Free Essay

Sans Institute Infosec Reading Room

In:

Submitted By ivsdwudp
Words 3755
Pages 16
Interested in learning more about security?

SANS Institute InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Security Strengths and Weaknesses of Two Popular Web Servers
As the mediator between your business and the world the Web Server that you choose must be completely sound in regards to security. You do have many options when choosing which Web Server package you will use to transmit your company's on-line presence to the rest of the world. There are two Web Server packages in particular that dominate the market for Web Servers. These two Web Server packages are Microsoft's Internet Information Server, and Apache.

Copyright SANS Institute Author Retains Full Rights

AD

Brad Bell August 19, 2001 Security Strengths and Weaknesses of Two Popular Web Servers As the mediator between your business and the world the Web Server that you choose must be completely sound in regards to security. You do have many options when choosing which Web Server package you will use to transmit your company's on-line presence to the rest of the world. There are two Web Server packages in particular that dominate the market for Web Servers. These two Web Server packages are Microsoft's Internet Information Server, and Apache. What is a Web Server? Key definition andAF19 FA27 a web998D FDB5 DE3D F8B5 06E4 A169 4E46 static content to The fingerprint = purpose of 2F94 server is a software package that serves either a Web browser at a basic level, or dynamic content that require end-user interaction. For example, a web server may receive a request for a Web page such as www.amazon.com/index.html. The Web Server would then map the Uniform Resource Locator (URL) to a local file on the host server. In this case the file, index.html is somewhere on the host file system. The server then loads this file from disk and serves it out across the network to the user's Web browser. The browser and the server are talking to each other using Hypertext Transfer Protocol (HTTP) which controls this entire exchange. How does a Web Server transmit dynamic content? Web Servers don't just send static documents and files across the network they also transmit dynamic content. This could be done through web pages created in response to a user input, which is done directly or indirectly by the user. An example of the user directly influencing the output of a web page could be through the use of on-page forms backed by some sort of executable program or code. Also, an example of a user indirectly influencing the results of a web page may be through the use of "cookies." Cookies are short pieces of data used by Web Servers to help identify web users. Common Gateway Interface (CGI), and JavaScript for Dynamic Content With CGI an end-user can visit your site and perform specified tasks with the CGI programs you have. The Common Gateway Interface (CGI) is a frequently used technique of interfacing external applications with Web Servers. A standard HTML document that a Web Server retrieves is static and will never change. However, with a CGI program the Web Server will send the results for the web page upon receipt of the criteria for the page. This allows for the output of dynamic information. For example, let's say that you wanted to connect your Stamp Collection database to the Internet, to allow people from all over the world to look through it based upon whatever criteria they set. Basically, you need to create a CGI program that the Web Server will execute to transmit information to the database software, and receive the results back again and provide them to the end-user. A CGI program can be written in several languages such as Visual Basic, PERL, or C++ that allows it to be executed on the system. CGI programs are one way of making Internet content Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D example, simply adding a few lines of dynamic, but there are other methods of doing this. For F8B5 06E4 A169 4E46 JavaScript code to an HTML file will make the web page very dynamic. The JavaScript could all be within the HTML thus making the program execute on the host side rather than the server. An example of some JavaScript would be a program that pulls the local date of the user machine and

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

01

,A

ut

ho

rr

eta

ins

fu ll r igh ts

Author retains full rights.

displays it on the user's screen. Here is the code for such a program: function displaydatetime() { if (!document.layers && !document.all) return; var today; var timeLocal; var timeUTC; today = new Date(); timeLocal = today.toLocaleString() + " " + "Local"; //Convert to current locale. timeUTC = today.toUTCString(); //Convert to UTC. if (document.layers) { Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 document.layers.clockLocal.document.write(timeLocal); document.layers.clockLocal.document.close(); document.layers.clockUTC.document.write(timeUTC); document.layers.clockUTC.document.close();} else if (document.all) { clockLocal.innerHTML = timeLocal; clockUTC.innerHTML = timeUTC;} setTimeout("displaydatetime()", 500) } window.onload = displaydatetime; // End --> The above JavaScript would display the following results on your web browser: 08/02/2001 09:31:08 Local Thu, 02 Aug 2001 14:31:08 UTC

