberspace
 Kinetic (physical) using Non-kinetic (electronic)
 Definition: Measures taken to protect a
computer or computer system (as on the
Internet) against unauthorized access of attack.
Merriam-Webster’s

“Protecting pretty much anything that


runs by computers – which is everything
today!” – Die Hard Definition

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 7
Why are we where we are?

 Army secures land space


 Airforce secures air space
 Navy secures sea space

 But what about space that


is not land, not air, nor
sea?
– Cyber

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 8
Why are we where we are? – Contd.

 Seconomics ( a new term coined! )


– Cost of insecure software - $180,000,000,000,000
 Wars are won by bits and bytes
– Cyber-chess with an invisible enemy
– Whoever controls the Information can deal the
checkmate
 IT - Internet Terrorism?
– Cyberbullies

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 9
Securing Cyberspace – Easily said than done!

 No borders – Big Firewall


 Highly interconnected
 Short arm of the law
 Privacy invasion
 Polymorphic threats

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 10
Cybersecurity Threat agents

 Human
 Non Human
– Malicious Software
– Technology
• VoIP
• Pervasive computing
• Web 2.0wned - Social Netmares

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 11
Malicious Software a.k.a. Malware

Malware

Proliferative Stealthware

Viruses &
Spyware &
Worms Trojans Rootkits
Adware
(Web Worms)

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 12
Slap in the face-book
Tax Refund
An Oxymoron Is IRS.gov and
Tax.gov the same?
 I had to recently open the ‘Rootkits’ book
 I sent my wife a link on facebook and then
The IRS is pleased? it
What currency
is this?
Hmmm
happened … $ with ,

 Command and control


 Phishing Hooks
Should this not be
the usual
3-5 business days?

facebook
And ofcourse
the legitimate
security warning!
Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 13
What’s in common with these threats?

 Are Applications
 Run Applications
 Exploit Applications
 Applications
– The Weakest Link?

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 14
What’s wiring this evolving world?

 “In the 80’s we wired the world with cables


and in the 90’s we wired the world with
computer networks. Today we are wiring the
world with applications using web services
and mashups. Having skilled professionals
capable of designing and developing secure
software is now critical to this evolving
world.”
Mark Curphey
Director & Product Unit Manager, Microsoft
Founder of OWASP
Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 15
Application a.k.a. Software a.k.a. System

 Abstracted business functionality


 Standalone or SaaS
 Conduits to data

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 16
Dude, where’s my data?

 Data will continue to be the primary motive


behind future cyber crime - whether targeting
traditional fixed computing or mobile
applications. Data will drive cyber attacks for
years to come. The data motive is woven
through all emerging cybersecurity threats,
whether botnets, malware, blended threats,
mobile threats or cyber warfare attacks.
Emerging Cyber Threats Report for 2009

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 17
Agar poolis ko mila tho?

 Sachin: Hey Zara, lag gaya hai, lag


gaya hai; Oot oot sab kuch chod kar
bhag
(Zara, we have been caught; get up,
get up, leave everything and run)

 Sachin: Yeh kya kar raha hai thu?


(What are you doing?)
 Zara: Data hai yis mai hi hai!
(All the data are in these!)
 Zara: Agar poolis ko mila tho?
(What if the police get a hold of it?)

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 18
DAD against CIA – Data issues

 Disclosure - Attack against Confidentiality


 Alteration - Attack against Integrity
 Destruction - Attack against Availability

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 19
Application vulnerabilities – Opening the door to Cybercrime

- Injection
- Script
- Overflow
- Disclosure
- Session
- Cryptographic Source: OWASP Top 10 2007

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 20
What we need – First Steps - Holistic Security!

 People, Process and Technology


 Network, Hosts and Applications

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 21
Securing the Weak Link - People

 SecuriTRAINED
– Aware
– Trained
– Educated
 Certified Secure Software Lifecycle Professional
(CSSLP)

 It’s the People

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 22
Securing the Weak Link - Process

For the first time in


India – 2 day
CSSLP training at
this conference.
2
Source: (ISC) CSSLP Coursework
Don’t miss out!
“The CSSLP Training
will cover each area
in more depth.”

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 23
Process – Secure Design!

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 24
Process – Writing Secure Code

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 25
Secure the Weak Link - Technology

 Tools and Checklists caveat


 Validation & Verification (V&V)
 Certification & Accreditation (C&A)

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 26
Defense in Depth

Software Security
Input validation Session management
Authentication Parameter manipulation
Authorization Cryptography
Sensitive data protection Exception management
Configuration management Auditing / Logging
Web Server Database Server

Firewall
Firewall

Network Security
Routers
Firewalls
Switches
Host Security
Network Patches Accounts Ports
Services Files / directories Registry
Protocols Auditing / logging Shares

Host

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 27
Detained in Brazil/Brasil!

 Let me tell you what happened to me when I


was returning to the USA from Brazil (as the
Americans spell it) / Brasil (as the English spell
it)

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 28
What Next?

 Security in the Skies


– Cloud computing  S2aaS
 Virtualization
 Smart Grids
 Digital ants
 Cybersecure Applications
– Reliable
– Resilient
– Recoverable
– Software seatbelts

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 29
If history is any predictor of the future …

2008 2009 2010

Thank you!
Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 30
Applications ::
The new Cybersecurity frontier

Mano Paul
CSSLP, CISSP, MCAD, MCSD, CompTIA Network+, ECSA
CEO, SecuRisk Solutions
Mano.Paul(at)SecuRiskSolutions(dot)com

Securitybyte & OWASP Confidential


 Backup Slides

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 32
Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 33
CSSLP™ - Certified Secure Software Lifecycle
Professional

 (ISC)2 newest  7 Key Areas


certification – Concepts
 Base credential – Requirements
 Professional – Design
certification program – Implementation
– Testing
 Caters to various
– Acceptance
stakeholders
– Deployment,
Operations,
Maintenance and
Disposal

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 34
Data Protection warrants Application Security!

 In transit
 In storage
 In archives

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 35
What Cybersecurity is Not?

Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 36

S-ar putea să vă placă și