<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-17906156</id><updated>2026-03-26T20:42:47.416-04:00</updated><category term="Threats And Countermeasures"/><category term="Secure Coding"/><category term="Presentations And Publications"/><category term="OWASP"/><category term="Software Security Frameworks"/><category term="Security Training"/><category term="Compliance"/><category term="Threat Modeling"/><category term="Security Tests"/><title type='text'>Writing Secure Software</title><subtitle type='html'>Secure software engineering and risk management strategies for building secure web applications</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default?alt=atom&amp;start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>60</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-17906156.post-717506759211146488</id><published>2012-09-15T13:54:00.001-04:00</published><updated>2014-04-13T05:02:33.075-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threat Modeling"/><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>PASTA Process for Attack Simulation and threat analysis (PASTA) Risk-centric Threat Modeling</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTNYMCSYeYPCP-QM0Hq6dhwhyWYO33qTHDhe1oNoezO40tNO9wEHU-sZz8NRNFAkUUH50W9TRIQXXkLLTiXzwaRN-ypLAugbicsa4QxdC3HktBlfgXLme468Dsk15xCRStkfVE/s1600/castle.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTNYMCSYeYPCP-QM0Hq6dhwhyWYO33qTHDhe1oNoezO40tNO9wEHU-sZz8NRNFAkUUH50W9TRIQXXkLLTiXzwaRN-ypLAugbicsa4QxdC3HktBlfgXLme468Dsk15xCRStkfVE/s200/castle.jpg&quot; height=&quot;200&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Castle under siege&lt;br /&gt;
(Source Wikipedia)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;Information security is about protecting digital assets from threats, software security is about designing and implementing software that is not vulnerable to threat agents seeking to exploit design flaws and bugs to compromise digital assets. Traditionally software security has been driven by the need to identify vulnerabilities with specific tests such as static source code analysis and fix them prior to release software products in production. Today this traditional defensive approach toward software security security cannot cope with increasing level of sophistication and impact of cyber-threats such as financial fraud and massive compromises of confidential data. I therefore advocate we need a new approach in software security that considers the attacker perspective while designing and implementing software. &lt;b&gt;Let&#39;s start this new approach by considering threats and attacks while designing and implementing security controls such as setting security requirements. Let&#39; s design, implement and security test new countermeasures so that the software is both threat resilient and attack proof&lt;/b&gt;. This blog is about educating people on how to write secure software and to manage the different risks of insecure software. Security engineering and risk management are part of the solution of secure software and these are not only responsibility of software developers but the software organization as a whole that includes application architects, information security officers, chief technology officers, risk managers and least and not last business owners. Software security requires collaboration between engineering and security teams. It requires business and risk managers to together seeking to improve engineering processes and minimize risks. Software security is not the end goal but a process that allows to reduce risks to a level that the business is willing to accept. &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;b&gt;Software security is more journey than a destination, it is an on going mission and an opportunity to reduce risks to the business through continuous process improvements.&lt;/b&gt;&amp;nbsp;Indeed we made improvements in software security. For example, &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;the average software developed today has fewer number of vulnerabilities than had in the past, &amp;nbsp;say six, ten years ago. This is due to the availability of better tools for testing software vulnerabilities and to the effort of security vendors and organizations &amp;nbsp;whose mission has been improving the security of web applications like OWASP. Nevertheless, d&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;espite the progress made in software security, we are far from writing and building software that can be considered resilient to today&#39;s threats and attacks. There is still a lot of work to do in software security. To know how much work, think about software security as a metaphor of car safety.&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;b&gt;&amp;nbsp;In automobile industry metaphorical terms, the state of the art of countermeasures built in today&#39;s software are like &lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;&lt;b&gt;air bags that inflate after a car crash accident had occurred.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 17px;&quot;&gt;Consider for example that it takes months on the average for a company to detect a data breach incident (based upon&amp;nbsp;&lt;a href=&quot;http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf&quot;&gt;Verizon data breach reports&lt;/a&gt;) since the time the security accident had occurred. &amp;nbsp;Most of &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;data breaches today are detected after the data has been lost, similarly to air bags that detect car crashes and explode after the passengers are either already dead or injured.&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&amp;nbsp;Unfortunately, there is no air bag equivalent security measure in software today and there is not car crash test equivalent to test security measures.&lt;/span&gt;&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYs87SOQsudcgtvM4wUGag2QtQqVlPqqsW7liHfQdu4dFPKmdnUxB_9JFZMMCR1bKJ5_TB6EPR7Kc1iERozAHyWIl79u1dIQVRxHpTJ2r2ZWxIbMpaum36g37nFrzO5Ei9ifvg/s1600/air_bag_safety_facts.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYs87SOQsudcgtvM4wUGag2QtQqVlPqqsW7liHfQdu4dFPKmdnUxB_9JFZMMCR1bKJ5_TB6EPR7Kc1iERozAHyWIl79u1dIQVRxHpTJ2r2ZWxIbMpaum36g37nFrzO5Ei9ifvg/s200/air_bag_safety_facts.jpg&quot; height=&quot;186&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Car Air Bag&lt;br /&gt;
(Source&amp;nbsp;http://www.airbagecu.com/)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;Also consider the inherent risks due to the high value of the data assets and the critical business functions that software stores and process today such as software that runs critical industrial systems like SCADA and runs oil, gas, water and electric utilities, that control manufacturing, traffic controls and mission critical systems for the military. In the financial industry, this is the critical software that handles payments,allows to trade stocks and bonds seldom for million of dollars per transaction. A little bit closer to our every day experience as consumers, consider software for online purchases and that processes and stores credit cards data. &lt;b&gt;Software that is critical for business functions and for the operation of critical business services is today under the focus of&amp;nbsp;persistent attackers and need adequate countermeasures.&amp;nbsp;&lt;/b&gt;Let me try to use the car analogy for highly sought targets from attackers.&amp;nbsp;This would be like the limousine car carrying the president of the United States for a state visit trip. Because of the threats that the presidential car might face, it would need at least high grade security built into the car like bullet proof glass and doors. Other cars with secret service agents would escort the presidential car as well to provide a layered defense. The presidential car is not built with the protection of an average car and is not given average security protection. This is because the president is an highly value asset and needs extra level of protection. Similarly, business critical software is an high value asset that needs a level of security that is higher than commercial off the shelf software. For example, business critical software need at minimum additional layers of preventive and detective security. Yet business critical software today is engineered by following more or less the same design of countermeasures of average software that is 20 years behind today car safety standard technology such as air bags. So I hope you got my point with the car metaphor.&lt;b&gt;&amp;nbsp;Today&#39;s software security is not adequate because is not resilient enough to cope with the new threat landscape. &lt;/b&gt;Today software applications that protect critical company and government digital assets are under the siege of motivated threat agents and persistent attacks. In today threat landscape, business critical software would need the equivalent security of a tank or a bullet proof car. &amp;nbsp;So how we can catch up with the threats ? We need to work toward more&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;&amp;nbsp;resilient and attack proof software. &amp;nbsp;We need to design and implement countermeasures that make more costly for attackers to bypass. We need &amp;nbsp;preventive and detective controls to evolve to effectively detect fraud and prevent fraud and identity theft. We need to move on from infrastructure and perimeter security as network firewalls and intrusion detection systems were good security measures to protect from the cyber attacks of the late 90s and not adequate to protect from today&#39;s threats. Because of this, today&#39;s cybercrime is an industry that strives with profits of several millions of dollars for cyber criminals by selling malware that is designed to hack into the consumers bank accounts and steal credit card data. &amp;nbsp;Today cybercrime tool vendors offer a money back guarantee to a fraudster in case a cybercrime tools won&#39;t provide the financial gain that was sought (e.g. stealing money from bank accounts). Yes, in the mean time we worked to build more secure software, the cybercrime industry did not waste time and our effort of securing software today is not catching up with the threats we face.&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;&lt;b&gt;Not to underscore the progress we made in software security, if you read the the 2006&amp;nbsp;&lt;a href=&quot;http://www.google.co.uk/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=6&amp;amp;cad=rja&amp;amp;ved=0CEIQFjAF&amp;amp;url=http%3A%2F%2Fwww.cert.org%2Fbooks%2Fsecureswe%2FSecuritySL.pdf&amp;amp;ei=zbBVUJ3SK5C20QXWw4CwAg&amp;amp;usg=AFQjCNFM1eb2aFk4f7yIcw5a79uljtrmwg&amp;amp;sig2=z9DTqEjTMbSr2i__vzqo0A&quot;&gt;DHS Security in the SDLC (S-SDLC) &lt;/a&gt;guidelines, we can say that after 6 years, most of software organizations conduct penetration tests and some even have deployed static source code analysis tools that automate the process to identify vulnerabilities in source code&lt;/b&gt;. This means there are fewer number of vulnerabilities available to exploit by the attackers. We also have software security maturity models like BSIMM that help software development organizations to compare their software security practices among peers and focus their security efforts in the security domains and activities that need the most effort. This is all good but not enough because the threat landscape has changed and the exposure of software to cyber threats has increased dramatically. Consider the widespread use of software for mobile applications and the millions of people storing personal data on social networking sites. Consider the corporate data stored and processed by software in the cloud and the software that processes and stores personal identifiable information such as voice fingerprints for authentication and user&#39;s images for a person identification. &lt;b&gt;Today, there is a disconnect between the escalation of cyber threats, the increased exposure of software to cyber threats and the effectiveness of the countermeasures for protecting and detecting cyber threats. &lt;/b&gt;Today software security&lt;b&gt;&amp;nbsp;&lt;/b&gt;need to evolve and bake in new countermeasures that need to work like a car air bag. Since Microsoft released a&lt;a href=&quot;http://en.wikipedia.org/wiki/Threat_model&quot;&gt; threat modeling&lt;/a&gt; methodology ten years ago, we had a software centric based approach to design secure software that considered threats against software components including data assets. This methodology is based on a simplified view of threats such as STRIDE (Spoofing Tampering Repudiation, Information Disclosure, Denial of Service and Elevation of Privileges). This type of threat modeling today is not adequate for designing secure software because threats and attacks have evolved from the basic threats. Consider the example of an attacker using an interface that takes credit card information not to steal credit card data but to enumerate which credit card numbers are valid so can be used for online purchases or counterfeit credit cards. This is a type of threat that STRIDE does not categorizes because is tied to business impact not technical impact. Today attacks against application&#39;s software not only seek to compromise the data assets but also to abuse the critical application functionality. &amp;nbsp;In a today threat model, the analysis of use and abuse cases and of business impacts caused by vulnerability exploits are essential to identify countermeasures and mitigating business risks.&amp;nbsp;&lt;b&gt;The attack surface of today&#39;s applications has also become wider including all the available application interfaces and channels that are exposed to a potential attacker. &lt;/b&gt;In enterprise wide software and applications the targets are not just one software component or library but the whole services provided to customers and partners. An attacker will seek to compromise different channels that lead to the data assets such as online, mobile and B2B channels and in the cloud where data is either stored or processed.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://vimeo.com/33068393&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK7PGTYqNo03cxcZh1zm3YnahIQWNag52tocgn8GpqeptJP1-ajFAckQPHtk9UDKlvALtuYP0NzdWAscfYdQrbrDzsA4giYEyxhNpJMO-l-L615XT_0LjJUH-niAGGhkdiu3iO/s200/tony+uv.jpg&quot; height=&quot;146&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://vimeo.com/33068393&quot;&gt;Tony UV Gives a talk on P.A.S.T.A. Threat Modeling&lt;br /&gt;ATL BSides Conference in Atlanta, 2011&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;b&gt;A comprehensive threat model today need to analyze the abuse of software and application functionality by an attacker to determine the possible business impacts. Today&#39;s software need to be tested with the equivalent of car crash tests to probe the security measures in place assuming that a compromise of one measure won&#39;t result on a catastrophic loss of the assets such as data and critical business functions. &lt;/b&gt;As I saw the need of a new way to look at threats, vulnerabilities and attacks, I embarked with my friend Tony Ucedavelez CEO of Versprite in a passionate effort to develop a new process for the analysis of cyber threats by focusing on business impacts and with the ultimate objective of protecting the company digital assets such as data and critical business functions. This is not a stand alone threat model for software developers but a risk framework that can be used by organizations to analyze the impacts to the assets and critical business functions assuming these can be attacked and compromised. This means to consider the attack as a mean to the attacker goals. The foundation of this application threat modeling methodology is a new risk framework and process. This threat modeling process consists on the &quot;Process for Attack Simulation and Threat Analysis&quot; (P.A.S.T.A). Pasta is a food metaphor for threat and attacks and it is used to educate security people to threat and attack analysis. Using the food metaphor, pasta is taught as the basic ingredient for cooking quality meals as threat modeling is the basic ingredient to build secure applications. Since an attack describes how a threat is realized, this methodology outlines the steps for analyzing threats and attacks and build countermeasures as a recipe for cooking good pasta. &amp;nbsp;The modeling threats and attacks, threat modeling drives the design of protective and detective measures to minimize business impacts. For example, the correlation of attacks to possible exploits of vulnerabilities can be used to design preventive and detective measures. Since we need tools to conduct this process and the correlation between threats, attacks and vulnerabilities, we convinced the company, &lt;a href=&quot;http://www.myappsecurity.com/&quot;&gt;myAppSecurity Inc&lt;/a&gt; to develop the threat modeling &lt;a href=&quot;http://www.myappsecurity.com/wp-content/uploads/2011/09/Manage-Your-Risk-With-ThreatModeler-OWASP.pdf&quot;&gt;tool&lt;/a&gt; to support this process. The tool threatModeler (TM) &amp;nbsp;helps software developers in conducting the steps of the methodology and produce threat models of the applications. In the mean time, Tony UV and I started giving talks about threat modeling by attending several security conferences (e.g. &lt;a href=&quot;http://imi.nku.edu/security/Powerpoints/Marco_Morana.pdf&quot;&gt;Universitie&lt;/a&gt;s, &lt;a href=&quot;https://www.owasp.org/images/5/5f/Marco_Morana_and_Tony_UV_-_Threat_Modeling_of_Banking_Malware.pdf&quot;&gt;OWASP&lt;/a&gt;, &lt;a href=&quot;http://vimeo.com/16325432&quot;&gt;BSides&lt;/a&gt;). We spent the last three years learning what works and what does not work. Education of software engineers and software security professionals in threat modeling is key for success. Also in most of software development organizations today, threat modeling is misunderstood as software security methodology. For this reason, it is either missing as S-SDLC activity or it is considered &amp;nbsp;as complimentary of other consulting security engagements such as pen testing and secure code reviews. Instead &lt;b&gt;threat modeling is central to the application security risk mitigation strategy since allows to map threats to attacks and attacks to vulnerabilities and to highlight the exposure to threats of the data and critical business functions. Threat modeling allows the business to understand the risks of the exposure of data assets by vulnerabilities and the determine the effectiveness of security measures in place.&lt;/b&gt;&amp;nbsp;&lt;b&gt;Threat modeling allows to perform a defense in depth analysis by determining how defenses can be bypassed by an attacker and identify where layered controls need to be implemented. Threat modeling allows to model the abuse cases of critical business functions so these can be used to crash test security measures and to determine how effective these are for protecting and detecting from the attacks.&lt;/b&gt; &lt;b&gt;Ultimately, application threat modeling allow the business to decide which security measures are the most effective in mitigating risks of attacks and implement the security measures that minimize the risks and minimize the costs of implementing them.&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &#39;Times New Roman&#39;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;&quot;&gt;&amp;nbsp;While security, engineering and business teams work together and follow the steps of P.A.S.T.A., they learn how to develop resilient software and translate software security into business value so that the business can make informed risk decisions. Finally, o&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Calibri, sans-serif; font-size: 15px; line-height: 17px;&quot;&gt;n the topic of application threat modeling, we have a&lt;a href=&quot;http://www.amazon.com/Application-Threat-Modeling-Marco-Morana/dp/0470500964&quot;&gt; book&lt;/a&gt; coming up where we collected our ideas and experiences in eight monumental chapters. &lt;b&gt;The&amp;nbsp;intent is to help others with our experience in the field and to educate the new generation of security professionals on how to design and implement resilient and attack proof application software for today&#39;s and future cyber threats.&lt;/b&gt; &amp;nbsp;So be prepared soon to reboot your security program as well and start a new journey leading to a destination where software and applications are resilient and attack proof like a cars are safe in accidents because are designed to use air bags and probed with crash tests.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/717506759211146488/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/717506759211146488' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/717506759211146488'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/717506759211146488'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2012/09/rebooting-software-security.html' title='PASTA Process for Attack Simulation and threat analysis (PASTA) Risk-centric Threat Modeling'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTNYMCSYeYPCP-QM0Hq6dhwhyWYO33qTHDhe1oNoezO40tNO9wEHU-sZz8NRNFAkUUH50W9TRIQXXkLLTiXzwaRN-ypLAugbicsa4QxdC3HktBlfgXLme468Dsk15xCRStkfVE/s72-c/castle.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-2822428865473544296</id><published>2011-08-05T01:49:00.016-04:00</published><updated>2011-08-14T18:17:56.729-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><title type='text'>Application Security Guide for CISOs</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;To make OWASP more visible to Chief Information Security Officers (CISO)s I put together an initial&amp;nbsp;draft of&amp;nbsp;an&amp;nbsp;application security guide that can be downloaded from &lt;a href=&quot;https://www.owasp.org/images/c/c2/OWASP_Application_Security_Guide_for_CISO.pdf&quot;&gt;here&lt;/a&gt;.&amp;nbsp;I believe the time is mature for an organization like&amp;nbsp;OWASP to reach up CISOs directly&amp;nbsp;with a targeted guide. The&lt;a href=&quot;https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs&quot;&gt; first part of this OWASP guide&lt;/a&gt;,&amp;nbsp;need to document the business&amp;nbsp;cases and risk-cost criteria for&amp;nbsp;budgeting application security processes, tools/technologies and training.&amp;nbsp;This is not an easy task because of&amp;nbsp;the current economic recession&amp;nbsp;requiring organizations to operate with tight budgets for information technology including application security&amp;nbsp;while confronted with the need to mitigate the risk of increased number of attacks and security incidents. Therefore, CISOs today need to be able to articulate the business cases for application security and made&amp;nbsp;the&amp;nbsp;application security budget&amp;nbsp;justifiable according to both risk mitigation and cost efficiency criteria. From risk mitigation perspective,&amp;nbsp;it means to be able factor&amp;nbsp;how much security incidents&amp;nbsp;cost to the organization specifically when such&amp;nbsp;incidents are caused by&amp;nbsp;exploiting application vulnerabilities. Security incidents caused by&amp;nbsp;malware and hacking threat agents&amp;nbsp;that exploit application vulnerabilities such as SQL injection for example could cost businesses&amp;nbsp;lots of money.&amp;nbsp;For an business critical web application such as online banking for example that means several million of dollars of potential losses.&amp;nbsp;By adopting criteria such as quantitative risk analysis, it is possible to&amp;nbsp;calculate how much money should be spent in&amp;nbsp;application security measures and&amp;nbsp;justify this by comparing it&amp;nbsp;with the cost of potential losses. When these losses are potential the cost need to be estimated, when these losses are the consequence of a security incident, this can be calculated based upon real operational costs such as the ones to recover from the security incident. From the application security costs efficiency perspective, criteria such as&amp;nbsp;return of investment can help CISO&amp;nbsp;in deciding how to spend the application security budget effectively such as in which SDLC activity (e.g. pen tests, source code analysis, threat modeling). In order to validate the assumptions of the guide, it would also required to gather CISO feedback such as in a form of a survey to assess risk mitigation from exploit of vulnerabilities by hacking and malware as well as other needs such as compliance so that&amp;nbsp;this application&amp;nbsp;security guide&amp;nbsp;can be&amp;nbsp;documented.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/2822428865473544296/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/2822428865473544296' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/2822428865473544296'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/2822428865473544296'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2011/08/application-security-guide-for-cisos.html' title='Application Security Guide for CISOs'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-112232265198407500</id><published>2011-06-19T09:27:00.024-04:00</published><updated>2011-08-05T23:53:20.309-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Threat Modeling"/><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Attack Simulation and Threat Analysis of Banking Malware-Based Attacks</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;﻿﻿﻿﻿﻿﻿I presented&amp;nbsp;on the topic of threat modeling of banking malware attacks&amp;nbsp;at the &lt;a href=&quot;https://www.securitysummit.it/&quot;&gt;Security Summit&lt;/a&gt; conference in Rome, Italy and at the&amp;nbsp;&lt;a href=&quot;https://www.owasp.org/index.php/AppSecEU2011&quot;&gt;OWASP Appsec EU&lt;/a&gt; conference in Dublin Ireland.&amp;nbsp;A new application threat modeling methodology called P.A.S.T.A. (Process for Attack Simulation and Threat Analysis) is featured, this&amp;nbsp;can be used as risk framework for analyze malware-based threats and the impact to online banking applications.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;P.A.S.T.A has&amp;nbsp;a provisional patent from US Patent Office and&amp;nbsp;will be published in a book on Application Threat Modeling&amp;nbsp; co-authored by myself and Tony UV to&amp;nbsp;be published this year.&amp;nbsp;There is also a&amp;nbsp;new threat modeling tool, &quot;ThreatModeler&quot;&amp;nbsp;developed by &lt;a href=&quot;http://www.myappsecurity.com/&quot;&gt;MyAppSecurity&lt;/a&gt;&amp;nbsp;Inc that support this methodology. So far the presentation had good reception and comments, you can follow these comments on the &lt;a href=&quot;http://www.linkedin.com/groups/GLOBAL-Open-Web-Application-Security-36874?home=&amp;amp;gid=36874&amp;amp;trk=anet_ug_hm&amp;amp;goback=%2Egdr_1309977509748_1&quot;&gt;OWASP Linkedin group&lt;/a&gt;. Some companies also posted comments &lt;a href=&quot;https://www.aspectsecurity.com/news/application-security/application-security-doubly-important-for-banks/&quot;&gt;herein&lt;/a&gt;.&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The business impact of banking malware-based attacks for financial institutions today can no longer be neglected since&amp;nbsp;it&amp;nbsp;consists on several millions of dollars in fraudulent transactions, replacing compromised bank accounts as as well as potential legal costs for law suits in case the bank account compromised are business accounts.&amp;nbsp; The impact&amp;nbsp;for banks&amp;nbsp;due to banking malware attacks is also increasing worldwide:&amp;nbsp;in the U.S.A. alone, according to data from FDIC (Federal Deposit Insurance Corporation) that were&amp;nbsp;presented by &lt;a href=&quot;https://365.rsaconference.com/docs/DOC-2470&quot;&gt;David Nelson at RSA Conference in San Francisco&lt;/a&gt; last February, during the third quarter of 2009, malware-based online banking fraud rose to over $ 120 million. In the UK, according to data from the&amp;nbsp;&lt;a href=&quot;http://www.theukcardsassociation.org.uk/media_centre/press_releases_new/-/page/922/&quot;&gt;UK Cards Association&lt;/a&gt;, losses from the online banking sector due to credit card theft&amp;nbsp;totaled 60 million pounds during 2009.&amp;nbsp; The aggregated losses suffered by banks because of banking malware attacks&amp;nbsp;is very significant and cannot no longer be neglected: according to Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham,“Just one of the Zeus controllers steals about $10 million a week from the United States,”.&amp;nbsp;Targets are web applications, financial data and authentication data:&amp;nbsp;&amp;nbsp;according to the data breach investigation report of Verizon in 2010 the top five types of data sought by attackers are credit card and authentication data and web applications are the primary target for these attacks since constitute the attack path sought for the highest percentage of data record breached (38% of overall).&lt;br /&gt;
&lt;br /&gt;
To mitigate banking malware threats online banking applications need to be resilient and bullet proof to banking malware attacks and implement new countermeasures. But the first step in threat mitigation with countermeasures is to understand the threat and the threat agents to procect from. Today, banking and malware&amp;nbsp;attacks come from fraudsters and cybercrime threat actors, these&amp;nbsp;are financially motivated, part of organized cybercrime groups and use sophisticated crimeware tools specifically designed to attack banking sites online. To mitigate these threats businesses and&amp;nbsp;specifically financial need to adopt a new risk mitigation strategy&amp;nbsp;and adopt&amp;nbsp;a risk analysis&amp;nbsp;process that allows to understand the new threat scenario of banking malware and to&amp;nbsp;analyze the banking malware attack vectors.&amp;nbsp; For example, in the typical banking malware attack,&amp;nbsp;initially the banking malware is dropped&amp;nbsp;into the victim&#39;s PC&amp;nbsp;either&amp;nbsp;by social engineering the&amp;nbsp;victim with phishing by infecting the victim;s browser with drive by download. After the&amp;nbsp;banking malware has infected the victim&#39;s PC, since will be undetected by most of antivirus, it&amp;nbsp;will be transparent to the&amp;nbsp;user&amp;nbsp;and wait&amp;nbsp;for when the user log into the online banking site. At this point, the banking trojan on the infected PC&amp;nbsp;will inject HTML directly into the user&#39;s browser (outside of security controls of the site)&amp;nbsp; by presenting extra data fields that seek to&amp;nbsp;harvest the victim&#39;s&amp;nbsp;PII data such as CCN, CVV, PINs and SSNs. Later on&amp;nbsp;when the user&amp;nbsp;will perform an&amp;nbsp;high risk transactions such as a wire transfer, will transfer money from the victim account&amp;nbsp;&amp;nbsp;to a fraudulent account controlled by the fraudster. The transaction will occur as authentic since is done by the frauster on behalf of the user by using the user&#39;s session.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5PE5Ry7JpsAHEDJsflNWUfNAA9UPdfGE6qmrd10slIOfLZe6l_oCY-TymsPJ4urVFo0-HNONQYFVb1yX0oQCnZ0txBs7PXWly3jTR42CRMQb0rg-_BngZnLDJO7kiWXeyRyLY/s1600/pasta.bmp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;340&quot; i$=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5PE5Ry7JpsAHEDJsflNWUfNAA9UPdfGE6qmrd10slIOfLZe6l_oCY-TymsPJ4urVFo0-HNONQYFVb1yX0oQCnZ0txBs7PXWly3jTR42CRMQb0rg-_BngZnLDJO7kiWXeyRyLY/s400/pasta.bmp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Stages of P.A.S.T.A. (Process For Attack &lt;br /&gt;