Security Issues Related to Serving Information via Web Servers (Static and Dynamic content) Serving data and information to people all over the world is a grand task. However when coupled with the related security issues and needs this task becomes monumental. Serving information over the internet securely was brought about with the introduction of Hypertext Transmission Protocol, Secure (HTTPS). This protocol allows for secure communication to go on between the browser and Web server. Basically this means that it is safe for a user and a server to transmit sensitive data to each other over what might be considered an insecure network. What either of the counterparts in this transmission does with the data is another story however. More about HTTPS The secure hypertext transfer protocol (HTTPS) is a communications protocol designed to transfer Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 using a Secure encrypted information between computers over the Internet. HTTPS is just HTTP Socket Layer (SSL). A secure socket layer is an encryption protocol invoked on a Web Server that uses HTTPS. The main reasons for using HTTPS are online purchasing and the exchange of private information over the internet. An example of online purchasing would be something like

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

01

,A

ut

ho

rr

eta

ins

fu ll r igh ts

Author retains full rights.

purchasing a best-selling novel on amazon.com. Also, an example of exchanging private information might be the transmission of the credit card number used to purchase the novel off amazon.com. IIS vs. Apache Given the current environment of the Internet and how Web Servers interact with end-users we can begin to compare how two popular Web Servers, Microsoft Internet Information Server and Apache, perform. Specifically we can compare these two Web Servers in regards to the security they provide, and the problems and incidents that have occurred with these Web Servers since they have been in production. IIS Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 a first time Web Microsoft's flagship Internet product, Internet Information Server, is useful as both Server for those comfortable and familiar with Microsoft products and as a high-end Web Server for hosting a large e-commerce web site. Since the vast majority of computer users are accustomed to using Microsoft based products and the similar interfaces that exist on these applications it is not a surprise that many people choose to use Microsoft's IIS for their Web Server. This alone is not an adequate reason to choose IIS as your web server, but it definitely accounts for some of Microsoft's market share of Web Server sales. The Wrong Reason to choose IIS When asked why a company is using IIS as it's web server application many times the appropriate IT employee will answer one of the following responses: "It came with the Operating System" "We're a "Microsoft Shop. So we use MS products" "We're not familiar with other options" "Our consultants told us to use IIS" These are all reasons or excuses you would expect to hear in any standard organization for choosing IIS. However, none of the reason listed above are strong enough to justify choosing the software that will run your Web Server. For a decision of this magnitude more research is necessary. Weaknesses of IIS One of the major weaknesses of using IIS as your web server is that being a Microsoft product IIS automatically becomes a target for the software hacking community. There are many hackers around the world who would love to terrorize any piece of software produced by Microsoft. The notoriety of the company basically puts a target on any of its products for hackers. The level of testing of the software is also questionable when you consider the number of patches and updates that have been released by Microsoft for IIS. This brings into doubt the quality of the product that was developed in the first place. With all of the money available to Microsoft for Research and Key fingerprint = AF19surprising that so many patches have been released for IIS. This makes one Development it is very FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 wonder if IIS was a rushed product quickly put out by Microsoft with the sole intention of fixing any problem they encountered later on down the road. In fact, if you take this view point it is easy to see IIS as more of a money making scheme rather than a polished piece of software developed

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

01

,A

ut

ho

rr

eta

ins

fu ll r igh ts

Author retains full rights.