Simulation and Threat Analysis)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;Understanding the threat scenario of banking malware is the first step, the next one is to adopt an effective risk mitigation strategy that includes people prepared to learn/deal/respond to new threats and attacks, processes that identify security design flaws in applications and gaps in current security controls and innovative tools and countermeasures that mitigate the risk posed by banking malware and cyber threats&amp;nbsp;and the attacks&amp;nbsp;realized by these threats such&amp;nbsp;as Man In The Middle and Man In The Browser attacks.&lt;br /&gt;
Regarding the application risk mitigation processes, we are promoting P.A.S.T.A. (Process for Attack Simulation and Threat Analysis).&amp;nbsp;&amp;nbsp;This is a process designed to mitigate&amp;nbsp;the risk represented by cyber threats&amp;nbsp;to on-line applications in general,&amp;nbsp;including banking malware threats. This process is conducted in seven stages, each stage has specific objectives. For the use case of banking malware, the focus and objectives&amp;nbsp;of&amp;nbsp;each of the&amp;nbsp;seven&amp;nbsp;stages&amp;nbsp;is outlined herein:&lt;br /&gt;
&lt;br /&gt;
The first stage&amp;nbsp;focuses&amp;nbsp;on the&amp;nbsp;understanding of malware-based threat mitigation as a business problem: the objective is to understand the business impact, determine the risk mitigation objectives and derive security and compliance requirements to achieve these objectives.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
The second stage consists on the definition of the technical scope for the analysis that&amp;nbsp;consists on the on-line banking&amp;nbsp;application and the production environment. This stage consists on&amp;nbsp;documenting the application profile and gather all application &quot;design blueprints&quot;&amp;nbsp;such as architecture design documents, sequence diagram documents and transaction flow diagrams for all use cases and transactions&amp;nbsp;of the application. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The third stage focuses on the analysis of the on-line banking site from the perspective of secure architecture. This&amp;nbsp;consists on&amp;nbsp;identifying the application existing security controls and the dependencies of application functions/transactions from these. The scope is to support the threat analysis of the effectiveness of security controls in mitigating the threats. &lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;The fourth stage consists on the gathering of threat and attack&amp;nbsp;information from threat intelligence and from internal sources.&amp;nbsp;The objective is&amp;nbsp;to learn&amp;nbsp;from the attack scenarios and the attack vectors used by different banking malware. Internal incidents and security events&amp;nbsp;are then correlated to banking malware attacks and are also used to qualify the likelihood and impact of banking malware threats.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;In the fifth stage,&amp;nbsp;the threat&amp;nbsp;analyst&amp;nbsp;looks at the potential application vulnerabilities and the design flaws identified by other&amp;nbsp;assessments such as black box (e.g. pen test) and white box (e.g. source code analysis)security testing. These are the vulnerabilities&amp;nbsp;&amp;nbsp;that can&amp;nbsp;possibly exploited by banking malware. This analysis of vulnerabilities&amp;nbsp;in this case&amp;nbsp;ought to be&amp;nbsp;&quot;end to end&quot;, that is from the client/browser&amp;nbsp;to the&amp;nbsp;servers (e.g. web server, app servers) and back-ends systems&amp;nbsp;(e.g. middleware and mainframes) that are used by the online banking application. A generic&amp;nbsp;correlation framework for mapping of vulnerabilities to threats&amp;nbsp;can&amp;nbsp;also used to identify which vulnerabilities can be potentially exploited by banking malware (e.g. browser vulnerabilities, session management vulnerabilities).&lt;br /&gt;
&lt;br /&gt;
The sixth stage consists on analyzing and simulating&amp;nbsp;the attack scenarios as the attackers will do by using the same attack vectors used by malware. The purpose of this exercise is to identify IF and&amp;nbsp;WHICH vulnerabilities and weaknesses such as design flaws in the application are exploited. This stage includes the analysis of banking malware attacks using attack trees, the&amp;nbsp;analysis of attacks&amp;nbsp;as these will the vulnerabilities using attack libraries&amp;nbsp;and&amp;nbsp;the&amp;nbsp;analysis of the abuse of security controls for&amp;nbsp;hacking financial transactions using the&amp;nbsp;&quot;use and abuse cases&quot; techniques. At this stage, design flaws and gaps of security controls in the application are identified both at the application-architecture level and at the function-transaction level.&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;Finally, in&amp;nbsp;the last stage, risk managers can&amp;nbsp;analyze the risks and impacts and&amp;nbsp;formulate&amp;nbsp;the&amp;nbsp;risk mitigation strategy for mitigating risks of banking malware. The basis of the risk analysis&amp;nbsp;is the categorization and calculation of the risk factors (e.g. threats, attacks, vulnerabilities, technical and business impact) and the calculation of risks of each exploit with qualitative and quantitative risk models. The risk mitigation strategy&amp;nbsp;includes both&amp;nbsp;preventive and detective controls, defense in depth criteria for application of countermeasures at different layers of the application (browser, web application, and infrastructure) as well as new governance processes: risk based testing, improved fraud detection, threat analysis and cyber-intelligence.&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;The ultimate goal was to be able to provide application security practitioners with different roles and responsibility (e.g. appsec/infosec risk&amp;nbsp;managers and application security architects), a use case&amp;nbsp;example of P.A.S.T.A ™ threat modeling for modelling banking malware attacks, identifying gaps in security controls-vulnerabilities and identifying protective and detective&amp;nbsp;countermeasures that can be rolled out by following a risk mitigation strategy. The application risk framework provided seek to empower risk management to make informed risk management decisions to protect online banking applications from banking malware.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/112232265198407500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/112232265198407500' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/112232265198407500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/112232265198407500'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2011/06/attack-simulation-and-threat-analysis.html' title='Attack Simulation and Threat Analysis of Banking Malware-Based Attacks'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5PE5Ry7JpsAHEDJsflNWUfNAA9UPdfGE6qmrd10slIOfLZe6l_oCY-TymsPJ4urVFo0-HNONQYFVb1yX0oQCnZ0txBs7PXWly3jTR42CRMQb0rg-_BngZnLDJO7kiWXeyRyLY/s72-c/pasta.bmp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-7621976874131386619</id><published>2011-02-06T19:08:00.014-05:00</published><updated>2011-02-08T18:48:56.620-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>7 Security tips for secure coding your HTML 5 applications</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYirHlnktf7a7M_Umg5MZfkNgQFNGOdpZw7MOTZlCnEu4Ujux-qZaebsjQrXybFz377Vbo7wSKnnxY2zqjtZ-OCrVEXQbDdoPhlTUa1Ac6K1H3VgZvHz2OiI5BrCsdzWVEEJRM/s1600/html5.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; h5=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYirHlnktf7a7M_Umg5MZfkNgQFNGOdpZw7MOTZlCnEu4Ujux-qZaebsjQrXybFz377Vbo7wSKnnxY2zqjtZ-OCrVEXQbDdoPhlTUa1Ac6K1H3VgZvHz2OiI5BrCsdzWVEEJRM/s1600/html5.JPG&quot; /&gt;&lt;/a&gt;Since the release of HTML 5 standard is expected in 2011, it is important to prepare for the potential impacts&amp;nbsp;on security due&amp;nbsp;the adoption of HTML 5. Currently,&amp;nbsp;we can review&amp;nbsp;the working draft from &lt;a href=&quot;http://dev.w3.org/html5/spec/Overview.html&quot;&gt;W3C&lt;/a&gt; and start looking at this standard from the secure coding perspective and specifically&amp;nbsp;on how to write secure HTML 5 software. Since this&amp;nbsp;blog is dedicated to&amp;nbsp;software security,&amp;nbsp;I thought I should try to put out a list of&amp;nbsp;top security concerns that need to be addressed when coding applications in HTML 5.&amp;nbsp;Herein included&amp;nbsp;is my top 7 list of&amp;nbsp;software security best practices that need to be addressed&amp;nbsp;when coding&amp;nbsp;HTML 5 applications:&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;1) Be careful when using cross domain messaging features&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;HTML 5 APIs allow to process messages from an origin that is different from the one of the application processing the message. You should check the origin of the domain of the message to validate that can be trusted such as by whitelisting the domain (accept only request from trusted domains and rejects the others).&amp;nbsp;Specifically,&amp;nbsp;when using HTML 5.0 APIs such as &lt;em&gt;PostMessage(),&lt;/em&gt; check the dom-MessageEvent-origin attribute before accepting the request. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;2) Always validate input and filter malicious input before using HTML 5.0 APIs.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You should validate data input&amp;nbsp;before you process any messages of HTML 5.0 &amp;nbsp;APIs such as the &lt;em&gt;PostMessage() API&lt;/em&gt;. Input validation should be done at a minimum, on the&amp;nbsp;server side since client side validation can be potentially bypassed with a web proxy. . If you are using client side SQL such as WebSQL (like Google gears for example) you should filter data for any SQL injection attack vectors and use prepared SQL&amp;nbsp;statements.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;3) Make sure that the use of any offline-local storage is secure&lt;/strong&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Whenever possible, do not store any confidential or sensitive data in the offline-local storage, if you do, make sure you encrypt the data. If you do encrypt the data in the offline-local storage, do not store any encryption keys on the client rather, use the server to encrypt this data on demand. Make sure the encryption key&amp;nbsp;is tied to the user&#39;s session&amp;nbsp;and to the device that is storing it. Beware that HTML 5 offline applications are vulnerable to cache and &lt;a href=&quot;http://blog.andlabs.org/2010/06/chrome-and-safari-users-open-to-stealth.html&quot;&gt;cache poisoning&lt;/a&gt;&amp;nbsp;hence validate the data before putting anything in offline/local storage. If should also consider to restrict the use of offline/local storage as requirement of your HTML 5.0 security coding standards is possible. Consider that right now (Jan 2011), offline-local storage is not supported by IE browsers, only&amp;nbsp;by Google Chrome, Safari, Firefox and the beta of the Opera browsers. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;4) Secure code review HTML 5 code and the coding of HTML 5 tags, attributes and CSS.&lt;/strong&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You should update your secure code analysis rules to include security checks for special HTML coding attributes and HTML 5.0 tags. Some of&amp;nbsp;HTML&amp;nbsp;5&amp;nbsp;tags attributes for example can be potentially be injected JavaScript (JS). You should made a requirement to source code review these new HTML 5 tags for security to make sure any JS input is validated. A new version of HTML 5 CSS also might allow an attacker to control display elements via JS injection.&amp;nbsp;HTML 5 source code with tags, attributes and HTML 5 CSS files should be considered in scope for&amp;nbsp;source code reviews before deployment.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;5) Consider to restrict or ban the use of HTLM 5.0 websocket API.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;HTML 5.0 websocket API&amp;nbsp;provide a network communication stack to the browser that can be used for backdoors.&amp;nbsp;You should check with your&amp;nbsp;security team whether the&amp;nbsp;use of&amp;nbsp;web sockets is allowed by your organization&amp;nbsp;information security policies and application security standards.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;6) Make sure your company legal approve any use of geolocation API.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Consider the impact of privacy when using geolocation APIs&amp;nbsp;to make sure the use is allowed and compliant by your company legal-privacy laws/regulations. The use of geolocation might have privacy impacts, hence should be reviewed to be in compliance with&amp;nbsp;privacy policies that might include notify the user when these APIs are deployed as part of&amp;nbsp;your application.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;7) Leverage the security of sandboxing iFrame attributes&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One of the HTML 5 &amp;nbsp;features is the sandboxing attribute for iFrame that enables a set of extra restrictions on any content hosted by the iFrame. When this is attribute is set, the content is treated as being from a unique origin, forms and scripts are disabled and links are prevented from targeting other browsing contexts and plug-ins are disabled.&amp;nbsp;Ian Hickson, the editor of the HTML 5 has a post on &lt;a href=&quot;http://blog.whatwg.org/whats-next-in-html-episode-2-sandbox&quot;&gt;what the sandbox is good for&lt;/a&gt;. You should consider updating&amp;nbsp;your organization&#39;s secure coding standards to&amp;nbsp;cover how to&amp;nbsp;code securely applications that&amp;nbsp;leverage the HTML 5.0 sandbox attribute for IFrames.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/7621976874131386619/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/7621976874131386619' title='8 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7621976874131386619'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7621976874131386619'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2011/02/7-tips-for-securying-your-html-50-based.html' title='7 Security tips for secure coding your HTML 5 applications'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYirHlnktf7a7M_Umg5MZfkNgQFNGOdpZw7MOTZlCnEu4Ujux-qZaebsjQrXybFz377Vbo7wSKnnxY2zqjtZ-OCrVEXQbDdoPhlTUa1Ac6K1H3VgZvHz2OiI5BrCsdzWVEEJRM/s72-c/html5.JPG" height="72" width="72"/><thr:total>8</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-6471844170569603057</id><published>2010-11-15T23:21:00.010-05:00</published><updated>2011-04-16T07:26:43.088-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Training"/><title type='text'>Tribute to Software Security Guru Roman Hustad</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Roman Hustad, OWASP chapter leader in Sacramento, CA, died suddenly on November 4th at the age of 39,&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, &amp;quot;serif&amp;quot;; font-size: 12pt; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, &amp;quot;serif&amp;quot;; font-size: 12pt; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt; the result a fatal heart rythm caused by an enlargement of his heart, the cause of which is still unknown. He collapsed after arriving in the Las Vegas airport that evening.&amp;nbsp; Roman suffered virtually no pain and was surrounded by others.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsiesNvszECnmLPA7rj9JKlEP_x4ah5AGtP3z-T7VwdUzC2I7d-QDLxPAGesnL64M3jDZHuhp7eeV8GxTGWmck6rYPZG4R1_ihxondM4Jh0AfA7wW93cR20iny-yqTgd1vXuwi/s1600/5532_Hustad_medium.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; px=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsiesNvszECnmLPA7rj9JKlEP_x4ah5AGtP3z-T7VwdUzC2I7d-QDLxPAGesnL64M3jDZHuhp7eeV8GxTGWmck6rYPZG4R1_ihxondM4Jh0AfA7wW93cR20iny-yqTgd1vXuwi/s1600/5532_Hustad_medium.jpg&quot; /&gt;&lt;/a&gt;Roman is survived by his wife of 6+ years, Tanya (Burgdorf) Hustad, and his sons Lucas (4 yrs old) and Wyatt (2 yrs old), his sister Holly (Fail) Hoeksema, and brother, Andrew James. The whole family is being supported and cared for by loving family and friends in Davis, CA at the moment.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is&amp;nbsp;also a&amp;nbsp;big loss for OWASP and the appsec security community. I&#39;ve known Roman as a former colleague at Foundstone and I worked with him at a four month software security gig for a financial client in Orange County, CA in 2006.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Roman&amp;nbsp;was a&amp;nbsp;person of&amp;nbsp;high professional standards, strong integrity generosity&amp;nbsp;and ethical values. Professionally, he was a top notch principal software security consultant and&amp;nbsp;one of the best if not the best JAVA security trainer that I ever known.&amp;nbsp;After I left Foundstone in 2007, I regret that I did not kept in touch with him. I will always remember him as one of the best software security consultants I had the pleasure to work with. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;As a tribute to Roman published work I have provided some references herein.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Hacme Books vs 2.0 Strategic Secure Software Training Application&amp;nbsp;&lt;a href=&quot;http://www.foundstone.com/us/resources/whitepapers/hacmebooks_userguide2.pdf&quot;&gt;http://www.foundstone.com/us/resources/whitepapers/hacmebooks_userguide2.pdf&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Papers on SoftwareMag.com, such as:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&quot;Implementing a Software&amp;nbsp;Security Training Program&quot; &lt;a href=&quot;http://www.softwaremag.com/L.cfm?doc=1174-10/2008&quot;&gt;http://www.softwaremag.com/L.cfm?doc=1174-10/2008&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&quot;Holistic Approach for Secure Software&quot; &lt;a href=&quot;http://www.softwaremag.com/L.cfm?doc=1155-8/2008&quot;&gt;http://www.softwaremag.com/L.cfm?doc=1155-8/2008&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Roman also published a paper for ISSA Journal, on &quot;How virtualization affects PCI-DSS, A review of Top 5 Issues&quot;: &lt;a href=&quot;https://dev.issa.org/Library/Journals/2010/January/Hau-How%20Virtualization%20Affects%20PCI%20DSS.pdf&quot;&gt;https://dev.issa.org/Library/Journals/2010/January/Hau-How%20Virtualization%20Affects%20PCI%20DSS.pdf&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/6471844170569603057/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/6471844170569603057' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6471844170569603057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6471844170569603057'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/11/tribute-to-software-security-guru-roman.html' title='Tribute to Software Security Guru Roman Hustad'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsiesNvszECnmLPA7rj9JKlEP_x4ah5AGtP3z-T7VwdUzC2I7d-QDLxPAGesnL64M3jDZHuhp7eeV8GxTGWmck6rYPZG4R1_ihxondM4Jh0AfA7wW93cR20iny-yqTgd1vXuwi/s72-c/5532_Hustad_medium.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-7123338981387895794</id><published>2010-09-10T09:32:00.029-04:00</published><updated>2011-04-16T07:28:06.476-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Training"/><title type='text'>Recent Acquisitions In The Security Industry And What It Means For Software Security Professionals</title><content type='html'>&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;﻿﻿﻿﻿﻿ &lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;a href=&quot;http://faculty.css.edu/dswenson/web/6300-OBOD/merger1.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; height: 86px; margin-bottom: 1em; margin-right: 1em; width: 198px;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;85&quot; nx=&quot;true&quot; src=&quot;http://faculty.css.edu/dswenson/web/6300-OBOD/merger1.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;﻿﻿﻿The recent news of the acquisitions of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;McAfee&lt;/span&gt;&lt;/span&gt; by Intel and of Fortify by HP can be interpreted as a future trend for the security industry: build security into hardware and engineering processes instead of bolting security on products. Intel&#39;s acquisition of McAfee&amp;nbsp;for example, can be interpreted as move by Intel to integrate application security with hardware (e.g. microchips) that Intel currently develops. Similarly, the acquisition of Fortify Software by HP can be interpreted as a move by HP to integrate software security &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;within&lt;/span&gt; HP suite of tools&amp;nbsp;for software testing. &lt;strong&gt;Moreover, the news of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;McAfee&lt;/span&gt;&lt;/span&gt; acquisition by Intel&lt;/strong&gt;, can also be interpreted as that the age of companies as pure providers of Antivirus tools has come to an end. This was also predicted by John &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;Kula&lt;/span&gt;&lt;/span&gt; in his book, Hacking Wall St attacks and countermeasures: &lt;strong&gt;”By the end of 2010, conventional pattern matching anti-virus systems will be completely dead. Their effectiveness will have fallen below 50%.&quot;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
&lt;strong&gt;To understand how signature Anti-Virus (AV) detection and eradication tools have come to age, we need to look at the evolution of security threats in the last two decades and how this affected the effectiveness of AV tools in mitigating the current threats such as cybercrime threats.&lt;/strong&gt; This is mostly due to the fact that the &lt;strong&gt;security threats that consumers and businesses have to protect from today are very different from the ones that they had to protect from ten years ago.&lt;/strong&gt; In the 90’s the main targets for viruses were users&#39; PC, typical attack vectors included opening unknown email attachments to infect their PCs and spread to the company servers. In 2001 we witnessed the appearance of the first malicious &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;rootkit&lt;/span&gt;&lt;/span&gt; for the Windows NT: such &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;rootkit&lt;/span&gt;&lt;/span&gt; had the capability to sneak under the radar of the anti-virus software and evade detection. In 2003 denial of service attacks took advantage of the spreading of worms for infrastructure wide exploitation of buffer overflows such as the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;SQL&lt;/span&gt;&lt;/span&gt; slammer worm that caused denial of service to several &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;ATMs&lt;/span&gt;&lt;/span&gt; at banks such as Bank of America and Washington Mutual. As new signatures were developed to detect and eradicate viruses and worms, the effectiveness of Anti-Virus tools stood on the capacity to identify viruses and worms by the unique signature of the attacks as well as in the capability to eradicate viruses and worms after the infection by patching the infected system. But in 2005, we witnessed email &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;phishing&lt;/span&gt;&lt;/span&gt; attacks to spread Trojans programs embedded in apparent harmless files eluding anti-virus software and firewalls with the purpose of data &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;exfiltration&lt;/span&gt;&lt;/span&gt; such as to steal passwords and sensitive data. In 2007, we had the evidence of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;botnet&lt;/span&gt;&lt;/span&gt; controlled &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;trojans&lt;/span&gt;&lt;/span&gt; used as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;crimeware&lt;/span&gt;&lt;/span&gt; tool to rob online bank customers, spreading either through targeted &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;phishing&lt;/span&gt;&lt;/span&gt; attacks or through drive by download infections. More recently, in 2009, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;Trusteer&lt;/span&gt;&lt;/span&gt; a security company providing anti-&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;malware&lt;/span&gt;&lt;/span&gt; solutions published an advisory entitled “Measuring the in-the-wild effectiveness of Antivirus against Zeus” according to which the most popular banker &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;malware&lt;/span&gt;&lt;/span&gt; Zeus, is successfully bypassing up-to-date antivirus software : &lt;strong&gt;&quot;The effectiveness of an up to date anti virus against Zeus is thus not 100%, not 90%, not even 50% - it’s just 23% “. &lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
It is therefore clear in my opinion, that &lt;strong&gt;the defenses for &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;malware&lt;/span&gt;&lt;/span&gt; infection, being this with either viruses, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_21&quot;&gt;trojans&lt;/span&gt;&lt;/span&gt; or worms have to be expanded to include other layers of the technology stack that are now the target for &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;rootkits&lt;/span&gt;&lt;/span&gt; and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;malware&lt;/span&gt;&lt;/span&gt; attacks.&lt;/strong&gt; These expanded layers might include for example, besides the O.S and the application also hardware, kernel and firmware that are currently below the radar of AV detection tools.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;Expanding security protection to the hardware layer is beneficial not only&amp;nbsp;as detection control such as for &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;malware&lt;/span&gt; intrusion detection but also as security risk preventive controls such as data protection.&lt;/strong&gt; In the case of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;cybercrime&lt;/span&gt;&lt;/span&gt;, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;malware&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;rootkits&lt;/span&gt;&lt;/span&gt; such as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;ZeuS&lt;/span&gt;&lt;/span&gt; for example that seek to compromise the communication channel between the PC and the banking sites, the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;malware&lt;/span&gt; attacks the client to either hook into the kernel to do Man In The Middle (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;MiTM&lt;/span&gt;) attacks or into the browser &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_31&quot;&gt;APIs&lt;/span&gt;&lt;/span&gt; to do Man in The Browser (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_32&quot;&gt;MiTB&lt;/span&gt;) attacks. In both cases of these attacks, there is a lot of security to gain at the application layer by protecting the data at the hardware layer. One way to defeat &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_33&quot;&gt;MiTM&lt;/span&gt;&lt;/span&gt; attacks for example is to secure the communication channel through 2-way mutual authentication and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_34&quot;&gt;PKI&lt;/span&gt;&lt;/span&gt; using client identities that are protected by the so called &quot;ID vaults&quot; embedded in hardware chips and secured at firmware layer. Examples of this &quot;ID vaults&quot;are the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_35&quot;&gt;Broadcom&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_36&quot;&gt;USH&lt;/span&gt;&lt;/span&gt; Unified Security Hub, that is included in several PCs today and is leveraged by data protection tools such as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_37&quot;&gt;Verdasys&#39;s&lt;/span&gt; Digital Guardian data protection solution. You might also consider the benefit of developing application with hardware defenses &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_38&quot;&gt;such&lt;/span&gt; as by enforcing firmware controls by digital signing your application at the firmware layer. For the ones of you that attended the talk from Barnaby Jack about &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_31&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_39&quot;&gt;jackpotting&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_32&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_40&quot;&gt;ATMs&lt;/span&gt;&lt;/span&gt; at &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_33&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_41&quot;&gt;BlackHat&lt;/span&gt;&lt;/span&gt; this year, signing the application at the firmware layer was one of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_34&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_42&quot;&gt;mitigations&lt;/span&gt;&lt;/span&gt; being recommended against &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_35&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_43&quot;&gt;rootkit&lt;/span&gt;&lt;/span&gt; infections. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;The other big opportunity for security companies is the integration of security of software with hardware such as in the case of applications for mobile phones.&lt;/strong&gt; As software is built for the specific mobile O.S. (e.g. Android or iPhone O.S.) can also be build out of the box by leveraging security controls deep in the technology stack that include kernel API, firmware and hardware. In the case of being capable to detect attack vectors, having intrusion detection events that can be triggered at the different layers of the technology stack can leverage defenses at the application layer such as blocking the application to run or transferring data to the server. These are just few examples of security synergies accross layers of the technology stack.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;In summary, I think Intel acquisition of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_36&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_44&quot;&gt;McAfee&lt;/span&gt;&lt;/span&gt; could give Intel the opportunity to design hardware chips that tightly integrate security detection and prevention controls&amp;nbsp;with &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_45&quot;&gt;firmware&lt;/span&gt; and software and provide additional layers of security to applications.&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
&lt;strong&gt;The other industry M&amp;amp;A news was the acquisition of Fortify’s software security company by HP: this &lt;/strong&gt;&lt;strong&gt;follows a trend of big software companies such as IBM and HP to&amp;nbsp;acquire security tools companies such as Watchfire and Fortify.&lt;/strong&gt; Previously, HP grew their security assessment suite of tools through the&amp;nbsp;acquisition of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_38&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_46&quot;&gt;SpyDynamics&lt;/span&gt;&lt;/span&gt; WebInspect to integrate it in&amp;nbsp;HP&#39;s software quality assurance suite of tools, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_39&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_47&quot;&gt;QA&lt;/span&gt;&lt;/span&gt; inspect. Since IBM previously acquired application scanning tool &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_40&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_48&quot;&gt;WatchFire&lt;/span&gt;&lt;/span&gt;’s &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_41&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_49&quot;&gt;Appscan&lt;/span&gt;&lt;/span&gt; and static analysis tool provider Ounce Labs, Fortify’s static analysis tool acquisition by HP fits the scenario of HP competing head to head with IBM in the software security space. For sake of competition, the acquisition of Fortify by HP make a lot of sense, but t&lt;strong&gt;he HP acquisition of Fortify also fits the trend in the industry of run software security either as a service or as an assessment integrated as part of the Software Development Life Cycle (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_42&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_50&quot;&gt;SDLC)&lt;/span&gt;&lt;/span&gt; process.&lt;/strong&gt; &lt;br /&gt;
&lt;br /&gt;
For example, application and source code vulnerability scanning assessments, referred as dynamic and static testing can be&amp;nbsp;performed a Software Security as a Service (SSaaS) for software development stakeholders such as application architects, developers and testers. These services can also include automation security tools that can be rolled out as part of the overall software development and testing suite of tools such as Integrated Development Environments (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_43&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_51&quot;&gt;IDE&lt;/span&gt;&lt;/span&gt;) and Q/A testing tools. Obviously, security tool integration with &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_44&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_52&quot;&gt;IDE&lt;/span&gt;&lt;/span&gt; and Q/A testing tools is just one part of the software security equation, as besides tools you also need to roll out secure coding training and secure coding standards. The holistic need of software security that includes people process and technology, is often misunderstood by who has to manage software security initiatives for organizations as software security tools or services alone are &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_45&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_53&quot;&gt;mis&lt;/span&gt;&lt;/span&gt;-interpreted as sufficient to produce secure software. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;To produce secure software with a level of software security assurance that is both risk mitigation and cost effective, organizations need to roll out, besides static and dynamic analysis tools and services&amp;nbsp;also software security training for developers and software security engineering processes/methodologies such as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_46&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_54&quot;&gt;SAMM&lt;/span&gt;&lt;/span&gt;, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_47&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_55&quot;&gt;BSIMM&lt;/span&gt;&lt;/span&gt;, MS-&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_48&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_56&quot;&gt;SDL&lt;/span&gt;&lt;/span&gt;-Agile, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_49&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_57&quot;&gt;Securosis&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_50&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_58&quot;&gt;SSDL&lt;/span&gt;&lt;/span&gt;, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_51&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_59&quot;&gt;OWASP&lt;/span&gt;&lt;/span&gt; CLASP.&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Obviously, the increased adoption of static and dynamic analysis tools by the enterprise follows the application and software security tool adoption trend.&lt;/strong&gt; If you refer from a survey from errata security –Integrating Security Info the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_52&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_60&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt; &lt;a href=&quot;http://www.erratasec.com/ErrataSurveyResults.pdf&quot;&gt;http://www.erratasec.com/ErrataSurveyResults.pdf&lt;/a&gt;, it is shown for example that static analysis is the most popular activity (57%) followed by manual secure code reviews (51%), manual testing (47%). &lt;strong&gt;The trend of adoption of application and software security tools usually follows the enterprise awareness of the application security problem as a software security problem.&lt;/strong&gt;&amp;nbsp;&amp;nbsp;At the&amp;nbsp;beginning of the rolling out an application security initiative, companies start from the far right of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_53&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_61&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt; by rolling out application scanning tools and ethical hacking web assessments and then move toward the left of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_54&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_62&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt; with source code analysis. Eventually the awareness of the software security problem moves to the design stage by trying to identify security design flaws earlier in the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_55&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_63&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt; with the Application Threat Modeling (ATM). &lt;strong&gt;Right now, according to the errata security survey, only 37% of organizations have adopted ATM as part of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_56&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_64&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;. I believe the trend will lead to that direction of adopting ATM because of the efficiencies and the larger security coverage that ATM will provide. Probably this low ATM adoption can be explained by not enough security awareness yet onto the benefits of ATM as well as the maturity levels reached to seek adoption of ATM within the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_57&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_65&quot;&gt;SLDC&lt;/span&gt;&lt;/span&gt;. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Software security training for developers is also a trend, 86% of the participants of the survey sent one or more members of the software development team to security training.&lt;/strong&gt; But again according to the Errata security survey, &lt;strong&gt;software security is not yet part of the top list of information security management concerns as only about 1/6 of participants (16%) sends his project managers and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_58&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_66&quot;&gt;InfoSec&lt;/span&gt;&lt;/span&gt; and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_59&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_67&quot;&gt;AppSec&lt;/span&gt;&lt;/span&gt; directors to software security process management training.&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;As the static and dynamic security testing adoption grows in the industry there will be also a need of software security services such as software security training and the development of engineering processes and standards.&lt;/strong&gt; This trend follows the integration of the organization &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_60&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_68&quot;&gt;SDLCs&lt;/span&gt;&lt;/span&gt; as well as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_61&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_69&quot;&gt;InfoSec&lt;/span&gt;&lt;/span&gt;/&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_62&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_70&quot;&gt;AppSec&lt;/span&gt;&lt;/span&gt; and Risk management processes with formal software assurance methodologies and activities such as vulnerability assessments, secure coding reviews and secure design review/ application threat modeling.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;These trends in the &lt;/strong&gt;&lt;strong&gt;M&amp;amp;A of software security industry will also create new career opportunities&lt;/strong&gt;. In the case of information security managers for example,&amp;nbsp;there will be a need to hire managers&amp;nbsp;with the right experience and skills in managing software security processes for organizations. In the case of software engineers and security consultants, it will create a&amp;nbsp;need of software engineers and consultants&amp;nbsp;abreast of software security formal methods, static and dynamic analysis tools as well as security assessments such as secure code reviews and application architecture risk analysis and design or application threat modeling. In the case of&amp;nbsp;electrical, software or computer system engineers, the knowledge of hardware and software security&amp;nbsp;could also&amp;nbsp;be leveraged to become an expert in hardware-software security integration such as in the case of the design of hardware embedded application security products/solutions.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
In conclusion, as software security practitioner, in your current professional role of information security manager, software security architect, software security consultant, software security trainer/instructor you might look at these industry trends to set your career goals and cultivate the necessary skills and experience that&amp;nbsp;could lead you in&amp;nbsp;new career opportunities being created as results of these security industry trends.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/7123338981387895794/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/7123338981387895794' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7123338981387895794'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7123338981387895794'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/09/software-security-industry-and.html' title='Recent Acquisitions In The Security Industry And What It Means For Software Security Professionals'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-6452345290043117879</id><published>2010-07-26T20:53:00.023-04:00</published><updated>2010-11-20T09:55:50.504-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><title type='text'>BlackHat, Defcon, BSides, Here We Come..</title><content type='html'>&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;﻿﻿﻿﻿﻿﻿ &lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;﻿﻿&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;﻿﻿﻿﻿﻿﻿It is time to attend BlackHat U.S.A. conference again and join the crowd (or herd?) of hackers (white and black hats), security researchers, consultants, security manager, information security officers. Since the conference is held in Las Vegas at the Caesar Palace Casino, it is kind of interesting to watch the scene of geeky crowd mingling with the gamblers and people nicely dressed ready for the night shows. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I attended &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;BlackHat&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; the first time in 2006 when I presented at a turbo talk session on &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-06/bh-us-06-Morana-R3.0.pdf&quot;&gt;Building Security In the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;,&lt;/a&gt; not quite the hacker&#39;s topic&amp;nbsp;...as I remember, it&amp;nbsp;was&amp;nbsp;quite stressful&amp;nbsp;to be a speaker and I was rather scared to confront a very knowledgeable crowd of security folks that each attends BH...&amp;nbsp; Overall my presentation went OK but I remember I enjoyed more stressful free sunbathing&amp;nbsp;at the Cabana/Booth that &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;Foundstone&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; Inc prepared at the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;venus&lt;/span&gt;/&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;European&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;syle&lt;/span&gt; pool at the Caesar palace casino :). &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I attended &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;BH&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; and also &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;Defcon&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; in 2008 and 2009 but no longer as a speaker. I actually think &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;&lt;a href=&quot;http://www.defcon.org/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;Defcon&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt; is a lot of fun, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;you can learn from &lt;/span&gt;the real hackers (including the ones the get caught hacking on the Riviera Casino &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;ATMs)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; and you can learn from thought leaders and stars of security like Bruce &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;Schneier&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;, Dan &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;Kaminsky and others&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;. You also get the most of your money attending &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;Defcon&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; instead of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;Blackhat&lt;/span&gt;&lt;/span&gt; since the conference fee &lt;/span&gt;only costs a small fraction (10% ) of what &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;BH&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; conference fee costs: compare $ 140 or &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;Defcon&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; vs. $1,800 for &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;Blackhat&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;....The value to attend &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;BH nowadays&lt;/span&gt;, in my opinion,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; is mostly&amp;nbsp;being able to get&amp;nbsp;first hand information on exploits/hacks. As a zero-day&amp;nbsp;vulnerability is announced,&amp;nbsp;you ca get your company to act promptly remedied&amp;nbsp;as soon as&amp;nbsp;vulnerabilities&amp;nbsp;are released to public. The other value of attending &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_21&quot;&gt;BH &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;is the opportunity to network with other security professionals, promote your research/books and for me, to find good speakers for&amp;nbsp;our local &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;&lt;a href=&quot;http://www.owasp.org/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;OWASP&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt; chapter. &lt;/div&gt;&lt;br /&gt;
Regarding the &lt;a href=&quot;http://www.blackhat.com/html/bh-us-10/bh-us-10-schedule.html&quot;&gt;scheduled presentations&lt;/a&gt; of this year &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_21&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;BH&lt;/span&gt;&lt;/span&gt; conference, there are several good ones that I would &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;recommend&lt;/span&gt; attending such as Jack Barnaby&#39;s &quot;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;Jackpotting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; the ATM&quot; (this is the talk that was pulled out last year but now can be released), Robert Hansen&#39;s &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_21&quot;&gt;&quot;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;HTTPs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; can beat me&quot;, Jeremiah &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;Grossman&#39;s&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &quot;Breaking Browsers Hacking &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;Autocomplete&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&quot;&lt;/span&gt; and Gunter &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;Ollmann&#39;s&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &quot;becoming the six-million-dollar man&quot;. There are also several presentations on mobile security that look very interesting to me, among them David Kane Perry&#39;s &quot;More Bugs in More Places: Secure Development on Mobile Platforms&quot;. I usually tend to select talks based upon relevance for my work such as&amp;nbsp;web application security as well as&amp;nbsp;the&amp;nbsp;reputation/bio of the presenter. I shared my selections on &lt;a href=&quot;http://sched.blackhat.com/mmorana&quot;&gt;http://sched.blackhat.com/mmorana&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;Since I am staying in &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;Las&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; Vegas till Sunday for attending &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_31&quot;&gt;Defcon&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; (the sister security conference that starts on T&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_32&quot;&gt;hursday&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; till Sunday at the Riviera Hotel) I also plan to attend the few talks that were also presented at &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_33&quot;&gt;BH&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_31&quot;&gt;but&lt;/span&gt; that I could not attend over there. &lt;br /&gt;
&lt;br /&gt;
There is also a new conference this year: &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_32&quot;&gt;&lt;a href=&quot;http://www.securitybsides.com/BSidesLasVegas&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_32&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_34&quot;&gt;BSides&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;. &lt;strong&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_33&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_35&quot;&gt;BSides&lt;/span&gt;&lt;/span&gt; is an open security conference that combines structured events with grass-root security talks.&lt;/strong&gt; I heard good things &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_33&quot;&gt;about&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_34&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_34&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_36&quot;&gt;BSides&lt;/span&gt;, it was held before during the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_37&quot;&gt;RSA&lt;/span&gt; conference in San Francisco. M&lt;/span&gt;&lt;/span&gt;y friend Tony &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_35&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_35&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_38&quot;&gt;UcedaVelez&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; (co-author with me of the future &lt;a href=&quot;http://www.owasp.org/index.php/Application_Threat_Modeling&quot;&gt;Application Threat Modeling&lt;/a&gt; book) and his company &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_31&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_36&quot;&gt;&lt;a href=&quot;http://www.versprite.com/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_36&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_39&quot;&gt;Versprite&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt; are among the sponsors of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_37&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_40&quot;&gt;BSides&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_38&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_41&quot;&gt;Las&lt;/span&gt;&lt;/span&gt; Vegas conference. If you are in &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_37&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_39&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_42&quot;&gt;Las&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; Vegas and you read this post, hope to meet you over there at either one of these conferences. I also kindly &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_40&quot;&gt;recommend&lt;/span&gt; my favorite place for breakfast, that for me is &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_38&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_41&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_43&quot;&gt;cappuccino&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_39&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_42&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_44&quot;&gt;croissants&lt;/span&gt;&lt;/span&gt;: &lt;/span&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_40&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_43&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_45&quot;&gt;Payard&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_41&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_44&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_46&quot;&gt;Pastisserie&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; and Bistro @ &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_42&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_45&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_47&quot;&gt;Ceasar&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; Palace...&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/6452345290043117879/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/6452345290043117879' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6452345290043117879'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6452345290043117879'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/07/blackhat-defcon-bsides-here-we-come.html' title='BlackHat, Defcon, BSides, Here We Come..'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-314652142381444531</id><published>2010-03-21T18:28:00.028-04:00</published><updated>2011-04-16T12:18:15.536-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software Security Frameworks"/><title type='text'>How a process model can help bring security into software development</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;Very good article about &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;SSDLC&lt;/span&gt;&lt;/span&gt; (Security Enhanced Software Development &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;LifeCycle&lt;/span&gt;&lt;/span&gt;). It should be mandatory reading for promoters of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;SSDLC&lt;/span&gt;&lt;/span&gt; initiatives within organizations. &lt;a href=&quot;http://gcn.com/articles/2010/03/03/ics2-process-model-for-software-security.aspx&quot;&gt;This article&lt;/a&gt; (third in the series on the secure software &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;lifecycle&lt;/span&gt;&lt;/span&gt;) captures some of my previous work around the concept of the (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;SSF&lt;/span&gt;&lt;/span&gt;) Software Security Framework. The &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;SSF&lt;/span&gt;&lt;/span&gt; was conceived as framework to integrate security within the (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;SDLC&lt;/span&gt;&lt;/span&gt;) Software Development &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;Lifecycle&lt;/span&gt;&lt;/span&gt; as well as with existing information security and risk management processes. The idea of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;SSF&lt;/span&gt;&lt;/span&gt; originated in 2005 while working with clients of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;Foundstone&lt;/span&gt;&lt;/span&gt; (the security consulting company that was acquired by &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;McAfee&lt;/span&gt; in 2004&lt;/span&gt;) mostly financial institutions and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;telcos&lt;/span&gt;&lt;/span&gt; and presented at &lt;a href=&quot;http://www.blackhat.com/presentations/bh-usa-06/bh-us-06-Morana-R3.0.pdf&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;Blackhat&lt;/span&gt;&lt;/span&gt; USA Conference in 2006&lt;/a&gt;. &lt;br /&gt;
﻿﻿﻿﻿﻿ &lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://gcn.com/articles/2010/03/03/~/media/GIG/GCN/Web/2010/ICS2_chart_400.ashx&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;395&quot; nx=&quot;true&quot; src=&quot;http://gcn.com/articles/2010/03/03/~/media/GIG/GCN/Web/2010/ICS2_chart_400.ashx&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Software Security Framework&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;﻿﻿﻿﻿﻿In general, I have to give credit to the idea of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;SSF&lt;/span&gt;&lt;/span&gt; to the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;CISOs&lt;/span&gt;&lt;/span&gt; that I worked for back then as consultant like Mr. &lt;a href=&quot;http://www.owasp.org/index.php/OWASP_AppSec_NYC_2004&quot;&gt;Denis &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_15&quot;&gt;Verdon&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. I also have to thank Mr. Joe &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_16&quot;&gt;Jarzombeck&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_17&quot;&gt;PMP&lt;/span&gt;&lt;/span&gt; Director Of Software Assurance at the National &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_18&quot;&gt;Cyber&lt;/span&gt;&lt;/span&gt; Security Division at the Department Of Homeland Security (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;DHS&lt;/span&gt;&lt;/span&gt;) for capturing my contributions in the &lt;a href=&quot;http://www.sis.uncc.edu/~seoklee/teaching/Papers/SwA%20Security%20in%20the%20Software%20Lifcycle%20v1.2%20-%20091306.pdf&quot;&gt;first &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_20&quot;&gt;SSDLC&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_21&quot;&gt;DHS&lt;/span&gt; document &lt;/a&gt;as well as the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_22&quot;&gt;SMEs&lt;/span&gt; such as Mrs. Karen Mercedes &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;Goertzel&lt;/span&gt; at the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_24&quot;&gt;IATAC&lt;/span&gt; (Information Assurance Technology Analysis Center) to document the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_25&quot;&gt;SSF&lt;/span&gt; in the 2007 &lt;a href=&quot;http://iac.dtic.mil/iatac/download/security.pdf&quot;&gt;State of The Art Report of Software Assurance&lt;/a&gt;. More recently the idea of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_26&quot;&gt;SSF&lt;/span&gt; evolved &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_27&quot;&gt;thanks&lt;/span&gt; to the work of Dr Gary &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;McGraw&lt;/span&gt; &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;CTO&lt;/span&gt; of &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;Cigital&lt;/span&gt; in the context of software security maturity models as &lt;a href=&quot;http://www.bsi-mm.com/ssf/&quot;&gt;framework of software assurance best practices within software maturity model domains &lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/314652142381444531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/314652142381444531' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/314652142381444531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/314652142381444531'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/03/how-process-model-can-help-bring.html' title='How a process model can help bring security into software development'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-7150427476371159293</id><published>2010-03-19T20:56:00.014-04:00</published><updated>2011-04-16T07:30:22.515-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Perceived Security vs. Real Security</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.doc.gold.ac.uk/~mas02fl/MSC101/Vision/Pics/EscherBondUnion2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; nx=&quot;true&quot; src=&quot;http://www.doc.gold.ac.uk/~mas02fl/MSC101/Vision/Pics/EscherBondUnion2.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;M.C. Escher (1898 - 1972), Bond Of Union, 1956. &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;Risk mitigation is about making an assessment more or less objectively of possible circumstances and events that might determine an impact. The perception of risk is an important factor to determine how humans make decisions on how mitigate risks. Human perception of risk is biased by facts and assumptions that might prevent objective and factual judgment of risk mitigation. Some of these perception factors are not risk factors are driven by human emotion and experience. &lt;br /&gt;
&lt;br /&gt;
One important factor is fear, consider for example these data as fear relates to perception of risk:...&lt;span style=&quot;font-weight: bold;&quot;&gt;the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former..&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;.the fear of a flying is still widespread despite the chances of being involved in an aircraft accident are about 1 in 11 million while your chances of being killed in an automobile accident are 1 in 5000. &lt;/span&gt;&lt;a href=&quot;http://www.schneier.com/blog/archives/2006/11/perceived_risk_2.html&quot;&gt;Bruce Schneier has actually posted on his blog&lt;/a&gt; some other interesting examples of human perception of risk. How perception matters for security risk professionals ? Well, assume you would like to drive security decisions, then understanding of human reaction to risk is critical factor to consider in risk mitigation decision making. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Understanding &lt;a href=&quot;http://en.wikipedia.org/wiki/Cognitive_science&quot;&gt;cognitive science&lt;/a&gt; basics is very important. Consider for example security awareness. Studies show that awareness shift the perception of risk. In general you are aware of a risk that is close to you or of an event that you experienced before, this would drive risk mitigation decision and investment on security.&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;a href=&quot;http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf&quot;&gt;Statistics from &lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://www.owasp.org/images/b/b2/OWASP_SSB_Project_Report_March_2009.pdf&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;OWASP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; for example shows that organizations that have experienced a public data breach spend more on security in the development process that those that have not&lt;/span&gt;. &lt;br /&gt;
&lt;br /&gt;
Basically a breach or an occurred event drive risk awareness and is an important factor in risk mitigation decision and security spending, the relationship of bad events to risk perception is also confirmed by cognitive science,... &lt;span style=&quot;font-weight: bold;&quot;&gt;events that have been experienced before are easily brought to mind are imagined and judged to be more likely than events that could not easily imagined and never occurred&lt;/span&gt;. &lt;br /&gt;
&lt;br /&gt;