with pride. IIS Code Red Virus One example of an incident involving Microsoft's IIS web server was the Code Red virus that infiltrated systems all over the world in July and August of 2001. This virus worked by taking advantage of a ubiquitous software bug within IIS. The reason the Code Red virus worked was a buffer-overflow vulnerability in Microsoft's IIS web servers. This allowed system-level execution of code and thus presented a major security weakness. The virus ignored all physical and political boundaries and quickly spread all over the world. Luckily there was no real harm done from the virus. Its main purpose was to perform a denial of service attack on www.whitehouse.gov. The virus attacked based upon the IP address of the White House serve so the Denial of Service attack was easily fixed. This is just one example of how a web server can be vulnerable without the Key fingerprint = AF19 FA27 2F94 998D FDB5the hacker's decidedA169 4E46 have created proper configurations or updates installed. Had DE3D F8B5 06E4 to they could much more havoc with this virus. Reasons why companies are using IIS When making a decision of this nature the person responsible should choose IIS as their Web Server package for the appropriate reasons. Many organizations and businesses do in fact choose IIS as their Web Server, and are very satisfied with the results that they have seen. A reason for this is the fact that many people are familiar with the Microsoft style graphical user interface, and can easily apply this to using and learning IIS. In fact, this interface can even remove the need for companies to hire expert help thus saving them money. Another reason why IIS would be a good choice is the fact that Microsoft offers downloadable tools to ensure that all of the latest software updates and patches are installed on your Web Server. Microsoft has also made available an IIS Security Configuration tool that will ease the process of securing any Web Server running off IIS. Additionally, with all of the security patches that Microsoft has released recently should cause more relief than concern. This is because with each additional security patch IIS becomes that much more "secure" as a product. In theory as these patches and updates are released the number of vulnerabilities should decrease. Apache Apache is a powerful, flexible web server that implements the latest protocols, including HTTP/1.1. Apache is highly configurable and extensible with third-party modules, and the custom modules that can be created using the Apache module API. Apache also functions on every major computer platform in existence including Windows NT/9x, Netware 5.x, OS/2, and most versions of Unix, as well as several other operating systems. How did Apache come about? Apache was first developed as a result of the National Center for Supercomputing Applications httpd project. Today Apache is one of the most functional and efficient web servers in existence. The name Apache is not a tribute to the native people of North America, but rather a direct representation of how the software was developed. The software was first known as "A PatCHy Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D a series of patch files. There are some server" because it was based on some existing code and F8B5 06E4 A169 4E46 developers out there however who prefer to believe that the software was named Apache because of the superior skills in warfare strategy and inexhaustible endurance of the Apache Indian tribe of North America.

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

01

,A

ut

ho

rr

eta

ins

fu ll r igh ts

Author retains full rights.

Conclusion When it comes to deciding on which web server is right for your organization there is no clear-cut answer. Your basis for making this decision could be based upon many different sets of criteria. For instance you may choose Apache because it's free, or you may choose Microsoft's IIS because you have a large amount of faith in Microsoft products and their technical support. These are both good reason to choose a web server. No matter which web server you choose you must do several things in order to ensure that you have the security your organization needs. Any web server software package must be setup properly for the needs of your business. You must also continuously make certain that you have all of the most current updates and patches installed to defend against any security weakness that has been discovered within your web server of choice. Also, as incidents occur around the world you must have a designated employee or set of employees who stays in tune with all of this to make sure that your business will be safe and unaffected by any newly found security weakness. Both Microsoft's IIS and Apache can be secure if the proper configuration is done. Many of the weaknesses in IIS and Apache are from features in the software that are useful for one reason or another but they may present a security weakness if Keyconfigured properly.FA27 2F94 998D FDB5 DE3Dboth of06E4 A169servers, but you must not fingerprint = AF19 You would be well served by F8B5 these web 4E46 educate yourself and take the necessary precautions with either web server to ensure that your organization is safe and secure.

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

te

20

01

Weaknesses of Apache Even with all of the strengths of Apache it is not the web server for all users. Setup of the server is performed through a command-line interface. Typical Microsoft users will have trouble navigating this interface. Apache does not have the user-friendly tools you would expect to see in a Microsoft product like Wizards, or other visuals. For some developers this is advantageous, but for others it can translate into expensive deployment and maintenance costs. Also, the technical support given through newsgroups may not be adequate for many users. You could imagine the scenario of an inexperienced user who is accustomed to graphical user interfaces trying to setup Apache as their web server with a command-line interface and hardly any technical help. It would be nearly impossible for this user to get the server up and running, and even if they did it definitely would not be configured correctly. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Strengths of Apache One of the primary reasons people begin using Apache in the first place is the fact that it is a free and open-source product. All of the source code for Apache is freely distributed to any person or organization that wants it along with an unrestrictive license. The Apache Group also strongly encourages user feedback through new ideas, bug reports and patches. Apache's overall security performance is unquestionable. This is obvious when you consider the fact that many of the most accessed web sites in the world run Apache or Apache variants. The public distribution of the source code results in quick distribution of patches and updates for the software. This public scrutiny also ensures that any security hole is truly fixed according to the differing viewpoints of anyone investigating the software's security issue. As a result of this Apache's large base of users have ensured that its developers have created a package that is extremely stable and secure. Apache users also have the benefit of accessing technical support via Usenet newsgroups from anywhere in the world.

,A

ut

ho

rr

eta

ins

fu ll r igh ts

Author retains full rights.