Another important aspect of risk is what is referred as the appetite of risk or being risk adverse because of a potential gain. In general humans are risk adverse with respect to gains such as preferring a sure thing over gamble with a potential loss and taking a risk in the event the loss is small comparing with the potential gain. Consider for example risk perception biased by human greed. Sometimes risk decision are blind of potential losses because of lack of due diligence on what losses can be. This is what someone refer as taking the risk as being the chicken or being the hawk. Another way to think about risk vs. gain is to rationalize what is the residual risk left if an event would occur where the probability of the event can be estimated based upon real incident/events data. In essence is the what I could loose factor for the business gain of taking the risk. This require being able to visualize and articulate the risk event and simulate the losses that would occur if the event would materialize. In my day to day job for example I would use the threat scenarios and simulate the event of a loss to make the point to the business of the potential loss due to the exploit of a vulnerability. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Threat and risk modeling can be a useful way to visualize an attack, which threats an attack might materialize, the vulnerabilities that can be exploited and how these vulnerabilities can cause an impact.&lt;/strong&gt; Nevertheless, even if the threat scenario is visualized, the decision of whether to deploy a countermeasure or not is a risk judgment decision that is biased by business factors such as usability, customer impact and even with visualized threat scenario showing the risk potential, perception could still be such as that risk would be acceptable. If the threat scenario applies directly to a real event or incident that occurred before most likely the associated risk won&#39;t be accepted as well as if the threat scenario applies to a compliance risk event that could be found by the incoming audit. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;In essence, for certain organizations, previous incidents and audit findings can drive security decisions&amp;nbsp;more then threat assessments&amp;nbsp;such as using risk analysis and threat modeling.&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Another important factor of perception of risk is whether the risk impacts an organization or an individual responsibility directly or indirectly independently from the fact that the event occurred or not.&lt;/strong&gt; If the impact is direct such as in the case of assuming the liability for the loss of a bad event occurring risk awareness will be higher then if is indirect and happen to a third party would be considered a non-liability. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;In essence to make the cased for risk you need to consider how risk can be differently perceived by the business factoring fear as related to loss and rationalize residual risk as related to business gains.&lt;/strong&gt; If the organization is fear driven in risk decision making including data from previous incidents and fraud that the companies experienced before can help to drive security awareness as factor of risk mitigation. If the organization is audit driven use the audit findings and non-compliance liabilities and made the case for mitigation. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Ultimately the adoption of security initiatives and security spending can be driven with informed risk decisions using threat models and risk factors such as likelihood and impact but also by factoring perceived security and risk vs. actual/real security and risk.&lt;/span&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/7150427476371159293/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/7150427476371159293' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7150427476371159293'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7150427476371159293'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/03/perceived-security-vs-real-security.html' title='Perceived Security vs. Real Security'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-6559763314274770197</id><published>2010-01-24T14:09:00.017-05:00</published><updated>2010-10-31T22:59:29.098-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Security Frameworks"/><title type='text'>OWASP Italy Day 4 Software Security Initiatives Conference Presentation Videos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;﻿OWASP Italy has published the videos of the conference on Software Initiatives held in Milan and Rome, Italy last November&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.owasp.org/images/a/a3/OWASP-Italy.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;91&quot; nx=&quot;true&quot; src=&quot;http://www.owasp.org/images/a/a3/OWASP-Italy.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;﻿﻿The videos for the Milan conference can be reached at the following &lt;a href=&quot;http://www.owasp.org/index.php/Italy_OWASP_Day_4#tab=Photos_.26_Videos&quot;&gt;OWASP Day 4 Italy Page &lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;From the OWASP page you can also download my two video webcasts (Italian language over English slides) of the related conference presentations (1) Guidance for starting software security initiatives within your organization and (2) business cases for software security initiatives&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.owasp.org/images/5/5f/OWASP-Italy_at_SMAU06_2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; nx=&quot;true&quot; src=&quot;http://www.owasp.org/images/5/5f/OWASP-Italy_at_SMAU06_2.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;OWASP Italy&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;An hearth felt thank-you to the OWASP Italy organization and for putting this together, expecially to Matteo Meucci OWASP Italy Chair and Giorgio Fedon, Chief Operation Officer Minded Security.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If there is interest in having these webcasts also in English please contact me directly, thanks&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/6559763314274770197/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/6559763314274770197' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6559763314274770197'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6559763314274770197'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2010/01/owasp-italy-day-4-software-security.html' title='OWASP Italy Day 4 Software Security Initiatives Conference Presentation Videos'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-6026820128947623945</id><published>2009-12-31T17:12:00.022-05:00</published><updated>2010-10-31T22:52:23.148-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Looking past the cyber threats of the last decade and the new to come</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;﻿ &lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.sans.org/top-cyber-security-risks/images/figure1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;283&quot; nx=&quot;true&quot; src=&quot;http://www.sans.org/top-cyber-security-risks/images/figure1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Top Cyber Security Risks&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;﻿ As we pass the first &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;decennial&lt;/span&gt; after 2000 we can look back at how IS threats have evolved in the last ten years such as&amp;nbsp;for the complexity of the attacks and the evolution of the attacker&#39;s motives.&lt;br /&gt;
This is well described by Robert &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;Vamosi&lt;/span&gt; on his article on PC world &quot;&lt;a href=&quot;http://www.pcworld.com/article/id,185227/article.html&quot;&gt;Top 10 Security Nightmares of the Decade &lt;/a&gt;&lt;strong&gt;The new threats that will be facing in 2010, according to predictions from&amp;nbsp;a &lt;/strong&gt;&lt;a href=&quot;http://mcafee.com/us/local_content/white_papers/7985rpt_labs_threat_predict_1209_v2.pdf&quot;&gt;&lt;strong&gt;report&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; from &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;McAfee&lt;/span&gt; Avert labs will be exploiting of application layer vulnerabilities such as Web 2.0, social networking sites, drive by download, browser vulnerabilities man in the browser,&amp;nbsp; adobe flash vulnerabilities, mobile phone vulnerabilities, and malware attacks through &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;botnets&lt;/span&gt; and banking &lt;/strong&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;&lt;strong&gt;trojans (e.g. Zeus).&lt;/strong&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;For security practitioners that still think old security school, network security such as secure the perimeter by deploying firewall and IDS (that I pioneered developing at ISS) mitigate threats to the PC/desktop using AV, AS this is the main lesson from the trenches:&lt;/strong&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;as threat evolve and rather quickly with increased sophistication, we need new defenses expecially at the application layer to&amp;nbsp;mitigate these&amp;nbsp;new threats. &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The new defenses need to look at the security of the applications and the data expecially of the&amp;nbsp;transactions and the data flows (end to end from user to application) above all.&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
There is also a&amp;nbsp;need to look at security control from risk mitigation perspective, keep measures that work (that is risk mitigation to acceptable residual risk) and discard&amp;nbsp;the&amp;nbsp;ones that&amp;nbsp;do not work. One example of a very destructive change in the security industry would be for example to retire all MFA (Multi Factor Authentication) that were adopted in 2006 (mostly to earn a checkmark from FFIEC) and that now just add to the TCO (Tocal Cost of Ownership) since can be easily defeated by malware.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;As Einstein said,&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot; let&#39;s not pretend that things will change if we keep doing the same things&quot;&lt;/span&gt;. In essence, we are moving to&amp;nbsp;a past information age society where cybercrime threats mitigation need to be the main focus of information security. I believe that&amp;nbsp;we&amp;nbsp;as security practitioners we are&amp;nbsp;about&amp;nbsp;to reach a tipping point: organizations and governments will pay a huge price for fraud and data losses without deploying radically new countermeasures.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;My wish for the 2010 is that&lt;/span&gt; &lt;strong&gt;business organizations and government will put more focus on application security and root causes of vulnerabilities such as insecure software and design.&lt;/strong&gt; I hope we could put the effort on building new countermeasures at the application layer and use new approaches such as identification of design flaws that account for more than 50% of vulnerabilities such as by using&amp;nbsp;threat modeling (that will be the book I will publish in 2010). My hope is that we recognize that we as security practitioners we are on a time race to win against cybercriminals, we need to work with businesses to roll out&amp;nbsp;new&amp;nbsp;security control and measures. We need to quickly adapt to the new threats and&amp;nbsp;prepare to respond to the cyber threats of the next decade... &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/6026820128947623945/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/6026820128947623945' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6026820128947623945'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6026820128947623945'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/12/looking-past-cyber-threats-of-last.html' title='Looking past the cyber threats of the last decade and the new to come'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-8384054201464789886</id><published>2009-11-01T19:27:00.062-05:00</published><updated>2010-10-31T01:14:06.798-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Security Frameworks"/><title type='text'>Business Cases For Software Security Initiatives, Maturity Models and Security Costs Analysis</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;On November 4, I am going to present at Italy&#39;s &lt;a href=&quot;http://www.owasp.org/index.php/Italy_OWASP_Day_E-Gov_09&quot;&gt;OWASP Day E-Gov 09&lt;/a&gt; OWASP (Open web Security Project) and CONSIP (a company of the Italian Department of Economy and Finance)security conference on the topic of software security initiatives. In my &lt;a href=&quot;http://www.owasp.org/images/c/c4/OWASP-ItalyDayEGov09_04_Morana.pdf&quot;&gt;presentation&lt;/a&gt; , &lt;strong&gt;I am going to address first the pre-requisites for the software security initiative:&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Compliance with information security standards (e.g. PCI DSS); &lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Education and awareness on root causes of vulnerabilities in applications/software;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Software security engineering benchmarking using a software security maturity model; &lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Business cases to justify budget and investments in software security. &lt;/strong&gt;﻿﻿﻿ &lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;﻿﻿Since the initial cases for software security initiatives are often made for the senior management (the sponsors of the initiative), it is important to make the appropriate business cases and use the so called &quot;drivers&quot; for software security adoption such as executive level reports from Gartner, Forrester as well as public research on software security from NIST, SEI, DHS. Examples of good resources include &lt;a href=&quot;http://www.nist.gov/public_affairs/releases/n02-10.htm%20&quot;&gt;NIST research&lt;/a&gt; on the causes of vulnerabilities and on the economics of in-secure software and &lt;a href=&quot;http://www.gartner.com/press_releases/asset_106327_11.html&quot;&gt;Gartner press releases&lt;/a&gt; on economic impact of software security.&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;The next step is to assess the organization&#39;s secure software engineering processes and capabilities using a standard such as a Software Security Maturity Model (SSMM): the objective is to make the sponsors of the initiative aware of the organization&#39;s capabilities in secure software engineering, risk management, governance and training&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7-FHRs-5iKYWLQ-fv-cbhaLAXzcmpzS8CnLgQcniclrHl5cYT4rh4eiqG_ENxeW88s0tRmqUPbJBzaoList2z8AsCgpTdNpYFuNOAIbnYgdhNb4a_fh5Vo6H51rE4Gi0wMIIQ/s1600/ssf.bmp&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;176&quot; id=&quot;BLOGGER_PHOTO_ID_5406005495305204130&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7-FHRs-5iKYWLQ-fv-cbhaLAXzcmpzS8CnLgQcniclrHl5cYT4rh4eiqG_ENxeW88s0tRmqUPbJBzaoList2z8AsCgpTdNpYFuNOAIbnYgdhNb4a_fh5Vo6H51rE4Gi0wMIIQ/s400/ssf.bmp&quot; style=&quot;float: left; height: 141px; margin: 0px 10px 10px 0px; width: 320px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;BSIMM SSF&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;strong&gt;The recently (2009) published Build Security In Maturity Model (&lt;/strong&gt;&lt;a href=&quot;http://www.bsi-mm.com/&quot;&gt;&lt;strong&gt;BSIMM&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;) from Dr. Gary McGraw and the Software Assurance Maturity Model (&lt;/strong&gt;&lt;a href=&quot;http://www.opensamm.org/&quot;&gt;&lt;strong&gt;SAMM&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;) from Mr. Pravir Chandra can help organizations in the assessment, planning and implementation of software security initiatives.&lt;/strong&gt; These models are explictly designed for software security assurance and are based upon real data (surveys) from companies that actually had enacted and implemented software security initiatives. The models are organized along similar domains (e.g. governance, intelligence, SSDL touchpoints, deployment for BSIMM and governance, construction, verification, deployment for SAMM) each domain has three best practices and three levels of maturity. BSIMM&#39;s 12 best practices have a total of 110 sofwtare security activities and maturity levels that can be achieved by assigning goals and objectives to each activity.&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;justify&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;A traditional maturity model such as the Capability Maturity Model (CMM) can also be&amp;nbsp;mapped to&amp;nbsp;levels of software assurance even if is primarly designed to assess maturity for software quality assurance, engineering and other organization domains. &lt;strong&gt;More specifically for the security domain, the System Security Engineering Capability Maturity Model (SSE-CMM) addresses maturity of security systems as a whole not software security in particular&lt;/strong&gt; but based upon my previous professional experience on the System Security Engineering-Capability Maturity Model (&lt;a href=&quot;http://www.sse-cmm.org/docs/ssecmmv3final.pdf&quot;&gt;SSE-CMM&lt;/a&gt;), &lt;strong&gt;it is possible to map software security activities to CMM maturity levels and provide a roadmap for software security maturity&lt;/strong&gt;. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;For example it is possible to map software security&amp;nbsp;from the initial (level 1) to optimized (level 5) via repeatable (level 2), defined (level 3) and managed (level 4) levels of software security assurance. The mapping of software security activities for each level need to include main security domains such as:&lt;/div&gt;&lt;ol&gt;&lt;li&gt;Software Risk Analysis &amp;amp; Management &lt;/li&gt;
&lt;li&gt;Software Security Engineering&lt;/li&gt;
&lt;li&gt;Security Assessment Processes and Tools&lt;/li&gt;
&lt;li&gt;Security Training &amp;amp; Awareness.&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In my presentation, I provide the mapping of CMM maturity levels to software security processes&amp;nbsp;starting from&amp;nbsp;security testing (in BSIMM this domain is referred as SSDL touchpoints domain and in SAMM as verification business function) since for most organizations the evolution toward software security starts from application security assessments such as web application pen testing and then evolves to secure code analysis, threat modeling as well as other supporting best practices such as metrics and measurements, risks management, software security training and awareness.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;One fundamental element of any maturity model is the definition of the software security roadmap that provides&amp;nbsp;the set of standard activities that&amp;nbsp;bring an organization to a certain capability level in software security&amp;nbsp;that can measured both qualitatively and quantitatively.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;For example &lt;span style=&quot;font-weight: bold;&quot;&gt;an organization can start at CMM Level 1 (Initial) with a catch and patch approach, move to CMM Level 2 (repeteable but reactive) by ethical hacking existing applications.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;An organizaiton can reach CMM Level 3 (defined and proactive) by defining a security testing process such as vulnerability assessment as part of the SDLC that is adopted for security assessing vulnerabilities for each web application project at the organization level.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;At&amp;nbsp;level CMM 4 (managed) organizations are capable to risk manage projects with checkpoints in all the SDLC phases (e.g. asserting security by design, development and deployment) and by using vulnerability metrics to make informed risk management decision at each checkpoint.&lt;/span&gt;﻿﻿﻿﻿ &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;﻿ &lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlGktfBjwMduRP3E0vd22PMJ4PXh__D8TuY7KVxSjcM9W69dl6NiVjy3V0LnmCstKNvfPHF33s8gP_690Fenp3LZOhUQblWPMVk8K0FGkVyy64TMoHQ2rtTRePgZpZmSuAwPcc/s1600/maturitycurve.bmp&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;276&quot; id=&quot;BLOGGER_PHOTO_ID_5406007082368017378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlGktfBjwMduRP3E0vd22PMJ4PXh__D8TuY7KVxSjcM9W69dl6NiVjy3V0LnmCstKNvfPHF33s8gP_690Fenp3LZOhUQblWPMVk8K0FGkVyy64TMoHQ2rtTRePgZpZmSuAwPcc/s400/maturitycurve.bmp&quot; style=&quot;float: left; height: 221px; margin: 0px 10px 10px 0px; width: 320px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Software Assurance Maturity Curve And CMM Levels&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;﻿﻿﻿&lt;span style=&quot;font-weight: bold;&quot;&gt;At level CMM 5 (optimized), organizations have optimized software security processes for increased return of security investment, security cost savings and improved risk mitigation/reduction.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One essential factor for achieving maturity is understanding the concept of the maturity curve: this is similar to the learning curve to mature in &lt;strong&gt;&lt;/strong&gt;knowledge and skills: a maturity curve shows that time is needed to acquire maturity. Since the maturity level curve provides the time frame for reaching software security maturity, it helps planning and set up the right expectations to management and also factor the costs.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;For example, according to the maturity curve,&amp;nbsp;the effort required to an organization for passing from CMM level 3.5 to 4 is the highest hence only few large organization can afford the cost that is required.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;This&amp;nbsp;costly step&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;coincides from proactively define a software security process and manage it thought the SDLC for each product at organization wide level. From the time perspective for example software security processes are not acquired and assimilated overnight but over the course of several years especially when the sofwtare security initiative impacts several business units with several different SDLCs as well as hundreds of web applications to risk manage. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;One of the factors most critical to the success of software security initiatives are the metrics and measurements&lt;/strong&gt;: only by the definition of what we should measure, where and how it will be possible to manage software security risks and assess the organization maturity in acquisition and assimilation of software security best practices.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;T&lt;span style=&quot;font-weight: bold;&quot;&gt;he essential software security metrics for a successfull software security include process and vulnerability management metrics, vulnerability root cause analysis, governance and the risk analysis.&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
On November 5, I will be in Milan to &lt;a href=&quot;http://www.owasp.org/images/7/7b/OWASP-Italy_Day_IV_Morana.pdf&quot;&gt;present&lt;/a&gt; at &lt;a href=&quot;http://www.owasp.org/index.php/Italy_OWASP_Day_4&quot;&gt;Italy OWASP Day 4&lt;/a&gt; on the business cases to justify investments on software security initiatives such as the spending in software security: &lt;strong&gt;the goal of this presentation is help security managers in answering questions from senior management&amp;nbsp;such as how to&amp;nbsp;justify the security&amp;nbsp;budget such as why we should spend money for software security, how much we should spend and where.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;br /&gt;
In a nutshell this means quantify the business case for software security in terms of security costs such as cost vs. benefit analysis, assumption costs vs. failure costs, quantitative risk analysis and Return of Security Investments (&lt;a href=&quot;http://www.owasp.org/images/7/7b/OWASP-Italy_Day_IV_Morana.pdf&quot;&gt;ROSI&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;a href=&quot;http://www.finextra.com/finextra-images/top_pics/cash2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; nx=&quot;true&quot; src=&quot;http://www.finextra.com/finextra-images/top_pics/cash2.JPG&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;strong&gt;The key in the analysis is to be able to estimate the software security failure costs such as the ones due to business impact deriving from a data breach or fraud.&lt;/strong&gt; For most organizations this is a daunting task because these data are not available, hence I am suggesting an approach that uses public sources to estimate such costs such as reported data breaches from FTC (Federal Trade Commission), data loss incident data from datalossdb.org and correlation of incidents to vulnerabilities from the Web Hacking Incident Database (&lt;a href=&quot;http://www.owasp.org/images/7/7b/OWASP-Italy_Day_IV_Morana.pdf&quot;&gt;WHID&lt;/a&gt;).&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;strong&gt;Quantifying failure costs is essential for determining the benefits of security initiatives so can be justified using cost vs. benefit analysis&lt;/strong&gt;. In the presentation I sho&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhSu_n32yHYdFyqtRoleQWWwHw20lzEtY4EtOCMOBorS-ZZRsd5x8ZKF2-Dked5QK3G6ierGAyU3jENajCkhS-T9kkPQYX7Jf07LZYCl9ISzOWYcFYfBuunwrW29E8KOIs6WC/s1600/securitycosts.bmp&quot;&gt;&lt;/a&gt;w how assumption costs (cost that your organization assume for software security initiatives) correlate to failure costs (costs that the organization incur because of insecure software) to an increased level of software security assurance: the objective is to justify an investment in software security by monetize the security costs. &lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhSu_n32yHYdFyqtRoleQWWwHw20lzEtY4EtOCMOBorS-ZZRsd5x8ZKF2-Dked5QK3G6ierGAyU3jENajCkhS-T9kkPQYX7Jf07LZYCl9ISzOWYcFYfBuunwrW29E8KOIs6WC/s1600/securitycosts.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;250&quot; nx=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhSu_n32yHYdFyqtRoleQWWwHw20lzEtY4EtOCMOBorS-ZZRsd5x8ZKF2-Dked5QK3G6ierGAyU3jENajCkhS-T9kkPQYX7Jf07LZYCl9ISzOWYcFYfBuunwrW29E8KOIs6WC/s320/securitycosts.bmp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Optimized Software Security Costs&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;strong&gt;Some studies that use cost vs benefit analysis show that when the cost of a security investment is around an optimal value&amp;nbsp;of 30-40% of the overall failure costs, the security cost can be justified.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;This can be desumed by optimizing the overall costs when factoring the cost of security failures and the cost of security measures.&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;strong&gt;Another method for justifying software security costs consists on using quantitative risk analysis&lt;/strong&gt;. Quantitative risk analysis allows to estimate the annualized impact of loss such as the one due to a cause of insecure software such as SQL injection. For example it is possible to calculate a rough estimate of ALE (Annual Loss Expectancy) for a SQL Injection attack by calculating the probability of such attack occurring based upon data of the reported incidents. As data loss from FTC (US Federal Trade Commission) show that the probability of a company incurring in a data loss of PII is about 4.5% the probability of a data loss due to web channel and because of SQL injection is about 2.5%. The business impact can be quantified in terms of FTC estimate for each record of a data loss to be about 655 $/per lost record and multiplied by the number of records that can be potentially be lost to estimate the overall asset value that can be lost. This value can be multiplied by the probability of the loss to calculate the liabitility for the company. &lt;strong&gt;According to FTC data, in the case of a generic data loss for example (e.g. probability of 4.5%) the liability for a company of each PII record loss is about 35 $/record.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Another security cost analysis method is to evaluate the cost savings to the company by the introduction of the software security initiative by calculating the ROSI (Return Of Security Investment) of software security.&lt;/strong&gt; I will refer to previous studies (Soo Hoo IBM study) that use ROSI to justify investment for software security activities as well as to use a standard ROSI formula (SonnenBerg) and previously computed ALE (Annualized Loss Expectancy) to determine the ROSI. &lt;strong&gt;According to Soo Hoo study it is shown that comparing software security assessments such as threat modeling, source code analysis and pen test, threat modeling provides the highest return of the investment since is done earlier in the SDLC&lt;/strong&gt;: is you spend $ 100 K in a software security initiative, 21% will be saved if you adopt threat modeling for example.&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;Finally, I will cover the dashboard metrics can be used in support the business cases to different shareholders in an organization. As the business case is initially made with estimated engineering and security data, it needs to be supported with measurements on the fields. This dashboard metrics need to &lt;strong&gt;show management that the software security initiative provides value to the shareholders and that is aligned with other company goals and values such as financial value for the company, value for the company customers, value for the internal business processes and value for learning and growth&lt;/strong&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot; class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;﻿&lt;/div&gt;</content><link rel='enclosure' type='application/pdf' href='http://www.owasp.org/images/7/7b/OWASP-Italy_Day_IV_Morana.pdf' length='0'/><link rel='enclosure' type='application/pdf' href='http://www.owasp.org/images/c/c4/OWASP-ItalyDayEGov09_04_Morana.pdf' length='0'/><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/8384054201464789886/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/8384054201464789886' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/8384054201464789886'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/8384054201464789886'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/11/software-security-initiativesmaturity.html' title='Business Cases For Software Security Initiatives, Maturity Models and Security Costs Analysis'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7-FHRs-5iKYWLQ-fv-cbhaLAXzcmpzS8CnLgQcniclrHl5cYT4rh4eiqG_ENxeW88s0tRmqUPbJBzaoList2z8AsCgpTdNpYFuNOAIbnYgdhNb4a_fh5Vo6H51rE4Gi0wMIIQ/s72-c/ssf.bmp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-7834478355961292220</id><published>2009-10-30T20:31:00.028-04:00</published><updated>2011-04-16T07:31:21.554-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><title type='text'>IMI Security Summit in Northern Kentucky: awesome security conference</title><content type='html'>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://informatics.nku.edu/imi/virtualcio/images/banner_home.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;73&quot; nx=&quot;true&quot; src=&quot;http://informatics.nku.edu/imi/virtualcio/images/banner_home.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;﻿ &lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿I presented at the &lt;a href=&quot;http://imi.nku.edu/security/2009_Symposium/speakers.aspx&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;IMI&lt;/span&gt; Security Summit&lt;/a&gt; on the topic of &quot;&lt;a href=&quot;http://www.owasp.org/index.php/File:IMI_2009_Security_Summit.ppt&quot;&gt;Threat Analysis as methodology for deriving risk-based security tests of web application software&lt;/a&gt;&quot;. This conference, gave me the opportunity to&amp;nbsp;present for&amp;nbsp;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;OWASP&lt;/span&gt; thanks to the invitation from Dr James Walden that teaches Software Security at Northern Kentucky University. This is the second time that I give the talk at the IMI security conference.&amp;nbsp;The organization of this conference is very good as well as the quality of the speakers, one outstanding speaker to mention this year&amp;nbsp;was&amp;nbsp;Patrick Gray, Principal Security Strategist of CISCO and ex collegue of mine at the company Internet Security Systems.&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;http://cyberexpo.memphis.edu/2009/images/pgray.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; nx=&quot;true&quot; src=&quot;http://cyberexpo.memphis.edu/2009/images/pgray.jpg&quot; width=&quot;167&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;Patrick Gray is truly an awesome speaker and presenter. I thought it is was worth&amp;nbsp;attendingthe conference just for listening to his keynote.&amp;nbsp;Patrick&amp;nbsp;can communicate effectively to a wide audience of security folks, he gets people to think about security&amp;nbsp;with simple messages, examples and&amp;nbsp;with sense of humor. On the main message of his presentation, I think is 100% right in my opinion: &lt;strong&gt;the main security challenge&amp;nbsp;the society as whole&amp;nbsp;faces today besides combacting organized cybercrime, is the increased imporance of the human factor&lt;/strong&gt; (he refers is as the human firewall) as a way to mitigate the new threats such as&amp;nbsp;social networking threats and phishing. The new targets nowdays scale up to 300 +&amp;nbsp;million facebook users and&amp;nbsp;involve a&amp;nbsp;new demographics such as&amp;nbsp;a generation Y that is proned to use social networks like facebook and&amp;nbsp;twitter.&amp;nbsp; As security industry and as security practitioners, according to Patrick&amp;nbsp;we are challenged to respond to these new threats with increased education/awareness and the development of more effective security measures.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;During luncheon, I attended the&amp;nbsp;presentation from Dr Kevin &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;Gallenger, &lt;/span&gt;&quot;State of IT Security 2009&quot;.&amp;nbsp;The survey data being presented are also in agreement on other surveys such as the ones from &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;Ponemon&lt;/span&gt; &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;Institute&lt;/span&gt;, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;CSI&lt;/span&gt;-FBI and Verizon on state of information security within organizations. &lt;strong&gt;For example,&amp;nbsp;the survey&amp;nbsp;shows that less then 60 % of organizations conduct a formal IT audit and that hackers and employees are equally problematic as source of attacks (27%)&lt;/strong&gt;. &lt;strong&gt;A recent&lt;/strong&gt; &lt;strong&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;Ponemon&lt;/span&gt;-&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;Imperva&lt;/span&gt; institute&amp;nbsp;survey. also&amp;nbsp;shows that 71% of companies do not think compliance is strategic to security even after experiencing at least one data breach. Also, according to the same survey,&amp;nbsp;internal sources of attacks&amp;nbsp;are around 20-30 % of overall threat agents.&lt;/strong&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The part that I liked the most of the survey was the emphasis on the difference between &quot;acquisition&quot; of security and &quot;adoption&quot; of security in particular as related to compliance. &lt;strong&gt;Most companies for example, acquire security tools&amp;nbsp;and&amp;nbsp;produce security policies in response to compliance requirements,&amp;nbsp;but they do not fully implement and/or enforce them: the survey shows for example that only 54% of companies do that.&lt;/strong&gt; Financial services are the ones to score better. &lt;br /&gt;
&lt;br /&gt;
The survey also touches the problem of incident disclosure: &lt;span style=&quot;font-weight: bold;&quot;&gt;44% of respondents indicated that they were &lt;/span&gt;&lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_15&quot; style=&quot;font-weight: bold;&quot;&gt;unwilling&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; to disclose the types of breaches&lt;/span&gt;. ﻿&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://biancoenerored.files.wordpress.com/2009/07/due-pesi-due-misure.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;125&quot; nx=&quot;true&quot; src=&quot;http://biancoenerored.files.wordpress.com/2009/07/due-pesi-due-misure.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Two Weights-Two Measures&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;I believe that security incident disclosure&amp;nbsp;is one of the main problem we face in information security today: &lt;/strong&gt;because&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;we lack data on losses, fraud and incidents affecting different business sectors, we cannot&amp;nbsp;identify needs and opportunities to improve security and make business case for new security investments to mitigate these risks.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;﻿&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;But there are some exceptions, compliance with SB (Senate Bill) 1386 that is currently enforced in several US States for example,&amp;nbsp;forces companies affected by data breaches to publicly disclose the losses including customer&#39;s PII such as SSNs. Thanks to SB 1386, we can still factor business impact of data breaches.&amp;nbsp;For example, 100 million records of PII&amp;nbsp;being reported&amp;nbsp;as loss&amp;nbsp;at 25 $/piece per record (estimated at the cost to buy that PII on the black market) equals 2.5 billion $ impact.&amp;nbsp;I believe that only by&amp;nbsp;factoring&amp;nbsp;the&amp;nbsp;business impact of data losses and fraud it is possible to make informed risk decisions. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I also had a nice conversation&amp;nbsp;with NKU&#39;s professor Dr. Frank &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_19&quot;&gt;Braun.&lt;/span&gt; Dr&amp;nbsp;Braun research covered business cases for software security such as &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_23&quot;&gt;ROSI&lt;/span&gt;, cost/benefit analysis and quantitative risk analysis as factors for making business cases. We shared some thoughts about business risk impact analysis and the&amp;nbsp;human factors in risk decision making.&amp;nbsp; &lt;strong&gt;We mostly agreed that 1: business security is the most important factor to security 2 we&amp;nbsp;lack data that prove the point about business value of security&amp;nbsp; and 3&amp;nbsp;there is a&amp;nbsp;need to approach security from business perspective instead of technical perspective such as to take into consideration&amp;nbsp;business impacts as well as the organizational culture of&amp;nbsp;risk decision makers.&lt;/strong&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Unfortunately, most of security decision making &lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_28&quot;&gt;nowdays&lt;/span&gt; follows different factors such as what &quot;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_29&quot;&gt;Gartner&lt;/span&gt; says&quot; or what security vendor says or what my competitor does. Instead of rational thinking backed by quantitative data, we follow an apparoach that it either purely speculative of security business impacts or&amp;nbsp;that follows the so called&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Herd_mentality&quot;&gt;herd mentality&lt;/a&gt;... &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihBgHWk8vTCc1aE6uY913qbMBLb3J_VFu6XBqxWrh0C4g9YWvjSUJPeFBVOe6twasM6lKExQplpo5mM7J4iPUbkx3P6CG2DnXGL4EEAJicrhdoUE88ydOE43PFJNKUTXDywUje/s400/herd-of-sheep.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;135&quot; nx=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihBgHWk8vTCc1aE6uY913qbMBLb3J_VFu6XBqxWrh0C4g9YWvjSUJPeFBVOe6twasM6lKExQplpo5mM7J4iPUbkx3P6CG2DnXGL4EEAJicrhdoUE88ydOE43PFJNKUTXDywUje/s200/herd-of-sheep.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Therefore we also concluded, that there is a need&amp;nbsp;of a&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_30&quot;&gt;&amp;nbsp;new&amp;nbsp;culture for security management&lt;/span&gt; that puts the quality of securty data, expecially data on&amp;nbsp;business impact of security losses as priority&amp;nbsp;so it is possible to&amp;nbsp;made informed risk decisions. This would require a change culture and a&amp;nbsp;new School Of Information Security that put the&amp;nbsp;focus&amp;nbsp;on&amp;nbsp;meaninful&amp;nbsp;metrics such as the risk as business impact of data losses and fraud data.&amp;nbsp;To know more on what I mean for New School Of Information Security, I recommend reading&lt;a href=&quot;http://www.amazon.com/New-School-Information-Security-ebook/dp/B00164UXII&quot;&gt; &lt;em&gt;Adam&lt;/em&gt; Shostack book&lt;/a&gt;&amp;nbsp;The New School Of Information Security.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;My presentation ( please refer to our local &lt;a href=&quot;http://www.owasp.org/index.php/Cincinnati#October_Meeting&quot;&gt;OWASP chapter web page&lt;/a&gt; for further info)&amp;nbsp;covered the topic of risk based security testing and was nicely attended&amp;nbsp;by several&amp;nbsp;folks. I had a lot of questions after my presentation, that&amp;nbsp;I usually consider the best evidence that I raised enough interest on the&amp;nbsp;topic being presented.&amp;nbsp;I think most organizatons&lt;span style=&quot;font-weight: bold;&quot;&gt;&amp;nbsp;today are not doing good enough security testing as&amp;nbsp;they should do&lt;/span&gt;. It is not enough to test for&amp;nbsp;postive requirements to build secure applications, we need security tests that are&amp;nbsp;driven by misuse and abuse cases. We also need to prioritize tests according to&amp;nbsp;risks such&amp;nbsp;to test first the ones that are most&amp;nbsp;likely to exploit vulnerabilities and produce the largest impact.&amp;nbsp;My presentation was also an opportunity to&amp;nbsp;present the vs 3 of the&amp;nbsp;&lt;a href=&quot;http://www.owasp.org/index.php/Category:OWASP_Testing_Project&quot;&gt;OWASP Testing guide&lt;/a&gt;.&amp;nbsp;This guide includes several&amp;nbsp;security test cases&amp;nbsp;that can be used to test for most commong vulnerabilities in web applications.&amp;nbsp;The OWASP testing guide&amp;nbsp;also includes information of&amp;nbsp;testing tools (most of the them are OWASP tools) as well as&amp;nbsp;techniques that can be used. The OWASP testing guide is considered by software security experts and thought leaders&amp;nbsp;such as&amp;nbsp;Dr. Gary McGraw, one of the best pieces of intellectual property&amp;nbsp;ever produced by OWASP.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;; font-size: 10;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/7834478355961292220/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/7834478355961292220' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7834478355961292220'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7834478355961292220'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/10/risk-driven-security-testing.html' title='IMI Security Summit in Northern Kentucky: awesome security conference'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihBgHWk8vTCc1aE6uY913qbMBLb3J_VFu6XBqxWrh0C4g9YWvjSUJPeFBVOe6twasM6lKExQplpo5mM7J4iPUbkx3P6CG2DnXGL4EEAJicrhdoUE88ydOE43PFJNKUTXDywUje/s72-c/herd-of-sheep.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-5060966446927754557</id><published>2009-10-03T10:05:00.074-04:00</published><updated>2010-10-31T01:26:32.451-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threat Modeling"/><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Cybercrime risk mitigation: a critical view of compliance from threat analysis perspective</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb1ZCF1AMeGbI9G-RghgJW1XWLgLggCS4gu0GZ3ggEGV2A-Z1hxVz1s_oYlTCzz1-skFgZbtSTXTxRQa97i3bLzhJxZThlBJPrwUe99GuBBXms-GauLNgrXvkqsWbRSo2NpMvr/s1600-h/play+at+your+own+risk.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5388468635924749010&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb1ZCF1AMeGbI9G-RghgJW1XWLgLggCS4gu0GZ3ggEGV2A-Z1hxVz1s_oYlTCzz1-skFgZbtSTXTxRQa97i3bLzhJxZThlBJPrwUe99GuBBXms-GauLNgrXvkqsWbRSo2NpMvr/s200/play+at+your+own+risk.JPG&quot; style=&quot;cursor: pointer; float: left; height: 200px; margin: 0pt 10px 10px 0pt; width: 198px;&quot; /&gt;&lt;/a&gt;I recently had the opportunity to give prezos for OWASP in &lt;a href=&quot;http://www.issa-la.org/Default.aspx?id=1058&quot;&gt;Los Angele&lt;/a&gt;&lt;a href=&quot;http://www.issa-la.org/Default.aspx?id=1058&quot;&gt;s&lt;/a&gt; and &lt;a href=&quot;http://www.owasp.org/index.php/Orange_County&quot;&gt;Orange Co&lt;/a&gt;&lt;a href=&quot;http://www.owasp.org/index.php/Orange_County&quot;&gt;unty&lt;/a&gt; together with the Application Threat Modeling book co-author, Tony Ucedavelez. Both Tony and I believe that application threat modeling can help organizations understand cyber-threats and identify countermeasures to mitigate them proactively. We also think that compliance with security standards is not a guarantee for &quot;immunity&quot; of becoming a target and victim of cybercrime and fraud hence the topic of our presentation, intentionally provocative: &lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;The rise of threat analysis and the fall of &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;compliance in mitig&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;a&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;tin&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;g cyber-crime &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;risks&quot;. &lt;/span&gt;We take a critical view of compliance especially PCI-DSS and we advocate &lt;span style=&quot;font-weight: bold;&quot;&gt;putting compliance in perspective of business risks mitigation.&lt;/span&gt; To support our view, we start looking at how PCI-DSS security standard drives application security with compliance to &lt;span style=&quot;font-weight: bold;&quot;&gt;h&lt;/span&gt;&lt;strong&gt;ighlight the fact the two largest data breaches of credit card data ever &lt;/strong&gt;&lt;a href=&quot;http://datalossdb.org/&quot;&gt;&lt;strong&gt;reported&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; occurred to companies that were compliant with the security standard PCI-DSS&lt;/strong&gt;. We also analyze these data breaches for the business impact that caused and we compare the cost of non-being compliant with the cost of the business impact caused by the breach: based upon public disclosed data (2007 TJX data breach) we find out that &lt;span style=&quot;font-weight: bold;&quot;&gt;overall the cost of non-compliance is one factor less of magnitude comparing with how much will cost to an organization to cover the overall business impact of the data breach incident &lt;/span&gt;(e.g. millions for non compliance comparing with billions for business impact)&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;There is a strong and compelling case, based upon&amp;nbsp;vulnerability data alone,&amp;nbsp;that compliance do not buy security for your&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; organization but a minimum level &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;of information security assurance&lt;/span&gt;: in the context of mitigating vulnerabilities for compliance sake for example such as to fill a compliance requirement (e.g. vulnerability assessment), based upon the data from MITRE, at their best the organization will mitigate 45% of all known vulnerabilities (e.g. 600 included in CWE MITRE in the study). &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;We use this data to advocate that the remaining 55% of ways to exploit known issues can be assessed by adopting a threat analysis and risk mitigation techniques that cover a larger attack space then compliance security assessments.&lt;/strong&gt; These threat analysis techniques for example include (1) gathering cyber-intelligence from attacks from public sources such as law enforcement (e.g. FBI, Secret Service), (2) learning about attacks scenarios and likely targets with attack tree analysis, (3) determine the possible abuses of the applications business logic using use and abuse cases, (4) identify the attack vectors used against web sites so applications defenses can be tested and (5) finally by developing application countermeasures at the application layer with threat modeling/architecture risk analysis.&lt;span style=&quot;font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The threat mitigation&amp;nbsp;mantras are: (1) you can only mitigate for threat you know of. ( 2) Know your enemy so you can build your defenses. Being threat aware means being threat intelligent. To know your enemy means proactive risk awareness: as organizations defending from cyber-attacks we need to be aware that cyber-criminals already assume your have been compliant with PCI-DSS to mitigate known vulnerabilities such as to protect credit card data.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Fraudsters also know that ogrnaizations im&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;plemented multi-factor authentication and fraud detection, in compliance with FFIEC guidelines for authentication.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjns3AZdC4MIEyWI9YG-iD5rb5VQKeC5vOhHg0wwBIktdZkPm6a0GgydUcTJ25vSkO1YBTg0-SEtoXMwCvSP6hOxh5IZnpoDC34EhJ67kB_u1uxdormW0SDmk4ud9kMTDdSx159/s1600-h/situationalawareness.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;strong&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5388472458890749522&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjns3AZdC4MIEyWI9YG-iD5rb5VQKeC5vOhHg0wwBIktdZkPm6a0GgydUcTJ25vSkO1YBTg0-SEtoXMwCvSP6hOxh5IZnpoDC34EhJ67kB_u1uxdormW0SDmk4ud9kMTDdSx159/s320/situationalawareness.JPG&quot; style=&quot;cursor: pointer; float: left; height: 196px; margin: 0pt 10px 10px 0pt; width: 266px;&quot; /&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;We basically need to be aware of the new bigger cybercrime threat and how might affect us.&lt;/strong&gt; For example, cyber criminals can buy or lease sophisticated automated attack tools called botnets to do fraud. These botnets can direct attacks against banking customers by exploiting browser vulnerabilities as well as against on-line banking sites bypassing strong authentication and data filtering controls. Cyber-crimes include fraud (e.g. wire transfer to money mule accounts) as well as stealing credit card and confidential data for reselling it in the underground economy or to fake credit and debit cards. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Understanding how these threats scenarios might affect your organization in terms of threat analysis means: 1) Is possibly my organization a target 2) what is the data asset that most likely an attacker/fraudster will go after 3) the attack vectors) that he will use 4) the potential vulnerabilities that can be exploited and where 5) which are the countermeasures that I can design and deploy at the application layer.&lt;/strong&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Threat analysis of security controls must be the driver for design of countermeasures:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;To test defensive controls at the application layer, we need to identify the attacks vectors (both manual and automated) and use them against the authenticated and non authenticated entry points of our application, validate the authorization levels required and walk-through the data flows (from client to back end) to test for potential vulnerabilities. The aim of this data flow threat analysis is to localize and identify countermeasures can be designed and deployed at each layer and component of the architecture (client, server processes and data).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;We emphasize that for security compliance to be security effective, needs to enforce actionable threat assessments.&lt;/span&gt; We advocate a new risk mitigation strategy that looks at compliance with a positive security approach rather then negative security approach. The positive security approach consists on proving the positive effect of defenses on mitigating threats, the negative security approach consists on proving the gaps in applying standards and security controls. Positive security is driven by threat analysis as a positive factor for building better security controls against new threats, negative security is driven by compliance as a way to prove the negative that is your organization failed in applying standards and policies.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We conclude that even if there is still a value in compliance for security as validation against a minimum level of security requirements, the approach that most organization use toward compliance does not help security and derails the organization effort from focusing on effective threat risk mitigation. To improve security organizations need to re-consider compliance; being compliant will not warrant protection of your core business assets against cyber-crime threats. &lt;span style=&quot;font-weight: bold;&quot;&gt;Co&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;mpliance is just a piece of the risk mitigation strategy , compliance security assessments can be effective mitigation against cyber-crime threats only when are driven by cyber-crime intelligence and application threat modeling techniques.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;An abstract of the presentation is included herein: &lt;span style=&quot;font-style: italic;&quot;&gt;On August 5 of 2009, Federal prosecutors charged &lt;a href=&quot;http://en.wikipedia.org/wiki/Albert_Gonzalez&quot;&gt;Albert Gonzales&lt;/a&gt; with the largest case of credit and debit card data theft e&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;ver occurred in the United States: 130 million credit cards numbers by hacking into Heartland Payment Systems, Hannaford Brothers, 7-Eleven and two unnamed national retailers. Both Heartland and Hannaford were security compliant with &lt;a href=&quot;https://www.pcisecuritystandards.org/&quot;&gt;PCI-DSS&lt;/a&gt; standard at the time they were compromised: that let question the validity of regulatory compliance frameworks, and specifically compliance with PCI-DSS standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze the cost of the data breaches by monetizing the losses as being reported i&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;n &lt;a href=&quot;http://www.cio.com/article/109959/TJX_Takes_12_Million_Hit_in_First_Quarter_for_Data_Breach&quot;&gt;quarte&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;a href=&quot;http://www.cio.com/article/109959/TJX_Takes_12_Million_Hit_in_First_Quarter_for_Data_Breach&quot;&gt;rly earning reports &lt;/a&gt;(e.g. TJX) as well as &lt;a href=&quot;http://datalossdb.org/incidents/1518-malicious-software-hack-compromises-unknown-number-of-credit-cards-at-fifth-largest-credit-card-processor&quot;&gt;impact on stock price&lt;/a&gt; (e.g. HPY) at the time of public disclosure of these data breaches. Monetizing data breaches helps to frame non-compliance risks as a factor of business impact and dispelling further the myth that being compliant equals being secure.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Traditional compliance-driven security assessments efforts such as penetration testing, static code analysis and standard compliance gap analysis will be compared to threat analysis techniques in order to demonstrate how cybercrime risks can be mitigated by understanding threat scenarios through &lt;a href=&quot;http://www.ic3.gov/search.aspx?q=xp_cmdshell&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;cyber-intelligence&lt;/span&gt;&lt;/a&gt;: &lt;a href=&quot;http://www.finjan.com/Content.aspx?id=1367&quot;&gt;cases of &lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;a href=&quot;http://www.finjan.com/Content.aspx?id=1367&quot;&gt;reported cybercrime attacks&lt;/a&gt; will be presented as a way to determine the threat landscape and the attack scenarios. Attacker motives and means to ac&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9gpNHahXF7QMAyTPRg322alZe2jtbZbJrz0A9biI0QdaD1ylGO3Gi0VESWSHYiiA2Gy1vt6zdfJ7TdeJD8dLh_boxsWW6RWU5QNaqxdiWoPn146EtG915UlxalOitAng6IDw-/s1600-h/threatanalysisspace.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5388885826983596322&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9gpNHahXF7QMAyTPRg322alZe2jtbZbJrz0A9biI0QdaD1ylGO3Gi0VESWSHYiiA2Gy1vt6zdfJ7TdeJD8dLh_boxsWW6RWU5QNaqxdiWoPn146EtG915UlxalOitAng6IDw-/s320/threatanalysisspace.JPG&quot; style=&quot;cursor: pointer; float: left; height: 174px; margin: 0pt 10px 10px 0pt; width: 271px;&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;hieve them will be analyzed by &lt;span style=&quot;font-weight: bold;&quot;&gt;using&lt;a href=&quot;http://www.schneier.com/paper-attacktrees-ddj-ft.html&quot;&gt; attack tree analysis&lt;/a&gt;&lt;/span&gt;: attack trees allow to study cyber attacks against web applications, breaches of credit card data as well as ATM fraud. &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;http://www.owasp.org/index.php/Detail_misuse_cases&quot;&gt;Use and misuse cases&lt;/a&gt; &lt;/span&gt;will be used to evaluate the strength of security controls such as multi-factor authentication against known cyber-attacks such as MiTM as well as a way to elicit requirements for security controls (e.g. secure logins). Examples of attack vectors for testing applications against code injection attacks as well as for cybercrime attacks (e.g. HTML-IFRAME Injection Attack Vectors and drive by download) will be provided using &lt;span style=&quot;font-weight: bold;&quot;&gt;attack vector analysis&lt;/span&gt;. &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;http://msdn.microsoft.com/en-us/magazine/cc163519.aspx&quot;&gt;Data Flow Diagrams (DFD) Analysis&lt;/a&gt; and &lt;a href=&quot;https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/architecture.html&quot;&gt;Architecture Risk Analysis&lt;/a&gt;&lt;/span&gt; examples will be presented to provide a viable, consistent methodology to identify the entry points for attack vectors, identify user access levels, enumerate threats as well as to determine threats, attack, vulnerabilities and countermeasures. Security by deployment and &lt;a href=&quot;http://blogs.msdn.com/jmeier/archive/2008/04/07/security-principles.aspx&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;security by design&lt;/span&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;principles&lt;/span&gt;&lt;/a&gt; will be elaborated as strategic countermeasures with reference to three tier architectures and security by design architecture principles. Finally, &lt;span style=&quot;font-weight: bold;&quot;&gt;risk mitigation strategies against&lt;/span&gt; cybercrime attacks will be discussed starting by self-awareness questions. The presentation re-affirms that compliance risks need to be approached by organizations as a factor of business risk and advocate threat risk modeling and &lt;a href=&quot;http://www.net-security.org/dl/insecure/INSECURE-Mag-17.pdf&quot; style=&quot;color: #ff6666;&quot;&gt;application threat modeling&lt;/a&gt; as a actionable processes for mitigating cybercrime risks to web applications.&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; by using threat tr&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;ee analysis for example it is possible to analyze the effectiveness of security controls such as MFA to mitigate threats such as man in the middle attacks to find out that most of them are ineffective.&lt;/span&gt; By identifying the targets of attacks with attack trees we also find that browser vulnerabilities facilitate drive by download, man-in-the-middle and man-in-the-browser attacks and that these vulnerabilities represent the weakest security link. Only after cyber-crime targets are analyzed and visualized with attack trees it is possible to understand the different avenues of attacks methods used by the fraudsters. By associating a cost for achieving each step of the attack tree it is possible to walk through the attack methods that cost the least to an attacker to succeed.</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/5060966446927754557/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/5060966446927754557' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/5060966446927754557'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/5060966446927754557'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/10/cybercrime-threats-critical-view-of.html' title='Cybercrime risk mitigation: a critical view of compliance from threat analysis perspective'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb1ZCF1AMeGbI9G-RghgJW1XWLgLggCS4gu0GZ3ggEGV2A-Z1hxVz1s_oYlTCzz1-skFgZbtSTXTxRQa97i3bLzhJxZThlBJPrwUe99GuBBXms-GauLNgrXvkqsWbRSo2NpMvr/s72-c/play+at+your+own+risk.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-1223224957838984560</id><published>2009-07-05T09:30:00.062-04:00</published><updated>2009-07-14T20:06:45.543-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Security Frameworks"/><title type='text'>Business Cases For Your Software Security Initiative</title><content type='html'>I dealt with the topic of the business case for software security initiatives in the past: you can refer to published articles (&lt;a href=&quot;http://www.issa.org/&quot;&gt;ISSA Journal 2006&lt;/a&gt;, &lt;a href=&quot;http://www.net-security.org/dl/insecure/INSECURE-Mag-16.pdf&quot;&gt;In-secure Magazine 2008&lt;/a&gt;) and presentations(&lt;a href=&quot;http://www.slideshare.net/marco_morana/software-security-business-case-presentation&quot;&gt;Black Hat in 2006&lt;/a&gt; and &lt;a href=&quot;http://www.slideshare.net/marco_morana/software-security-initiativesroadmaps-and-business-cases-presentation&quot;&gt;OWASP in 2008&lt;/a&gt;). Interesting enough, this seems to be still an hot topic: I am often inquired on this by CISOs and CIOs in the past as well in my current ISO work, hence I decided to articulate my answer again with more details with this post.&lt;br /&gt;&lt;br /&gt;Building software security into the organization’s software engineering and information security practices can be accomplished by following software security maturity models (e.g. &lt;a href=&quot;http://www.bsi-mm.com/&quot;&gt;BSIMM&lt;/a&gt; or &lt;a href=&quot;http://www.opensamm.org/&quot;&gt;SAMM&lt;/a&gt;) as well as by adopting software frameworks to integrate software security activities within the SDLC along with security processes such as information risk management, patch management and security training and awareness.&lt;br /&gt;&lt;br /&gt;From the software engineering perspective for example, the assumption is that your organization already measures the costs for fixing software security failures due to known vulnerabilities as well as the cost of fixing the ones resulting from incidents/exploits. Total software security failure costs include both the cost of business impact in exploiting software failures (e.g. cost of a vulnerability exploit that caused harm to the organization such as denial of service) as well as the cost to fixing a known defect due to a security issue found with testing, being a security bug, a design flaw or a mis-configuration.