Bibliography Honeycutt, Jerry. "Microsoft IIS: safe or sorry?." 29 Jan. 2001. URL: http://enterprise.cnet.com/enterprise/0-9566-7-4561136.html (19 Aug. 2001). Madigan, Andrew. "LINUX / Apache versus Windows NT / IIS." URL: http://homepage.tinet.ie/~designmad/Linux-v-NT.htm (19 Aug. 2001).

Key fingerprint = AF19 FA27 2F94 of Code-Red" 24 July 2001. A169 4E46 Moore, David. "CAIDA Analysis 998D FDB5 DE3D F8B5 06E4 URL: http://www.caida.org/analysis/security/code-red/ (19 Aug. 2001). Park, Barry. "IIS leaves cracker's door wide open." 02 May 2001. URL: http://it.mycareer.com.au/breaking/20010502/A39778-2001May2.html (19 Aug. 2001). Sol, Selena. "Secured Transmission (SSL, HTTPS)." 20 Sep. 2001. URL: http://www.wdvl.com/Authoring/Tools/Tutorial/secure.html (19 Aug. 2001).

"CGI City - One of the biggest WWW Resources for CGI and Perl materials." URL: http://www.icthus.net/CGI-City/ (19 Aug. 2001). "JavaScript.com (TM) - The Definitive JavaScript Resource: JavaScript Tutorials and Free Java Scripts." URL: http://www.javascript.com/ (19 Aug. 2001).

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2001,

©

SA

NS

In

As part of the Information Security Reading Room.

sti

tu

Wittmann, Art. "Who's the Best?." 18 Oct. 1999. URL: http://www.networkcomputing.com/1021/1021colwittmann.html (19 Aug. 2001).

te

20

Viejo, Aliso. "Exploit Puts Pressure On For IIS Web Server Patch." 04 May 2001. URL: http://www.newsbytes.com/news/01/165322.html (19 Aug. 2001).

01

,A

Steinberger, Ric. "IIS: Time to Just Say No." 21 May 2001. URL: http://securityportal.com/articles/iis20010521.html (19 Aug. 2001).

ut

ho

rr

eta

ins

fu ll r igh ts

Meloni, Julie. " Apache 1.3.14 - CNET Linux Center - CNET.com." 18 Jan. 2001. URL: http://linux.cnet.com/linux/0-2136889-7-4513044.html?tag=st.it.9566-74561136.pptxt.2136889-7-4513044 (19 Aug. 2001).

Author retains full rights.

Last Updated: August 21st, 2013

Upcoming SANS Training
Click Here for a full list of all Upcoming SANS Events by Location
SANS Melbourne 2013 SANS Capital City 2013 SANS Network Security 2013 SEC 440 @MCMC Sept 2013 SANS Forensics Prague 2013 SANS Seattle 2013 SANS Bangalore 2013 SANS Baltimore 2013 SEC760 Advanced Exploit Development for Penetration Testers GridSecCon 2013 Healthcare Cyber Security Summit Securing the Internet of Things Summit SANS Tokyo Autumn 2013 October Singapore 2013 SANS Dubai 2013 FOR572 Advanced Network Forensics and Analysis SANS Chicago 2013 MGT415 at (ISC)2 SecureSoCal 2013 SANS South Florida 2013 MGT415 at (ISC)2 SecureDallas 2013 SANS Pen Test Hackfest Training Event and Summit SANS Sydney 2013 SANS Korea 2013 Cloud Security @ CLOUD Expo Asia SANS London 2013 SANS San Diego 2013 FOR585 Adv Mobile Device Forensics SANS Thailand 2013 SANS OnDemand Melbourne, AU Washington, DCUS Las Vegas, NVUS CyberJaya, MY Prague, CZ Seattle, WAUS Bangalore, IN Baltimore, MDUS Baltimore, MDUS Jacksonville, FLUS San Francisco, CAUS San Francisco, CAUS Tokyo, JP Singapore, SG Dubai, AE Washington, DCUS Chicago, ILUS Manhattan Beach, CAUS Fort Lauderdale, FLUS Dallas, TXUS Washington, DCUS Sydney, AU Seoul, KR Singapore, SG London, GB San Diego, CAUS Vienna, VAUS OnlineTH Books & MP3s OnlyUS Sep 02, 2013 - Sep 07, 2013 Sep 03, 2013 - Sep 08, 2013 Sep 14, 2013 - Sep 23, 2013 Sep 17, 2013 - Sep 19, 2013 Oct 06, 2013 - Oct 13, 2013 Oct 07, 2013 - Oct 14, 2013 Oct 14, 2013 - Oct 26, 2013 Oct 14, 2013 - Oct 19, 2013 Oct 14, 2013 - Oct 19, 2013 Oct 15, 2013 - Oct 17, 2013 Oct 17, 2013 - Oct 24, 2013 Oct 17, 2013 - Oct 22, 2013 Oct 21, 2013 - Oct 26, 2013 Oct 21, 2013 - Nov 02, 2013 Oct 26, 2013 - Nov 07, 2013 Oct 28, 2013 - Nov 02, 2013 Oct 28, 2013 - Nov 02, 2013 Oct 31, 2013 - Oct 31, 2013 Nov 04, 2013 - Nov 09, 2013 Nov 06, 2013 - Nov 06, 2013 Nov 07, 2013 - Nov 14, 2013 Nov 11, 2013 - Nov 23, 2013 Nov 11, 2013 - Nov 23, 2013 Nov 13, 2013 - Nov 15, 2013 Nov 16, 2013 - Nov 25, 2013 Nov 18, 2013 - Nov 23, 2013 Nov 18, 2013 - Nov 23, 2013 Aug 26, 2013 - Aug 31, 2013 Anytime Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Live Event Self Paced