&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;The problem of the software security metrics is that implies that the organization software and information security practices are matured enough to produce this data so you can correlate this information from risk management, fraud management, vulnerability assessment, software engineering/project management and quality assurance.&lt;/strong&gt; The availability of such metrics implies that development teams have already started to build software security activities into the SDLC such as source code analysis, penetration testing, threat modeling but also that they have started working together with security teams to measure software security risks and manage them during the different phases of the SDLC.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;A pre-requisite for any software security initiative business case is the availability of the organization&#39;s information risk data that include risk management, vulnerability metrics as well as software security engineering data such as defect management and patch management.&lt;/strong&gt; &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;From information security perspective, the business case for software security need to start from the organization&#39;s information risk management data, business impact analysis and correlate application vulnerabilities as critical when these correlate to business impacts. For this reason (i.e. the lack of organization software security data) the business case for software security is one that is hard to make.&lt;/strong&gt; &lt;br /&gt;&lt;br /&gt;Based upon my experience on the topic, that is working both as consultant as well as security technology officer for large software organizations, you can make the business case (or the case for the business) for software security initiative by following the approach outlined herein: &lt;br /&gt;1) Adopt an information risk management perspective, that is using your vulnerability, incident and fraud data for the business case&lt;br /&gt;2) Gather software engineering data and categorize them in terms of when are found, when are fixed, when the fixes are tested and deployed. Correlate this data on how much it costs to fix vulnerabilities at different phases of the SDLC. &lt;br /&gt;3) Gather data on security incidents and fraud because of the application/software being attacked. Quantify in dollar amount how much these security incidents and fraud cost to your organization.&lt;br /&gt;4) Analyze the business case by analyzing/quantifying the following factors:&lt;br /&gt;• &lt;span style=&quot;font-weight:bold;&quot;&gt;Cost vs. benefit&lt;/span&gt;: by comparing software failure costs vs. security assumption costs&lt;br /&gt;• &lt;span style=&quot;font-weight:bold;&quot;&gt;Quantitative risk&lt;/span&gt;: by comparing cost of mitigation vs. impact of probable loss&lt;br /&gt;• &lt;span style=&quot;font-weight:bold;&quot;&gt;Return of Security Investment (ROSI)&lt;/span&gt;: by quantifying $$ saving amounts for adoption of software security activities early in the SDLC   &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Basically the business case for the software security initiative needs the data that the initiative is suppose to provide.&lt;/strong&gt; In essence this is a chicken vs. egg problem you can only manage what you measure and you need metrics to make the business case for.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;So what are the alternatives for the business case in absence of such data ? You need to make assumptions on what are you software engineering costs, estimate the cost of patching and to fix vulnerabilities as well the security costs because of software failing such as for example financial losses that vulnerability exploits might cause, include for example the cost of loosing customer data, money losses because of fraud via the web channel, disruption or denial of service and least and not last intangible reputation loss because of vulnerabilities being publicly disclosed.&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;The data to produce for the case depends on who the case is made for. If the business case needs to be made for engineering and software development teams for example, you can assume a software engineering perspective. You can refer to public studies that analyze the cost of fixing software defects. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;A &lt;a href=&quot;http://www.nist.gov/director/prog-ofc/report02-3.pdf&quot;&gt;NIST study&lt;/a&gt; on the economic impact of insecure testing for example shows that cost of fixing defects is 100 times more expensive during system testing than coding.&lt;/span&gt; You can tailor this data to estimate how much it would cost to your organization fixing vulnerability from quality/defect management perspective. If development teams already started doing vulnerability assessments such as by including web application penetration testing in the SDLC, the vulnerability metrics can also be used and correlated with the cost of fixing them.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;If your organization is mostly relying on patching to fix security defects, you can refer to the cost of producing security patches (e.g. hotfixes) to fix vulnerabilities vs. the cost saving of testing and fixing software security defects earlier in the SDLC.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Let&#39;s say the cost of engineering, developing, testing and deploying a patch to your vulnerable software/web application is 10,000: it is realistic to estimate using NIST data that the fixing this patch earlier in the SDLC would have cost you 10% of the patching costs and your company 90 % of overall patching costs (e.g. 9,000 $)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Just including patching costs is not conservative enough for a real estimate of total software security failure costs: you need also to include the business impact of exploits such as either the risk of exploiting a known vulnerability or an unknown vulnerability (e.g. Zero Day) such as the ones exploited and do not follow responsible public disclosure causing the organization intangible costs.&lt;/strong&gt;. &lt;br /&gt;&lt;br /&gt;Even in absence of a vulnerability exploit it is still important to factor the cost posed by the business impact to the organization caused by the exploit of the vulnerability. In the case of intangible costs for example what is the intangible cost of cross site scripting vulnerability publicly disclosed on &lt;a href=&quot;http://www.xssed.com/&quot;&gt;XSSEd.com &lt;/a&gt;site? How much is the cost of reputation damage to have such vulnerability publicly disclosed? Any public published vulnerability can cause intangible loss to company reputation, the company brand and the franchise and affect customer confidence on the company product and services.&lt;br /&gt;Would intangible costs by themselves justify the existence of a responsible disclosure process to engage security researchers that have found your site vulnerabilities: YES. Would this justify fixing all known vulnerabilities before going into production with a penetration test? YES&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;But to really factor software failure costs as the business impact of exploiting a vulnerability it is important to correlate attacks with vulnerabilities and the business impact that cause.&lt;/strong&gt; The recent data from the &lt;a href=&quot;http://www.xiom.com/whid&quot;&gt;Web Hacking Incident DB&lt;/a&gt; that correlates public information from security incidents with web application attack vectors for example has SQL injection as #1 (19% of all attacks) that includes manual targeted attacks as well as mass SQL injection bots. &lt;strong&gt;From the perspective of attack vs. risk prioritization SQL injection vulnerabilities represents the ones that most likely will be exploited to cause harm to your organization&lt;/strong&gt; and are the ones that would produce high failure costs (e.g. use for break into authentication, upload malware, denial of service, un-authorized access to sensitive data), when mitigated, SQL injection vulnerabilities would provide the most benefit in terms of mitigating business impacts.&lt;strong&gt;Since the SQL injection vulnerabilities root cause is coding such as using concatenated SQL statements instead of store procedures or prepared statements, fixing SQL injection vulnerabilities in the code alone would make the case of adopting secure code reviews.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Most organization&#39;s directors of technology and security try to sell technologies and new initiatives to high management with the sales pitch of  getting the most &quot;Bang For The Buck&quot; BFTB. But the BFTB business case need to answer the basic question: if I spend that much on a security technology or process what is the benefit for security ? In technical terms this means doing a Cost vs Benefit Analysis (CBA). CBA can be used in security to correlate the total cost of security to increased information or software security assurance. Dan Geer covers well this analysis as related to data security in his book &quot;&lt;a href=&quot;http://www.verdasys.com/thoughtleadership/&quot;&gt;Economics and Strategies of Data Security&lt;/a&gt;&quot;. &lt;br /&gt;&lt;br /&gt;By analogy, in the case of software security, &quot;Bang For The Buck&quot; decision spending need to take into account the total security costs that is all failure costs such as the total cost of failing as business impact as well the total cost of finding, fixing, testing and deploying the security defect. Only then, the total cost of software security (the BUCK) can be compared against the BANG that is the increased level of software security assurance. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt; The general law for bang for the buck is that you are getting the most bang for the buck when your total costs (cost of failure/data loss/fraud + cost of security/countermeasure) reaches a minimum. As failure costs decrease exponentially, the &quot;anticipation costs&quot; that you take proactively by spending in software security initiatives will increase.&lt;/strong&gt; &lt;br /&gt;&lt;br /&gt;From risk management perspective this means that the total software security costs decrease up to a minimum to raise again as you keep spending on security measures.  You will reach an optimal cost vs. benefit where more spending in anticipation cost (e.g. countermeasures) will not provide the most benefit (e.g. spending more in countermeasures then the value of the assets that the countermeasure is supposed to protect)&lt;br /&gt;&lt;br /&gt;This optimal spending for anticipation costs (proactive countermeasures) is about 40% of your failure costs (to be exact 37% according to &lt;a href=&quot;http://weis2006.econinfosec.org/docs/12.pdf&quot;&gt;Gordon and Loeb research: The Economics of Information Security Investment&lt;/a&gt;). &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;According to the empirical law of the most bang for the buck applied to software failure costs vs. assumption costs it is therefore fair to assume that you get the most of security by spending 37% of what your software failure costs are. &lt;br /&gt;&lt;br /&gt;Assume for example software security failures costs are $ 10 ML it would be reasonable for an organization to spend as much as $ 3.7 ML in acquiring software security tools and technology, develop new software security process as well as in new software security training activities.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Application security failure costs can be also factored as monetized fraud occurring via your web site/channel: a spending of as much as 37% of the fraud costs in securing the web site can be justified according to the most bang for the buck law. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;In the case of business impact due to data loss such as identity theft for example, you can factor the overall fraud related to data loss potentially impacting your organization: consider that 14% of all publicly reported data loss incidents occur via the web channel according to the data collected from &lt;a href=&quot;http://datalossdb.org/&quot;&gt;datalossdb.org&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Assume that according that 2003 FTC data the potential loss per identity theft incident is $ 655 per incident. Assume you are serving via your web site a population of 4 million customers, the potential loss of losing your customer data such as credit card accounts for example would be of $ 2,6 Billion and with probability of identity theft occurrence of 4.6 % (also FTC data) the projected loss for your company could be $ 120 ML for which 14% or $ 16 ML would be the cost of data losses via the web channel alone. &lt;br /&gt;&lt;br /&gt;With these assumptions based upon publicly disclosed data losses, a security program (that include both information and application security) that cost as much as $ 16 ML would be justified for a company with a customer base of 4 million on-line customers for example.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;A quantitative risk assessment can also be used to determine the extent on which a software security initiative can reduce risk from potential losses.&lt;/span&gt; The correlation has to take into account the probability of the event and the loss that the event can cause. This is difficult to quantify in general for software security issues since assumes a cause-effect between vulnerability exploit and financial impact. Nevertheless it can be used for rough estimates.&lt;br /&gt;&lt;br /&gt;Assume a web application that delivers banking services for example and that the loss caused by an event such as denial of service impact on-line transactions for 3 million customers with an average of $ 20 per transaction: the loss per single DOS event (SLE) is $ 60 ML.&lt;br /&gt;&lt;br /&gt;Assume that the probability that a new SQL injection vulnerability would cause a denial of service is 30% (Annualized Rate of Occurrence) then the Annual Loss Expected (ALE) is $ 1.8 ML. If the cost of the new security countermeasures that will stop the security incident is less than $ 1.8 M than the organization should implement it.&lt;br /&gt;&lt;br /&gt;Assume the countermeasure in this case is the total cost of secure code reviews, you need to factor the cost of tools and technologies/APIs (e.g. source code analysis and penetration tools), of the security engineering process (e.g. documentation and metrics) as well of software security training and awareness for developers. The tools and technologies need to include the Total Cost Of ownership that is both the cost of acquiring and maintaining the technology. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Besides cost vs benefit analysis and quantitative risk assessment, &lt;a href=&quot;http://www.infosecwriters.com/text_resources/pdf/ROSI-Practical_Model.pdf&quot;&gt;the return of security investment (ROSI)&lt;/a&gt; can be used to make the software security business case around effectiveness of a software security initiative&lt;/strong&gt;. &lt;br /&gt;&lt;br /&gt;ROSI answers the question if I spend $ 100K in software security initiative do I save more money by fixing defects with a penetration test, secure coding or threat modeling. Again this is where the metrics is essential:making the case with ROSI assumes you already collect SDLC data that show how much it cost to perform software security per each phase, the number of issues being identified at each phase and the how many are fixed at each phase you can make the business case for an activity vs another. Otherwise you can reference public study of &lt;a href=&quot;http://www.mudynamics.com/assets/files/Tangible%20ROI%20Secure%20SW%20Engineering.pdf&quot;&gt;ROSI from Kevin Soo Study &lt;/a&gt;&quot; for every $ 100,000 spent on software security, $ 21,000 are saved by doing application threat modeling during design, $ 15,000 are saved by doing source code analysis and $ 12,000  are saved when defects are found with penetration tests. &lt;strong&gt;Overall the earlier you invest in security the greater the return.&lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/1223224957838984560/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/1223224957838984560' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1223224957838984560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1223224957838984560'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/07/business-cases-for-software-security.html' title='Business Cases For Your Software Security Initiative'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-2247402180442034914</id><published>2009-03-31T07:47:00.006-04:00</published><updated>2011-04-16T07:31:51.668-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>OWASP Releases World’s First Security Code Review Guide for Free</title><content type='html'>The OWASP Foundation, March 30, 2009 – The Open Web Application Security Project (OWASP) today announced the official release of the free &lt;a href=&quot;http://www.owasp.org/index.php/Category:OWASP_Code_Review_Project&quot;&gt;OWASP Security Code Review Guide v1.1&lt;/a&gt;. The Code Review Guide provides details on how to review code for all sorts of application vulnerabilities. Together with the OWASP &lt;a href=&quot;http://www.owasp.org/index.php/Developer_Guide&quot;&gt;Security Developer Guide&lt;/a&gt; and &lt;a href=&quot;http://www.owasp.org/index.php/Testing_Guide&quot;&gt;OWASP Security Testing Guide&lt;/a&gt;, OWASP has created a powerful suite of books that covers most of what people need to know about application security. The 216 page book can be downloaded from the OWASP website or a bound copy can be ordered for the cost of printing.&lt;br /&gt;
&lt;br /&gt;
The Code Review Project is led by long time OWASP participant Eoin Keary from Dublin, Ireland. Like all OWASP projects, the work is performed by Eoin’s team in a free and open manner, and coordinated via the OWASP wiki and project mailing list. Everyone is welcome to download the guide and benefit from OWASP’s research. You can also join the project and contribute to making the guide even better.&lt;br /&gt;
&lt;br /&gt;
“Despite the many claims that code review is too expensive or time consuming, there is no question that it is the fastest and most accurate way to find and diagnose many security problems. There are also dozens of serious security problems that simply can&#39;t be found any other way.” said OWASP Chair Jeff Williams. “Still, code review is no panacea. Static tools, dynamic tools, and manual testing all have an important role to play in verifying the security of an application.” &lt;br /&gt;
&lt;br /&gt;
There is overwhelming evidence that the vast majority of web applications contain security holes that are increasingly putting people and organizations at serious risk. Our Code Review Guide is one part of OWASP’s strategy to make application security visible and enable the market to support the development of secure application software.&lt;br /&gt;
&lt;br /&gt;
OWASP is a free and open community that focuses on improving application security. Join the thousands of organizations that are using OWASP guidance to run a responsible application security program. Anyone can join our community and use our free tools and documents, attend our free conferences and local chapter meetings, and join projects to make the world’s software safe for the Internet.&lt;br /&gt;
&lt;br /&gt;
About OWASP -The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas. We can be found at http://www.owasp.org.</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/2247402180442034914/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/2247402180442034914' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/2247402180442034914'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/2247402180442034914'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/03/owasp-releases-worlds-first-security.html' title='OWASP Releases World’s First Security Code Review Guide for Free'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-169973112126901230</id><published>2009-03-28T10:20:00.022-04:00</published><updated>2011-04-19T20:42:33.864-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>Insecure Implementations Of Challenge Question Answers (CQA) For Password Resets</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBHWDmoi4aN7cWjz3plqGHi26nCA9hXbuUOviW6pTlRxJJEuTZkaCC29lek2R9DYLRrpt6-Yi7Jyn5Sq0kPuXrh6DZdmeVL_iQkRpecIBS6SO7gCYI3cNBw6pyFiJ8JA-y1mCy/s1600/questions.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; i8=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBHWDmoi4aN7cWjz3plqGHi26nCA9hXbuUOviW6pTlRxJJEuTZkaCC29lek2R9DYLRrpt6-Yi7Jyn5Sq0kPuXrh6DZdmeVL_iQkRpecIBS6SO7gCYI3cNBw6pyFiJ8JA-y1mCy/s200/questions.png&quot; width=&quot;199&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;An example of C/Q &lt;br /&gt;
setup for on-line banking&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Challenge Questions Answer (CQA)are widely used in web sites as a form to validate the user during un-authenticated transactions such as password resets, user name resets as well as extra authentication factor besides passwords during logins. The problem with CQA is the degree of freedom given to the implementation leaves a lot of room to deliver in-secure validation. Some of you might be familiar for example with the &lt;a href=&quot;http://www.veracode.com/blog/2008/09/speculation-on-palin-e-mail-hack/&quot;&gt;Gov. Sarah Palin&#39;s yahoo email hack &lt;/a&gt;via yahoo email password reset. It was due because yahoo email reset validate users with questions that can be easily guessed from public profiles such as birthday, country of residence and postal code. This is from implementation. Gov Palin as any user of yahoo email is allowed to select easy questions among a list, such as &quot;Where did you first meet your spouse&quot;. This, again is implementation problem, for a public person like she is (but this applies also to users of Facebook and social sites) the answer to that question could be easily guessed (Wasilla high). The other control on yahoo email reset is to validate a secondary email address associated with the account for which hints are given. Apparently this was not set up. The attack that was highly publicized that time simply highlights that even companies like yahoo still do not get how to get email password reset securely implemented.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This example underlines a problem of 1) user awareness on which CQA to choose, 2) Force user to choose CQA that are not easy to guess, for example asking DOB (date of birth) besides being considered Personal Identifiable Information is a bad question where asking a user to choose a date that is memorable may be better. The concept that CQA need to learn also is the one of entropy that is not easily guessable with different means, besides by public profile searches is also by the length of the question that at minimum has to be of a certain number of characters. In this context if my favorite town is New Your City, NYC cannot be entered because three letter city names are not allowed.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the case of financial web applications, good secret questions are the ones that require specific shared knowledge between the user and the authenticator such as shared knowledge of events (e.g. the last time you make a payment) or specific knowledge of data (e.g. the exact amount of customer&#39;s monthly mortgage payment).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;To improve entropy of the shared secret, you can prompt the user to answer different shared secrets by randomly choosing them from a previously set of pre-registered answer/questions.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The mortgage question that is not usually deducted from public records (obviously does not include dumpster diving) is better than a question such as most favorite movie or soccer team, or the high school where you dated your husband/wife. But also this is not immune from attacks a typical Monday morning dumpster dive may reveal the others or a simple call to the mark with a refinance question to capture in your example the &quot;monthly&quot; mortgage payment.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The emphasis I am making is that the CQA have to be shared secrets between the authenticator and the authenticatee. An example can be to validate time and information data that is shared secret between the user and the Bank such as when you visited the ATM and how much money you withdrew. Of course these requires query data sources and are not easy to implement.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ideally web site architects that implement this controls they need to be guided on how to implement CQA securely in the application uses cases of password and userID reset as well as a form of &quot;extra&quot; factor of authentication besides passwords. The concept of what constitutes a good non-guessable CQA should be covered as well as how to implement the password reset security.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A good guideline for implementation of CQA is &lt;a href=&quot;http://www.owasp.org/index.php/Using_Secret_Questions&quot;&gt;OWASP Using Secret Questions Page&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can also test if you password reset is done security by looking at the &lt;a href=&quot;http://www.owasp.org/index.php?title=Testing_for_Vulnerable_Remember_Password_and_Pwd_Reset_(OWASP-AT-006)&amp;amp;setlang=es&quot;&gt;password reset section of the OWASP testing guide.&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For example once you had the password rest after CQA validation, a good practice is to deliver the one time temporary password out of band to the user with a different channel such as SMS. This will allow for identification of the user via a call back and also another layer of defense against someone attacking the email channel during the outbound password delivery such as in the case of Man In The Middle Attacks.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the case when CQA are not pre-registred such as in the case of validation of question based upon demographic information that is known about a user from Knowledge Based Authentication system, ideally you want to consider this only to validate low risk application function since the degree of security of these questions is one notch lower then CAQ based upon shared secrets and two notch lower than passwords. This is to consider also in user validations that fall back to KBA from failing to validate a password at login as security expert Bruce Schneider points out in &lt;a href=&quot;http://www.schneier.com/blog/archives/2005/02/the_curse_of_th.html&quot;&gt;The Curse of the Secret Question &lt;/a&gt;. It would be ok if I am falling back from low risk authentication control such as one that uses IP for authentication to another low risk control such as KBA. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The best use case for using KBA CQA is in the case of a user applying for an on-line account for which no previous information is known about the user. It is better than validate the user with information that is sensitive and can be phished to attack other channels such as for example validating the user with ATM PINs or with PII such as SSN. A KBA with a rich set of CQA such as group of 20-25 questions selected ramndonly is also more difficult to phish than a set of 2,3 CQA (provides better entropy)&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/169973112126901230/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/169973112126901230' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/169973112126901230'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/169973112126901230'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/03/insecure-implementations-of-challenge.html' title='Insecure Implementations Of Challenge Question Answers (CQA) For Password Resets'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBHWDmoi4aN7cWjz3plqGHi26nCA9hXbuUOviW6pTlRxJJEuTZkaCC29lek2R9DYLRrpt6-Yi7Jyn5Sq0kPuXrh6DZdmeVL_iQkRpecIBS6SO7gCYI3cNBw6pyFiJ8JA-y1mCy/s72-c/questions.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-448361055640637947</id><published>2009-02-28T22:36:00.018-05:00</published><updated>2011-04-16T10:24:16.523-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Financial Markets Meltdown: Risk Management Lessons</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLgl0zE38iyCDDEiBOndk4ayBLZDHUf_VZJFpt53rvveNaVXbx9rKgZt63kTSC1Ny601GekB4OgsO1GKkLFo1JJnjqCcLA0aPFYvjeVB0fHcjdIMCuKuJiEnfVIxrDuoIeGbzH/s1600/lighting.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLgl0zE38iyCDDEiBOndk4ayBLZDHUf_VZJFpt53rvveNaVXbx9rKgZt63kTSC1Ny601GekB4OgsO1GKkLFo1JJnjqCcLA0aPFYvjeVB0fHcjdIMCuKuJiEnfVIxrDuoIeGbzH/s200/lighting.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example of god action: lightning&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I just finished reading the book &quot;&lt;a href=&quot;http://www.peterbernstein.com/&quot;&gt;Against The Gods, The Remarkable Story Of Risk, Peter L. Bernstein&lt;/a&gt;&quot;. This is part of my current study of financial risks and relationship with information security risks. The book is written by an economist, Peter Bernstein and provides, in my opinion very good insight on how risk analysis evolved as discipline to respond to human needs. Along the course of history, risk management has evolved as discipline to help humans in calculating risks for decision making in different aspects of human condition such as nation&#39;s and individual wealth, human health, engineering, warfare etc. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As a technical discipline, risk management also evolved as part of the progress made by mathematicians in predicting risk. Most of us now associate the likelihood factor of risk to a calculation of a probability such as the likelihood that the occurrence of significant events might have impact in our human lives. Risk analysis had a shift in the course of human history with the mathematical discovery of probability theory that originated back in 1,600 Century, thanks mostly to the works of mathematical geniuses such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Blaise_Pascal&quot;&gt;Pascal&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Pierre_de_Fermat&quot;&gt;Fermat&lt;/a&gt;. These mathematicians were the first to devise a mathematical method to forecast the &lt;a href=&quot;http://en.wikipedia.org/wiki/Luca_Pacioli&quot;&gt;Pacioli&lt;/a&gt;’s puzzle game. From a way to predict the outcomes of games and help gamblers, probability theory evolved in the 1700 century to respond business needs such as by helping the English government to predict life expectancies so they could help the finances with the sale of life annuities. This event marked the start of the Insurance Business. Later &lt;a href=&quot;http://en.wikipedia.org/wiki/Daniel_Bernoulli&quot;&gt;Bernoulli&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Gottfried_Leibniz&quot;&gt;Leibniz&lt;/a&gt; invented methods of statistical sampling that are used today in scientific methods for asserting quality, health of populations, demographic and political studies etc etc. We had the discovery of the normal distribution that is used for statistical analysis: events could predicted when the number of observations of the sample increased. In 1800 Century we had the &lt;a href=&quot;http://en.wikipedia.org/wiki/Chaos_theory&quot;&gt;chaos theory &lt;/a&gt;and the discovery of critical concepts in statistical analysis such as&quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Regression_toward_the_mean&quot;&gt;the regression from the mean&lt;/a&gt;&quot; that explains that events are affected by a random variance so that a market can be expected to fall after going up and viceversa. In the 1900 financial risk theories also demonstrated mathematically that putting &lt;a href=&quot;http://fic.wharton.upenn.edu/fic/papers/00/0016.pdf&quot;&gt;all eggs in one basket&lt;/a&gt; is unacceptable risk strategy for buying stocks. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzMmG9_Np1wGn1y5G4rrHGSYl5i2WGGEyLKeB3GDwtlEFBSTKSImv_4YP6dYAv6jZStz-WwMNjgpkgDdzR16jQ5VGY7AI4lVGBqr_MAe5rM6ldnN1ISn3pBEfTBpcvLLBy1mH/s1600/hu.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzMmG9_Np1wGn1y5G4rrHGSYl5i2WGGEyLKeB3GDwtlEFBSTKSImv_4YP6dYAv6jZStz-WwMNjgpkgDdzR16jQ5VGY7AI4lVGBqr_MAe5rM6ldnN1ISn3pBEfTBpcvLLBy1mH/s200/hu.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Human factors is the&lt;br /&gt;
&amp;nbsp;fundamental risk &quot;element&quot;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In modern times, risk models got help from information technology and computerized risk modeling. These risk models are used to predict financial trends and support decision making. Nevertheless these models also fail. Being risk calculation a complex, multi-variable and non-linear problem to solve, the accuracy of these models is always in question. For example,these computerized models clearly failed to predict the house mortgage risks and the impact on the financial markets. In my opinion this is because &lt;a href=&quot;http://www.nytimes.com/2008/11/05/business/05risk.html&quot;&gt;risk in essence ties fundamentally to the human element&lt;/a&gt; and irrational decision making. It also ties to unpredictable events that we did not include in the analysis of the mathematical model. At the root of the meaning of risk we have to dare, as Bernstein points out, the origin word for risk (sounds like I am paraphrasing the movie, the fat greek wedding :) from the Italian (risicare) that means act, to dare. There is actually a say for it that is a proverb for the one of who that know &lt;a href=&quot;http://www.lifeinitaly.com/potpourri/proverbs.asp&quot;&gt;Italian Language&lt;/a&gt; “chi risica non rosica” it means who does not risk do not gain for it…&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;The point I want to make here is that human factors determine how we react to risk. From this perspective, learning about human history as a factor to make risk decisions is the key for effective risk management&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One interesting lesson that can be learn is the &quot;attitude&quot; or the &quot;appetite&quot; for risk was obviously not calculated and lead the financial markets to the current &lt;a href=&quot;http://www.pbs.org/wgbh/pages/frontline/meltdown/view/&quot;&gt;meltdown&lt;/a&gt;. During the so called &quot;housing price bubble&quot; era of the last 5-7 years we had people buying houses by borrowing money with mortgages that were at high risk of not being repaid. The home buyers and the financial institutions allowed this party to happen, home owners happy to own houses that according to risk should not have afforded and the financial institutions taking high risks for pure financial gains along with speculators inflating the home values by buying and selling property for their quick profit. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Then things started to change for the worst, rumors spread that some banks were running out of cash and that big institutional investors pulled out from the market. Acting upon &quot;rumors&quot; investors start selling financial stocks. This despite CEOs of such financial institutions are still trying to reassure investors. Rumors eventually become reality, the big investors pull out from the market and all the sudden, financial institutions need to raise capital to keep them afloat. At last resort the government comes to help to contain the impact to the overall economic system.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkU0Q_tZB9Gi2nkOSKnQq4psMQL_aA5PylX_rcneOgHMQ-Pg-sZzpeCHQ7O-AWM7VebRwc4IwriZWpZXZXbbDLMD279m9x7Z-X94Vz06kvPwKS8wvc0Go6nceWMI8tr3gw6xzh/s1600/fi+risk.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;171&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkU0Q_tZB9Gi2nkOSKnQq4psMQL_aA5PylX_rcneOgHMQ-Pg-sZzpeCHQ7O-AWM7VebRwc4IwriZWpZXZXbbDLMD279m9x7Z-X94Vz06kvPwKS8wvc0Go6nceWMI8tr3gw6xzh/s200/fi+risk.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Co-risk for financial institutions&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One lesson that you can learn it that this is a case of &lt;a href=&quot;http://en.wikipedia.org/wiki/Systemic_risk&quot;&gt;systemic risk&lt;/a&gt;. Systemic risk are the most dangerous risks because scale up to different entities all interconnected and might end up impacting the all financial system. For example the US financial meltdown started with the failing of financial institutions that depended on each other because they shared the risk: from Bear Sterns to Lehman Brothers, from Merry Lynch to AIG and then to Bank Of America and Citigroup. Most recently, the US Government acted to contain the systemic risk with extraordinary measures and very timely, bailing out financial institutions with enormous amount of money.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;From the perspective of information security we might also have similar systemic risks. An example of systemic risk is the impact that a critical information system such as the one that serves as backbone to all infrastructure and operations one day might fail. This can be for example attacks to bring down the Internet such as with &lt;a href=&quot;http://www.infoworld.com/article/07/02/16/08OPsecadvise_1.html&quot;&gt;denial of service attacks to the root domain servers&lt;/a&gt; that serve the DNS protocol. Another example of systemic risk is the one posed by &lt;a href=&quot;http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=201804528&quot;&gt;botnet driven distributed denial of service attacks &lt;/a&gt;toward financial transaction systems as well as the financial infrastructure. Attacks that potentially pose a systemic risk to the information infrastructure of a country or a company need to be taken very seriously and analyzed using attack trees and threat modeling.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_WdX998bjotkQKIRvi1OvIpVj-5gsSLLDZPRJPrCzvWhJNwwnZ_QFKYBSfzQZgZsjO93_e14F7H_4TR1WsciPLgO0BXb2DIpNsmup15oeAIiJQiydPo-eoGT4RPnBszh_QJz4/s1600/cds.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_WdX998bjotkQKIRvi1OvIpVj-5gsSLLDZPRJPrCzvWhJNwwnZ_QFKYBSfzQZgZsjO93_e14F7H_4TR1WsciPLgO0BXb2DIpNsmup15oeAIiJQiydPo-eoGT4RPnBszh_QJz4/s200/cds.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Credit Default Swap: &lt;br /&gt;
Source:Invest2success blog&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Another lesson that you can learn from the financial market meltdown are the gaps in laws and regulations to control risk. Take for example the unregulated &lt;a href=&quot;http://www.newsweek.com/id/161199&quot;&gt;Credit Default Swaps&lt;/a&gt; used by banks to make million of dollars with a form of insurance based upon spreading the risk. A CDS meant that you could get insurance on a bond that you owned on the assumption that if the bond did not go “belly up”: you just had to pay the insurance installment and you only needed to repay the all amount of the bond if the bond were going down. This is basically an instrument for risk transfer and risk avoidance that also contributed to increase the systemic risk. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The analogy in information security would be that while your operations expand to new data centers as well as in the value of the data assets you manage, you do not step up in the security controls by investing in security technology, processes as well as people. You might also decide to transfer the risk to another entity and have you services managed by them. In some cases a certification from auditors still lacks clear oversight on the security risks you are facing.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Once you face the impacts of systemic risk you need to act with extraordinary measures to contain the risk and still it takes a lot of time to recover to normal. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6QP1SiUJ4jh7ypajfgKaHEtNKYZf_jjlQjfJiUIk9Xa4SYeTg0T72PkyuCwSSi_SR5LLVqPeep5Vz7jJtNYazNvEonqzRmWwLCv9l9icAgzRF6oR-rw75mzpRW2bbzUjeQ4f/s1600/cassandra.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt6QP1SiUJ4jh7ypajfgKaHEtNKYZf_jjlQjfJiUIk9Xa4SYeTg0T72PkyuCwSSi_SR5LLVqPeep5Vz7jJtNYazNvEonqzRmWwLCv9l9icAgzRF6oR-rw75mzpRW2bbzUjeQ4f/s200/cassandra.png&quot; width=&quot;199&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Another lesson you can learn from human attitude toward risk is that there is always a &lt;a href=&quot;http://www.nytimes.com/2008/08/17/magazine/17pessimist-t.html?_r=1&amp;amp;ref=business&quot;&gt;Cassandra&lt;/a&gt; that is someone that prophetically had made his risk assessment as negative against the common thinking being positive as Cassandra told all the people in &lt;a href=&quot;http://www.blogger.com/westasia/history/troy.htm&quot;&gt;Troy&lt;/a&gt; to watch out for the &lt;a href=&quot;http://www.blogger.com/trojanhorse.htm&quot;&gt;Trojan Horse&lt;/a&gt;, but nobody paid any attention..&amp;nbsp;As humans we doubt of &quot;doomers&quot; especially when everybody else is partying..&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Unfortunately, one of the greatest lessons from the learning of human perception of risk is that is humans do not usually make decisions based upon previous generation mistakes. For this reason, risk education is fundamental. Risk managers had to learn human sciences and understand human attitude toward risk, the perception of events, which risk indicators are critical and which facts are relevant.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;From the perspective of computational models, we should have expected this financial meltdown to happen sooner or later because of a drop of the home prices of 10-20% and other factors could have been built into the model. &lt;strong&gt;Besides some indicators of systemic risk such as CDSs could have issued a warning from distribution of risk and business impact perspective:&lt;/strong&gt;the financial institution inter-dependency and reliance on risk transfer with unregulated transactions should have raised some economist eyebrows.. did risk model factor these elements in their risk model? This questions are still open in my mind.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;﻿ &lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOP7qu5xjUr-RaNyOL1IhZ6CaanSeCWmIvUafwUMqS54cmWZWpZpAgZAPVXu6bJuXPcBy6A1t-vDeKI_6adNhguZtSFy8RsG8coZAqrVG8p4lw3c6jEPBOUfDvzIDByqgiQFEA/s1600/pearlharbor.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;159&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOP7qu5xjUr-RaNyOL1IhZ6CaanSeCWmIvUafwUMqS54cmWZWpZpAgZAPVXu6bJuXPcBy6A1t-vDeKI_6adNhguZtSFy8RsG8coZAqrVG8p4lw3c6jEPBOUfDvzIDByqgiQFEA/s200/pearlharbor.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;December 1941 Dec, &lt;br /&gt;
Japanese attack US Navy at&amp;nbsp;Pearl Harbor: &lt;br /&gt;
A small boat rescues a seaman from&lt;br /&gt;
&amp;nbsp;the 31,800 ton USS West Virginia&lt;br /&gt;
&amp;nbsp;burning in the foreground. &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;﻿ &lt;div style=&quot;text-align: justify;&quot;&gt;From the information security perspective, we do not have such sophisticated risk models, rather risk assessment is still mostly done as qualitative assessment by risk analysts that understand the business impact of system vulnerabilities. Nevertheless, the equivalent of a meltdown of the Internet cannot be excluded. Some referred to this threat as the &lt;a href=&quot;http://www.vosizneias.com/26192/2009/01/23/new-york-mass-computer-virus-equivalent-to-a-digital-pearl-harbor/&quot;&gt;digital Pearl Harbor &lt;/a&gt;referring to the Pearl Harbor Japanese attack in WWII. We had recently incidents that seems to indicate that such attacks might be possible in the future. We had for example a distributed denial of service attack to the information infrastructure of an entire country such as&lt;a href=&quot;http://www.infoworld.com/article/07/11/02/44OPsecadvise-denial-of-service_1.html&quot;&gt; Estonia&lt;/a&gt;, allegedly caused by the &lt;a href=&quot;http://en.wikipedia.org/wiki/Russian_Business_Network&quot;&gt;Russian Business Network&lt;/a&gt;. We proved that &lt;a href=&quot;http://ethernet.industrial-networking.com/articles/articledisplay.asp?id=1823&quot;&gt;cyber attacks to the SCADA power grid are possible&lt;/a&gt; as well as distributed denial of service attacks via botnets directed toward financial institutions. Recent examples include coordinated attacks toward ATMs with cloned cards causing RBS &lt;a href=&quot;http://news.scotsman.com/scotland/US-arm-of-RBS-faces.4989997.jp&quot;&gt;9 ML $ of fraud in one day&lt;/a&gt;. The recent credit card information leak involves credit card account information for 100 million users and involves 500+ institutions(&lt;a href=&quot;http://www.bankinfosecurity.com/articles.php?art_id=1227&quot;&gt;Heartland Data Breach&lt;/a&gt;).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;These kind of systemic attacks require governments and financial institutions to work together to build defenses for preventing potential large scale information systemic risks. There is a need for threat analysis of cybercrime attacks and a reconsideration of what is system critical and what is acceptable risk. Risk mitigation provisions need to be the topic of research and new information security technologies need to be developed to mitigate these kind of attacks. Information security managers need to learn the lessons that the financial risks meltdown posed to the financial markets, how could have been predicted and find the analogies with information risks so a similar systemic risk to the information infrastructure can be prevented.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/448361055640637947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/448361055640637947' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/448361055640637947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/448361055640637947'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/02/lessons-that-security-risks-can-learn.html' title='Financial Markets Meltdown: Risk Management Lessons'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLgl0zE38iyCDDEiBOndk4ayBLZDHUf_VZJFpt53rvveNaVXbx9rKgZt63kTSC1Ny601GekB4OgsO1GKkLFo1JJnjqCcLA0aPFYvjeVB0fHcjdIMCuKuJiEnfVIxrDuoIeGbzH/s72-c/lighting.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-7276298993736586307</id><published>2009-01-17T18:04:00.011-05:00</published><updated>2011-04-16T10:25:27.373-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>Java Security: Why Not To Use String Objects For Storing Secrets</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;I participated to an OWASP email thread regarding the security of storing passwords in a JAVA string object vs. a char array. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The initial assumption is that since java String objects are handled by the garbage collection differently than other objects such as for example a char array, storing such passwords in string objects might represent a risk.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The threat scenario is potentially of information disclosure since additional instances of secrets stored with JAVA Strings such as for example passwords, even when are zeroed programmately they might allow the original values recovered from a memory dump.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Therefore when choosing between two method calls:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;public Connection createConnection(String userName, String password) throw JMSException&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;or&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;public Connection createConnection(String userName, char[] password) throws&lt;br /&gt;
JMSException&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The latter passes the password as a char array and is more secure then the first that uses a string object. I&#39;ll articulate why herein:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Let’s analyze the assumption first and point out the main differences when using char[] vs. using Strings. I would like to cover here first some background (for the non-java experts, I do not consider one myself too so bear with me) and terminology&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;According to the JAVA both specification all data types, char and String included are objects and the instances in memory of such objects are handled by the JVM and the garbage collector outside the control of the coding logic (different from C/C++ where memory instances can be handled by the programmers) &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;There are differences thought, in what a programmer can do with JAVA Strings. For example the value of a JAVA String object cannot be changed after has been initialized. If you would like to change a value to a string you need to use StringBuffer. This property of JAVA Strings is loosely defined as Strings being &quot;immutable&quot; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I say, loosely defined because refers to value hold by the object not the instance in memory. I stumbled on this definition myself (thanks Rogan Dawes to fail my assumption and shed the light). I assumed this relates to change the value in memory (that in JAVA is never the case). Indeed there are different flavors of immutability best described by the article &lt;a href=&quot;http://www.javaworld.com/javaworld/javaqa/2002-12/01-qa-1206-immutable.html&quot;&gt;herein&lt;/a&gt;:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;So let&#39;s assume immutability in the &quot;strong&quot; sense, that means locking down a piece of data in perpetuity, such as creating an immutable object instance that cannot be changed by any code.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A char array, comparing with a String is mutable because the value assigned to the element can be changed. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;For example, in the case of a char array,&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;char[] str = {‘a’,’b’,’c’}; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;the following will change the values to 0&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;for ( int i=0; i&amp;lt; str.length; i++) { str[i] = 0; } In the case of a JAVA String since is immutable, the value cannot be changed. For example, when a new instance is created when changing from uppercase to lower case the contents of the object: String str = “ABC”; str.toLowerCase(); Another example, illustrates the difference when assigning a new value: String str = “Hello”; str=”Goodbye”; The first creates an instance of &quot;Hello&quot; when the second one creates another instance (invoking the constructor of the class) and therefore assigning an object reference to be stored in str. The same will happen when concatenating strings with the + operators such as: String str=”Hello”; str = str + “Dolly”; There is also an additional consideration….(thanks to Rogan Dawes again..) &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;
When using String objects get internalized (saved in an internal cache), which means&lt;br /&gt;
that even when you set the variable to null, the actual String object&lt;br /&gt;
may never be garbage collected.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Now back to the CreateConnection API examples, passing a password as char array to the API is better because, values of the passwords can be zeroed after used (same for keys and other shared secrets or confidential information) and no extra instances of passwords are left in memory to be garbage collected or cached.&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This is also what JAVA recommends such as when using password based encryption:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html#PBEEx&quot;&gt;http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html#PBEEx&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Therefore, if you need to store passwords, a good reference on how to do it securely using char array instead of Strings it is shown &lt;a href=&quot;https://www.securecoding.cert.org/confluence/display/java/FIO36-J.+Never+hardcode+sensitive+information&quot;&gt;herein&lt;/a&gt;;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;On the issue about clearing password contents and using char[] instead of strings there is also a thread from Sun Inc &lt;a href=&quot;http://x86.sun.com/thread.jspa?threadID=463624&amp;amp;messageID=2128124&quot;&gt;herein&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Indeed, the use of char[] instead of String is a good idea for security to prevent information disclosure of passwords via memory data access such as in the case of an attack toward information stored in memory such as memory dump caused by a denial of service attack. When handling encryption keys, the requirement to zeroes them is also driven by key management compliance such as FIPS140. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now, I am still puzzled about this because immutability of Strings was devised by Sun as part of the JAVA security model. In 2001 J Gosling the inventor of JAVA had to say this: (ref &lt;a href=&quot;http://www.artima.com/intv/gosling313.html&quot;&gt;http://www.artima.com/intv/gosling313.html&lt;/a&gt;)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;“One of the things that forced Strings to be immutable was security. You have a file open method. You pass a String to it. And then it&#39;s doing all kind of authentication checks before it gets around to doing the OS call. If you manage to do something that effectively mutated the String, after the security check and before the OS call, then boom, you&#39;re in. But Strings are immutable, so that kind of attack doesn&#39;t work. That precise example is what really demanded that Strings be immutable.”&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;But there are problems and assumptions. Even in this case the immutability of Strings does not offer security value 100%. See another thread &lt;a href=&quot;http://www.velocityreviews.com/forums/t369827-why-is-string-immutable.html&quot;&gt;herein&lt;/a&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It is actually shown that char[] can be used as a way to write the contents of a String when untrusted code is allowed via the JVM. This is possible by using reflection and by depending on the results of SecurityManager. Because of this, someone also even argued that because of this Strings are not really &lt;a href=&quot;http://directwebremoting.org/blog/joe/2005/05/26/java_lang_string_is_not_immutable.html&quot;&gt;immutable&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Indeed in the summary, please do not use JAVA Strings and use char array instead when storing confidential data, credentials (e.g passwords) and secrets such as encryption keys…&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/7276298993736586307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/7276298993736586307' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7276298993736586307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/7276298993736586307'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2009/01/java-security-why-not-to-use-string.html' title='Java Security: Why Not To Use String Objects For Storing Secrets'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-1650537915887875994</id><published>2008-12-16T18:57:00.010-05:00</published><updated>2011-04-16T07:32:28.540-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tests"/><title type='text'>OWASP Security Testing Guide Vs 3 Officially Released!</title><content type='html'>The OWASP testing guide version 3 has been officially released.&lt;br /&gt;
This project is part of the OWASP 2008 Summer of Code that started on April 2008. The guide resulted in a 349 page book and is the contribution of a team of 21 authors, 4 reviewers and 6 months of hard and great team work.&lt;br /&gt;
&lt;br /&gt;
You Can Download the Guide Now Here:&lt;br /&gt;
&lt;strong&gt;&lt;a href=&quot;http://www.owasp.org/index.php/OWASP_Testing_Project&quot;&gt;http://www.owasp.org/index.php/OWASP_Testing_Project&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf&quot;&gt;http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
I contributed to the guide vs 2 by writing section 5.1: How To Value Real Risk authored the introduction part of the version 3, security requirement test derivation (pages 24-39). &lt;br /&gt;
&lt;br /&gt;
I welcome any comments that can help improving the guide by asking you to join the mailing list herein:&lt;br /&gt;
&lt;strong&gt;&lt;a href=&quot;http://lists.owasp.org/mailman/listinfo/owasp-testing&quot;&gt;http://lists.owasp.org/mailman/listinfo/owasp-testing&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
If you are interested, presentations can be arranged too by inqurying OWASP.&lt;br /&gt;
Some presentation material is also available herein:&lt;br /&gt;
&lt;a href=&quot;http://www.owasp.org/images/2/2c/OWASP_EU_Summit_2008_OWASP_Testing_Guide_v3.ppt&quot;&gt;http://www.owasp.org/images/2/2c/OWASP_EU_Summit_2008_OWASP_Testing_Guide_v3.ppt&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/1650537915887875994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/1650537915887875994' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1650537915887875994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1650537915887875994'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html' title='OWASP Security Testing Guide Vs 3 Officially Released!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-1138908640048211743</id><published>2008-11-06T00:37:00.019-05:00</published><updated>2011-04-16T10:38:01.016-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><title type='text'>Security of open source, proprietary software and interoperability</title><content type='html'>﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿ &lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghQVlL_xQVEMMzMfYQqKrOaSdRuLHSFoAyjF1_1QzjyRW2dfCRuyCcKmI-ta9SQUyOwoA5EB77qm1VHYF3NJqawv2Zu0O5wSdfwMZ50Rv7r9vTkNLj563HO5gwcJdgBp-qx819/s1600/software+wars.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghQVlL_xQVEMMzMfYQqKrOaSdRuLHSFoAyjF1_1QzjyRW2dfCRuyCcKmI-ta9SQUyOwoA5EB77qm1VHYF3NJqawv2Zu0O5wSdfwMZ50Rv7r9vTkNLj563HO5gwcJdgBp-qx819/s400/software+wars.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Open Source and Free Software Wars: Source &lt;br /&gt;
dwheeler.com&lt;br /&gt;
&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿﻿ &lt;div style=&quot;text-align: justify;&quot;&gt;Just finished speaking at the &lt;a href=&quot;http://prag.diee.unica.it/giornatasicurezza&quot;&gt;Security Day&lt;/a&gt; hosted by the &lt;a href=&quot;http://www.sardegnaricerche.it/&quot;&gt;Sardegna(Italy) Research Park&lt;/a&gt; where I was invited to present on the topic of Open source projects for Web Application Security and moderate a round table on security of FOSS (Free Open Source Software) vs. COTS (Commercial Off The Shelf) with participating managers from Microsoft, IBM ISS and consultants from Engineering and Ablativ consulting.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The following themes were stimulated during the round table:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;1) Did FOSS adoption in EU (since 2004 directive) [1] resulted in a more secure environment because of the diversity of the systems/platforms being used by organizations/companies?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Answer: a diversity of mechanism helps security on the other hand managing different platforms and systems is very difficult. A uniformity of platforms actually helps a more secure configuration and management effort (i.e. patching). The main objective is not to establish an eterpgenoues environment rather to establish a secure environment/infrastructure as a whole such as have a patch management process in place for all type of systems and applications being used.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;2) Some COTS advocate that their systems are more secured because are closed (e.g. source code is not made available). Security experts advocate the contrary because security by obscurity does not buy security (e.g. Kirckoff&#39;s second law principle)and therefore is not a good reason for keeping systems close [2].&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Answer: We need a security assessment process to validate the security of any software that is acquired/integrated with either from OSS community or COTS vendors. Access to the source code should be a requirement so can be assessed for vulnerabilities before adoption/release. Keeping the software closed (security by obscurity) is not a good reason for security. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;3) According to a study [3] from a source code analysis tool vendor (e.g. Fortify) FOSS is not as secure as COTS because most FOSS produced lack secure software reviews. Is this a call for vendors and companies to source code analyze FOSS before adoption/integration? &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Answer: We need a process to security validate with source code analysis that libraries and systems we use/integrate independently being from FOSS or COTS. Some customers of IBM asked for a OWASP secure code certification as a way to provide evidence that the software has been security reviewed. A certification could also provide legal guarantees to FOSS and COTS users. Ideally this certification could be required by compliance with a new normative/regulation on software assurance.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;4) Time to patch is critical for the security of both FOSS and COTS [4]. For example, there have been cases where Mozilla was recommended over IE by CERT (2004) based upon the fact that took Microsoft 9 months to patch it. The same happened to FOSS [5]: for example, it took more then one year to Debian to discover and patch OpenSSL. The point here is: who takes liability of un-patched vulnerabilities and how software adopters/integrators could enforce FOSS and COTS to develop patches in very short time.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Answer: Ideally you need to establish a process and work with the software vendors/communties to develop patches before the zero day vulnerabilities are disclosed. This is what Microsoft is doing with MSVR program for example. The time to release a patch is important factor but some data (e.g. IBM) shows that actually system admins still leave most systems unpatched even if patches have been available for a while. Therefore timely patch management seems still to be a bigger problem to address then timely release of patches for zero day vulnerabilities.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;5) OSS is free but it is not free from maintenance cost [6]: fixing vulnerabilities via a catch and patch approach is very expensive for both software developers and adopters. Usually the cost to develop patches is a responsibility of who develop software and both FOSS and COTS would rather continue to transfer this cost to the end user instead of bearing is themselves. The fact is that would be much cheaper for FOSS and COTS software developers fixing their software bugs during the development cycle instead of during production.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Answer: Indeed we need a process to require vendors and communities developing software to fix software vulnerabilities before going into production. The cost associated with developing patches can be a good reason for promoting&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;secure software development in the SDLC among FOSS and COTS. In the case of COTS, Microsoft proved that an increased security (e.g. reduced number of bulletins) has an impact on costs: assuming an average cost of bulletin is 100,000 $ by comparing Windows 2003 server with Windows 2000 the reduced number of bulletins is a strong argument of adopting a SDL (Security Development LifeCycle.)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The conference was very well organized and the location was just &lt;a href=&quot;http://www.sardegnacultura.it/j/v/253?s=17899&amp;amp;v=2&amp;amp;c=2488&amp;amp;c1=2123&amp;amp;t=1&quot;&gt;wonderful place&lt;/a&gt; to visit, hope to come back on vacation during the summer.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;References:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[1] &lt;a href=&quot;http://www.enisa.europa.eu/doc/pdf/report_sec_econ_&amp;amp;_int_mark20080131.pdf&quot;&gt;European Network and Inforamation Security Agency: Security Economics and the Internal Market&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[2] &lt;a href=&quot;http://www.cl.cam.ac.uk/~rja14/Papers/toulouse.pdf&quot;&gt;Ross Anderson: Security open source vs. close systems&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[3] &lt;a href=&quot;http://www.fortify.com/news-events/releases/2008/2008-07-21.jsp&quot;&gt;Fortify: Rising Enterprise Adoption of Open Source Software is Putting Businesses At Greater Risk&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[4] &lt;a href=&quot;http://www.dwheeler.com/oss_fs_why.html&quot;&gt;David A. Wheeler: Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!&lt;/a&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[5] &lt;a href=&quot;http://technocrat.net/d/2008/6/4/42529&quot;&gt;Charles Hill: Thoughts on FOSS security&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;[6] &lt;a href=&quot;http://ec.europa.eu/enterprise/ict/policy/doc/2006-11-20-flossimpact.pdf&quot;&gt;EU Study:Economic Impact of FLOSS on innovation and competitiveness of the EU/ICT sector&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/1138908640048211743/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/1138908640048211743' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1138908640048211743'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/1138908640048211743'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/11/oss-security-vs-cots-security.html' title='Security of open source, proprietary software and interoperability'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghQVlL_xQVEMMzMfYQqKrOaSdRuLHSFoAyjF1_1QzjyRW2dfCRuyCcKmI-ta9SQUyOwoA5EB77qm1VHYF3NJqawv2Zu0O5wSdfwMZ50Rv7r9vTkNLj563HO5gwcJdgBp-qx819/s72-c/software+wars.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-584493614018070270</id><published>2008-11-02T17:56:00.016-05:00</published><updated>2011-04-16T10:30:33.993-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>New phishing attacks require adoption of different countermeasures</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_SMiB_9KjIDDQjW1mA_uGpe1uZ2sv9DtIviV3JKeofc3cIOT5YUFUWyAim2dBP0AWf9PiBDVsG9A7ssW0ygOzUaHUFpYR8zvQryLv9EzxVbJIbtqe1RBDudnSvQfwdsa1AofL/s1600/phising.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_SMiB_9KjIDDQjW1mA_uGpe1uZ2sv9DtIviV3JKeofc3cIOT5YUFUWyAim2dBP0AWf9PiBDVsG9A7ssW0ygOzUaHUFpYR8zvQryLv9EzxVbJIbtqe1RBDudnSvQfwdsa1AofL/s1600/phising.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Phishign warning source: &lt;br /&gt;
Cyberpunk blog&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Back in the early 2000 phishing attacks require fraudsters to clone a web site, register it on similar domain and social engineer a victim with a phishing mail. Then phishers got smarter: instead to clone the site with CGI and do all this work why not use a web proxy and exploit a man in the middle attack? Besides this is also a good way to break &lt;a href=&quot;http://www.banktech.com/risk-management/showArticle.jhtml;jsessionid=25PSNFLEM1KKWQSNDLPSKHSCJUNN2JVN?articleID=190500614&amp;amp;_requestid=245709&quot;&gt;multi factor authentication controls!&lt;/a&gt;. This was back in 2006. Since then, most banks and financial institutions in US deployed strong authentication, besides to mitigate phishing also in response to FFIEC compliance on authentication guidelines. Since then, phishing attacks have evolved to exploit &lt;a href=&quot;http://www.owasp.org/index.php/Man-in-the-browser_attack&quot;&gt;man in the browser vulnerabilities&lt;/a&gt;, inject code that can executed by the browser and exploit &lt;a href=&quot;http://news.netcraft.com/archives/2008/01/08/italian_banks_xss_opportunity_seized_by_fraudsters.html&quot;&gt;web site XSS vulnerabilites&lt;/a&gt;. In the last years, phishing resort to the use of botnets to be more even more effective such as &lt;a href=&quot;http://en.wikipedia.org/wiki/MPack_(software)&quot;&gt;Mpack&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Storm_botnet&quot;&gt;Storm&lt;/a&gt;, &lt;a href=&quot;http://www.secureworks.com/research/threats/danmecasprox/?threat=danmecasprox&quot;&gt;Asprox&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Rock_Phish&quot;&gt;RockPhish &lt;/a&gt;just to mention the more popular. These are the tools for the cybercrime economy built to be used by professional fraudsters to gain million of $$ not script kiddies looking for fame! The cost pf such botents in the thousands of $$ and the sale of them generates a business of millions of $$ for the underground economy. The sophistication of these botnets is that can be very stealth to IDS and difficult to tear down by IP because of use of fast flux techniques such as round robin DNS with a short TTL constantly changing the IP mapped to a domain. More information on fast flux and how is used in botnets such as &lt;a href=&quot;http://blogs.zdnet.com/security/?p=1122&quot;&gt;ASPROX&lt;/a&gt; can be found &lt;a href=&quot;http://www.honeynet.org/papers/ff/fast-flux.html&quot;&gt;here&lt;/a&gt;. Spear (targeted) phishing is currently a target for banks: the tools are very close to the original site and use Rockphish as a botnet. This threat is real and requires new countermeasures. It means first of all raise the bar and reduce the attack surface. For example, consider more security for the users of your web site, require them to use locked down browsers with anti-phishing plug-ins enabled with &lt;a f=&quot;http://en.wikipedia.org/wiki/Extended_Validation_Certificate&quot; href=&quot;&quot;&gt;extended validation certificate&lt;/a&gt; support. A sandboxed browser such as the ones provided by &lt;a href=&quot;http://www.trusteer.com/&quot;&gt;Trusteer&lt;/a&gt; and &lt;a href=&quot;http://www.safecentral.com/&quot;&gt;Authentium &lt;/a&gt;could mitigate the risk of malware and keyloggers downloaded on the client browser when your customers become victims of botnet attacks. On the application side, increase defenses by using strong authentication and out of band delivery of tokens to mitigate MiTM attacks: for example using one time passwords and tokens that are delivered completely via SMS and other channels. As a bare minimum, you need to mitigate web application vulnerabilities that can be exploited to attack the browser in a phishing attack such as &lt;a href=&quot;http://www.owasp.org/index.php/OWASP_Top_Ten_Project&quot;&gt;OWASP T10&lt;/a&gt;. In particular XSS and XFS vulnerabilities can be exploited for phishing to deliver attack vectors for malware and spyware. Session management flaws such as CSRF (or session riding) can also be used for phishing. Often times, your site might have design flaws exploitable with targeted attacks that exploit information disclosure, authorization and authentication vulnerabilities. For example an attacker can try to harvest/enumerate user credentials, bank account and credit card information to use to commit fraud via different channels. When you become a victim of botnet attacks, your capability to profile the attacks and alert on the intrusions is very critical for risk mitigation: an IDS that is build into the web application such as &lt;a href=&quot;http://www.owasp.org/index.php/ESAPI&quot;&gt;OWASP ESAPI&lt;/a&gt; or in the web server such as a WAF (Web Application Firewall) can log and monitor suspicious activity and trigger alerts for potential fraud attempts. Using honeypots to learn about botnet attacks can be very useful as well as to learn how to build in defenses. Threat analysis and modeling is the key for mitigation: &lt;a href=&quot;http://www.schneier.com/paper-attacktrees-ddj-ft.html&quot;&gt;attack trees&lt;/a&gt; can be used to identify possible attack scenarios, the channels being used and the vulnerabilities that can be exploited. Take the &lt;a href=&quot;http://www.itgi.org/AMTemplate.cfm?Section=20075&amp;amp;Template=/ContentManagement/ContentDisplay.cfm&amp;amp;ContentID=42520&quot;&gt;attack tree&lt;/a&gt; as reference to derive the right countermeasures for the most likely attack scenarios such as the ones that the frauster might use because of the path of minimum resistance and effort. For example, considers that credit card and account data can be purchased from cyber criminal organizations selling their services &lt;a href=&quot;http://www.symantec.com/business/theme.jsp?themeid=threatreport&amp;amp;inid=us_ghp_staticpromo_threatreport&quot;&gt;on line&lt;/a&gt;. If such attack is cheaper than to break authentication probably that&#39;s the one that a frauster will go after first. If your site has easily exploitable information disclosure vulnerabilities probably the fraudster will attack your site first instead. The most important criteria: never assume the adoption of a anti phishing security technology will solve your problem. You need to consider different mitigations wisely and a defense in depth strategy. Be proative: consider that when you rely on the law enforcement to drive countermeasures is a little too late and this can be very painful in terms of financial losses. Before your site becomes a victim of fraud with phishing 2.0, do a thoughtful review of potential threat scenarios for all your service delivery channels for example both web, ATMs, IVRs and other delivery channels you might have. You need to consider these channels as the attack surface available to a fraudster, simulate potential botnet based/phishing attack scenarios and validate the effectiveness of countermeasures.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/584493614018070270/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/584493614018070270' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/584493614018070270'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/584493614018070270'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/11/phishing-20-botnets-and-web-application.html' title='New phishing attacks require adoption of different countermeasures'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_SMiB_9KjIDDQjW1mA_uGpe1uZ2sv9DtIviV3JKeofc3cIOT5YUFUWyAim2dBP0AWf9PiBDVsG9A7ssW0ygOzUaHUFpYR8zvQryLv9EzxVbJIbtqe1RBDudnSvQfwdsa1AofL/s72-c/phising.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-6560318683262465792</id><published>2008-10-09T19:34:00.034-04:00</published><updated>2011-04-19T21:50:16.545-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>7 Information Security Lessons You Can Learn By Watching The Movie JAWS</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;If your are an information&amp;nbsp;security&amp;nbsp;officer managing risk and incident response processes, I strongly recommend watching the movie &lt;a href=&quot;http://movies.yahoo.com/movie/1800082735/info&quot;&gt;Jaws&lt;/a&gt; as &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvquMIZaGpFtB1l8IdsIaVdFBfbPbtYifSp0ctNzaO_MFfKZ5SwwS1yAVx_ILsZLh9mUWtjwGeLCRV2FHjMBM8e1mN86_pjezszuS6rAbh0288I4MOuwyqFSmJY68h2mu-2G5n/s1600-h/jaws_releaseposter.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5256001780882035250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvquMIZaGpFtB1l8IdsIaVdFBfbPbtYifSp0ctNzaO_MFfKZ5SwwS1yAVx_ILsZLh9mUWtjwGeLCRV2FHjMBM8e1mN86_pjezszuS6rAbh0288I4MOuwyqFSmJY68h2mu-2G5n/s200/jaws_releaseposter.jpg&quot; style=&quot;cursor: hand; float: left; margin: 0px 10px 10px 0px;&quot; /&gt;&lt;/a&gt;&lt;strong&gt;a&amp;nbsp;case study&amp;nbsp;for learning how human and business factors play&amp;nbsp;in dealing with&amp;nbsp;bad, non expected and non foreseeable negative events, such as in this case, shark attacks, and how risk mitigation decisions are affected by&amp;nbsp;human psychology&lt;/strong&gt;. The move&amp;nbsp;is a en example on how the&amp;nbsp;human&amp;nbsp;psyche responds to&amp;nbsp; negative events&amp;nbsp;through stages such as: &lt;strong&gt;(1) denial, (2) awareness, (3) responsibility, (4) action&lt;/strong&gt;. I am not a psychologist but this is my interpretation by just applying common sense: &lt;strong&gt;Denial&lt;/strong&gt; comes from the fact that till we (as people or as business) are not impacted directly by the consequences of a negative event, we most likely minimize risks. &lt;strong&gt;Awareness&lt;/strong&gt;, is driven by the fact that we had experienced a negative impact such as a damage or a financial/asset&amp;nbsp;loss before&amp;nbsp;and so we&amp;nbsp;raised our level of attention as a response to feelings (fear). &lt;strong&gt;Responsibility&lt;/strong&gt;, comes&amp;nbsp;from a feeling of&amp;nbsp;duty or role to deal with the risk and the negative consequences of it, for example, as&amp;nbsp;humans, we might feel responsible to react to protect business, family, friends&amp;nbsp;that depend&amp;nbsp;upon us, our actions and our role in society. The last stage of incident/risk response process is the call for &lt;strong&gt;Action&lt;/strong&gt;. &amp;nbsp;This it is either triggered by need to prevent further sure loss and damage or because someone else told us to do so. If you watch the movie from this perspective, as a case study&amp;nbsp;for managing the risk of security incidents such as data losses and fraud, you can see clearly all these elements and learn some lessons&amp;nbsp;for dealing with security incidents:&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Lesson #1: The first approach toward risk, when not impacting directly a business or an individual,&amp;nbsp;is to either ignore it or minimize it&lt;/strong&gt;. For example, the movie is about the risk of being killed by a shark attack. In the opening scene of the movie, a shark is seen wandering in the ocean and killing a&amp;nbsp;girl during a skin-dipping swim after a college party. The police, that responded to the incident,&amp;nbsp;finds the remains of the body and needs to file a report. The human remains are a clear indication of a shark attack but the policeman filing the report of the incident is advised to minimize the incident for fear that reporting the incident&amp;nbsp;would have scared off the tourists to&amp;nbsp;come to the&amp;nbsp;town beaches on vacation. &lt;em&gt;&lt;strong&gt;How this lesson applies to IS risk?&lt;/strong&gt;&lt;/em&gt; A company had a security incident and customer data was compromised as a result. The attack indicates that an attacker got customer data by breaking into the database through one of the company web sites. The business together with security and fraud decides to file a security&amp;nbsp;incident&amp;nbsp;report that the web site application database that stores customer information has been compromised but minimizes the potential impact since no customer PII (Personal Identifiable Information) has been compromised. The decision is to investigate this further till more information is gathered. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Lesson #2: When&amp;nbsp;the causes&amp;nbsp;of the incident are&amp;nbsp;not found&amp;nbsp;and&amp;nbsp;the fix does not address the root cause,&amp;nbsp;more incidents most likely will occur and get noticed. &lt;/strong&gt;Since&lt;strong&gt; t&lt;/strong&gt;he shark is still alive, it&amp;nbsp;attacks again and makes another victim. At this point, the incident cannot be ignored since it happens in complete daylight with a lot of witnesses. In the mean time, another shark (but not the killer one) is being caught and shown to the public as proof that now the shark responsible for the attacks has been caught and beaches are no-longer at risk. &lt;em&gt;&lt;strong&gt;How this applies to IS risk?&lt;/strong&gt;&lt;/em&gt; The company did not&amp;nbsp;found&amp;nbsp;the cause of the exploit/data breach&amp;nbsp;so they had another cyber-attack that exposed customers data to public. Since now the information about the data loss and the vulnerability is public, the company needs to do something to deal with the damaged reputation. The company then&amp;nbsp;decides to release information to the public that&amp;nbsp;no compromise of&amp;nbsp;personal identifiable information&amp;nbsp;was result of the incident and&amp;nbsp;&amp;nbsp;publicly disclosed that the vulnerability has now been fixed and there is no risk for the&amp;nbsp;customers.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Lesson #3: When&amp;nbsp;new, internally&amp;nbsp;adopted&amp;nbsp;measures do not mitigate the risk of further incidents, you most likely ask for help from the outside, such as by a security matter expert/consulting company.&lt;/strong&gt; The policeman of the city where the shark attack takes place asks a researcher of the US Oceanic Institute for help on dealing with the shark killing threats. The researcher comes to the town and starts his investigation, he soon realizes that this is a case of a giant tiger type of a shark attack and that the shark that was believed to be the killing one (the shown to public as trophy) is not possible to be the one that made such killings since the teeth of the&amp;nbsp;jaw of the shark and the teeth marks in the scares&amp;nbsp;of the victims did not match. The researcher explains the results of his analysis to the police and the town officials and recommends a call for&amp;nbsp;action for killing the&amp;nbsp;tiger shark. After meeting with the policemen and the major it still decided not to. &lt;strong&gt;&lt;em&gt;How applies to IS risk?&lt;/em&gt; &lt;/strong&gt;The company internal security team has identified some&amp;nbsp;security vulnerabilities like SQL injection that&amp;nbsp;possibly were the&amp;nbsp;cause of the breach, these were fixed but the attacks continued to occur so&amp;nbsp;a security consulting company is asked to&amp;nbsp;analyze this further. Security researchers did some security tests (e.g pen tests, vulnerability scans) and concluded that even if some of the identified vulnerabilities can be exploited for the type of the&amp;nbsp;attacks seen like SQL injection, other potential critical security flaws (e.g. weak authorization controls, weak input validation) can be exploitable too but&amp;nbsp;these security flaws might actually require to do a design review to be identified and eventually require to re-engineer the application security controls. The business is still undecided to whether pursuit these recommendations since require more explanation of risk and impact to justify very expensive design changes to the application.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Lesson #4: When&amp;nbsp;the impacts of incidents&amp;nbsp;gets bigger and get notified to&amp;nbsp;senior officials, can&amp;nbsp;be&amp;nbsp;ignored no more and it is decided to act.&lt;/strong&gt; The shark attacks again and this time even more deadly, the people are now scared and demand prompt action to the major of the city and the policeman to kill the shark. After the major of the city and the police hears the people complains at a public hearing, they decide to finance a mission to kill the tiger shark. &lt;em&gt;&lt;strong&gt;How applies to IS risk?&lt;/strong&gt;&lt;/em&gt; Fraudsters break again to the site and this time the financial and reputation losses&amp;nbsp;can no longer be ignored including senior management at the company that now decides to prioritize the effort to mitigate this risk and put resources and spend money to identify the root causes of these attacks and provide risk mitigation solutions.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Lesson #5: The first approach to deal with attacks&amp;nbsp;takes the defensive perspective to detect the&amp;nbsp;negative events and pinpoint the threat sources. &lt;/strong&gt;The policemen, the shark hunters/fisherman and the Oceanic Society Shark researcher devise different techniques to locate the shark attacks such as by hooking floating detection devices to the fisherman boat, these&amp;nbsp;&quot;sensors&quot; seem to work, for a moment, the killing shark is located and traced and&amp;nbsp;seems to be&amp;nbsp;within reach for&amp;nbsp;a shot. &lt;strong&gt;How applies to IS risk?&lt;/strong&gt; The company installs new Security Incident Event Monitoring (SIEM) and starts to closely monitor the attacks looking at logs and incident events. Once an alert from the SIEM is triggered, it is decided to block the IP address of the most likely&amp;nbsp;source.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Lesson #6: If your deal only with the symptoms instead of the root causes of an incident, the countermeasures can be bypassed by the attacker and the risk is still&amp;nbsp;not mitigated.&lt;/strong&gt; Despite all the effort put forth to detect the killing shark attacks,&lt;strong&gt; t&lt;/strong&gt;he shark outsmarts the fishermen, the oceanographer and the policeman by breaking the hooks where the floating devices where attached and attacks the boat unnoticed. The shark now attacks the boat directly, breaks it and causing it to sink. &lt;em&gt;&lt;strong&gt;How this applies to IS incidents?&lt;/strong&gt; &lt;/em&gt;The fraudster learned that incident-event evasion techniques can be used against the application, a SIEM&amp;nbsp;event&amp;nbsp;that pinpoints the source of the&amp;nbsp;IP address to block the traffic, it does not stop the attack since the attacker uses proxies and fast-flux botnet techniques where the source IP is dynamically changed in real time. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;strong&gt;Lesson #7: By tackling the causes of the incidents and the sources of the attacks finally the risk of further attacks is mitigated.&lt;/strong&gt;&amp;nbsp; The fishermen are now actively engaged in fighting back the shark attacks, during&amp;nbsp;a dramatic&amp;nbsp;wrestling with the shark, the policemen throws&amp;nbsp;the boat&amp;nbsp;gas tank on the shark jaw and then aim to it with a rifle causing the gas&amp;nbsp;tank to explode. &lt;em&gt;&lt;strong&gt;How applies to IS risk?&lt;/strong&gt;&lt;/em&gt; After&amp;nbsp;an analysis of&amp;nbsp;the attack scenarios several most probable attack patterns are simulated, the attack surface of the application is identified as well as the possible data entry points for intrusion. The data entry point that is most likely used by the attacker&amp;nbsp;is a&amp;nbsp;web form to initiate a database query transactions to gather customer&#39;s demographic information, access to this data entry&amp;nbsp;form and the transaction&amp;nbsp;are temporarily&amp;nbsp;disabled by configuration changes and this prevents the attack to occur. The application logs collected during the attacks are provided to law enforcement.&amp;nbsp;These along with other information collected by the law enforcement, such as the attacker&#39;s toolkit/scripts used in the attack,&amp;nbsp;provide enough information to pin point the attacker, take down the IP address and eventually&amp;nbsp;catch the fraudster with a sting operation. Further&amp;nbsp;&amp;nbsp;security design review of&amp;nbsp;the application identified flaws in the implementation of the transaction for query demographic&amp;nbsp;customer data such as&amp;nbsp;elevation of user privilege through changes of query parameters that were unvalidated by the server. Application design changes are implemented to prevent further attacks such as to strictly&amp;nbsp;enforce role base access controls on the server side&amp;nbsp;with new policy rules, changes to the web form not&amp;nbsp;pass role/permissions parameters in the query. These&amp;nbsp;fixes were implemented with a new patch and access to these transactions was re-enabled for the customers.&lt;strong&gt; Finally a disclaimer, the examples mentioned herein are not factual..&lt;/strong&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/6560318683262465792/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/6560318683262465792' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6560318683262465792'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/6560318683262465792'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/10/best-security-risk-awareness-watch-jaws.html' title='7 Information Security Lessons You Can Learn By Watching The Movie JAWS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvquMIZaGpFtB1l8IdsIaVdFBfbPbtYifSp0ctNzaO_MFfKZ5SwwS1yAVx_ILsZLh9mUWtjwGeLCRV2FHjMBM8e1mN86_pjezszuS6rAbh0288I4MOuwyqFSmJY68h2mu-2G5n/s72-c/jaws_releaseposter.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-5313000728641350777</id><published>2008-07-13T08:33:00.009-04:00</published><updated>2011-04-19T20:45:02.969-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Presentations And Publications"/><title type='text'>Application Security Conferences/Events (July-November)</title><content type='html'>I thought to announce herein a provisional list of conferences/meetings that I plan to attend: &lt;br /&gt;
&lt;strong&gt;July 30th&lt;/strong&gt; &lt;a href=&quot;http://www.owasp.org/index.php/Cincinnati&quot;&gt;Local OWASP Chapter&lt;/a&gt;: Presenting on Building Security In The SDLC&lt;br /&gt;
&lt;strong&gt;August 6-7&lt;/strong&gt; &lt;a href=&quot;http://www.blackhat.com/&quot;&gt;Blackhat&lt;/a&gt;, J.C. Palace Las Vegas: Attending&lt;br /&gt;
&lt;strong&gt;August 8-10&lt;/strong&gt; &lt;a href=&quot;http://www.defcon.org/&quot;&gt;Defcon16&lt;/a&gt;: Riviera Hotel, Las Vegas: Attending&lt;br /&gt;
&lt;strong&gt;September 23rd&lt;/strong&gt; &lt;a href=&quot;http://www.owasp.org/index.php/Cincinnati&quot;&gt;Local OWASP Chapter&lt;/a&gt;: Co-Presenting with Scott Nusbaum on Encoded Attack Vectors, Threats and Countermeasures&lt;br /&gt;
&lt;strong&gt;October 3rd &lt;/strong&gt;: &lt;a href=&quot;http://imi.nku.edu/security/default.aspx&quot;&gt;IMI security symposium&lt;/a&gt;, Northern Kentucky University: &quot; Managing Software Security Risks Using Application Threat Modeling&quot;&lt;br /&gt;
&lt;strong&gt;October 30th &lt;/strong&gt;: &lt;a href=&quot;http://www.rochestersecurity.org/&quot;&gt;Rochester Security Summit&lt;/a&gt;, Presenting: Producing Secure Applications with Software Security Engineering and Risk Management Processes&lt;br /&gt;
&lt;strong&gt;November 5th&lt;/strong&gt; &lt;a href=&quot;http://www.sardegnaricerche.it/index.php?xsl=370&amp;amp;s=56666&amp;amp;v=2&amp;amp;c=3134&amp;amp;nc=1&amp;amp;sc=&amp;amp;vd=2&amp;amp;fa=1&quot;&gt;Security Day&lt;/a&gt; in Sardegna (Italy): Presenting On Web Application Security Initiatives: The Open Source Way and Moderator for the Round Table on Open Source vs. Commercial Software Security&lt;br /&gt;
&lt;strong&gt;November 10 and 11&lt;/strong&gt;: &lt;a href=&quot;http://www.iasahome.org/web/itarc/singapore&quot;&gt;IASA&lt;/a&gt; IT Architect Regional Conference in Singapore: Presenting on: Architecting Secure Web Applications Using Security Engineering Design and Risk Management Processes&lt;br /&gt;
&lt;br /&gt;
If you plan to attend any of these events/conferences please send me a note.</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/5313000728641350777/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/5313000728641350777' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/5313000728641350777'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/5313000728641350777'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/07/conferencesmeetings-i-will-be.html' title='Application Security Conferences/Events (July-November)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-17906156.post-3720303113610560229</id><published>2008-06-25T21:59:00.003-04:00</published><updated>2008-06-25T22:47:45.031-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Threats And Countermeasures"/><title type='text'>Threat Modeling Article</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5fo1oCMClxJ7xSEfH73HBtdYZbfZdSalXXJBC-7jnQ4QYAL-CcIzQkHiOQVn-6CMHQD1mvU5SuIWfjTDpOarmfhcuayQH-7Ka9OtP812p8UR_RcrZh2LbA9I2HBw_jDdb4kfT/s1600-h/insecure17.JPG&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5fo1oCMClxJ7xSEfH73HBtdYZbfZdSalXXJBC-7jnQ4QYAL-CcIzQkHiOQVn-6CMHQD1mvU5SuIWfjTDpOarmfhcuayQH-7Ka9OtP812p8UR_RcrZh2LbA9I2HBw_jDdb4kfT/s200/insecure17.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5216015102173425794&quot; /&gt;&lt;/a&gt;&lt;br /&gt;I co-authored with Tony Ucedavelez (Managing Director for Versprite) an article on threat modeling. It is published on the June edition of &lt;a href=&quot;http://www.net-security.org/dl/insecure/INSECURE-Mag-17.pdf&quot;&gt;In-secure magazine&lt;/a&gt;. &lt;br /&gt;The intent was to give an holistic view on threat modeling as security activity that can be performed by security practioners in different role and speciality. Threat modeling (TM) is not limited to just modeling threats in applications and the usage is not limited to architects that need to design secure applications. The result of the TM activity can be used by security testers to perform risk based tests as well by information security officers for technical risk analysis. This is because beside modeling threats with the logical, physical and use/misuse case views of the application, TM allows for the identification of vulnerabilities (security flaws) and the countermeasures to mitigate the risk posed by such vulnerabilities. The article also tries to strike the balance from the strategic view of threat modeling with a more tactical one such as way to perform a security assessment on existing applications. We covered the most popular TM methodologies and TM tools available today. We also tried to give best practices on how to use TM as part of the SDLC to build security into the applications independently from the TM methodology being adopted.</content><link rel='replies' type='application/atom+xml' href='http://securesoftware.blogspot.com/feeds/3720303113610560229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/17906156/3720303113610560229' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/3720303113610560229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/17906156/posts/default/3720303113610560229'/><link rel='alternate' type='text/html' href='http://securesoftware.blogspot.com/2008/06/threat-modeling-article.html' title='Threat Modeling Article'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5fo1oCMClxJ7xSEfH73HBtdYZbfZdSalXXJBC-7jnQ4QYAL-CcIzQkHiOQVn-6CMHQD1mvU5SuIWfjTDpOarmfhcuayQH-7Ka9OtP812p8UR_RcrZh2LbA9I2HBw_jDdb4kfT/s72-c/insecure17.JPG" height="72" width="72"/><thr:total>0</thr:total></entry></feed>