Similar Documents

Premium Essay

Administrative Controls

...Week 2: Administrative Controls SE578 – Prof. Joseph Constantini By David Truong (D00571438) 1/18/2013 Table of Contents How do Administrative Controls demonstrate “due care?” 3 How does the absence of Administrative Controls impact corporate liability? 3 How do Administrative Controls influence the choice of Technical and Physical Controls 4 How would the absence of Administrative Controls affects prigects in the IT department 4 Summary 5 Reference 6   How do Administrative Controls demonstrate "due care?" Administrative Controls are guidelines that is set up by management in order to meet the standard that shows that how he company has taken precaution to prevent malicious intent as well as prevention against malicious intent. The controls that are implemented must show a degree in which the process is common and assist in the fortifying the company’s ability to prove its willingness to take action on correcting weaknesses within the company. This idea is also known as “due care.” They must include controls that contribute to individual accountability, ability to audit, and separation of duties. Administrative Controls can be identified with two specific category: detective administrative controls and preventative administrative controls. Ultimately, the purpose of Administrative Controls is to show that the company has taken the necessary precaution, the “due care,” to protect the confidentiality, integrity and availability...

Words: 896 - Pages: 4

Premium Essay

Vulnerability Assessment

...A. Memo of Case Social engineering is a method of gaining access to information by deception performed against human capital. System penetrators and ‘crackers’ know that people, and their desire to be helpful, or their ability to emote, are the weakest links in any program designed to protect information systems. Attackers can trick or persuade their way into systems in any number of ways via remote and physical means, and convince users to reveal information of interest that can cause harm to an organization. A typical social engineering attack can be segmented into physical and psychological stages. The physical segment of the social engineering operation could include phone calls, or returned phone calls from employees back to the attacker (an example of reverse social engineering) that volunteer information, ‘dumpster diving’ for company specific information that can be used to simulate a rapport or relationship with the company if questioned by an employee or security, emails with surreptitious links requesting unique information such as PIN’s or user names, or physical proximity and entry by impersonating an authorized person. The psychological stage of a social engineering attack takes place after the physical foot printing of the organization by using the bona fides that were learned while gathering physical intelligence to manufacture relationships with persons or the company, or by asserting false authority by impersonating persons or departments within the company...

Words: 1868 - Pages: 8

Premium Essay

Chapter 8 Review

...Categories › Uncategorized Answers.com > Wiki Answers > Categories > Uncategorized > What is the relationship between risks threats and vulnerabilities as it pertains to information system ... it 255 lab 2 solution - StudentOfFortune.com www.studentoffortune.com/question/2289555/it-255-lab-2-solution What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems ... vulnerability, exploits, and the risk ... Understanding risk, threat, and vulnerability | TechRepublic www.techrepublic.com/blog/...risk-threat-and-vulnerability/1897 The three security terms “risk”, “threat”, and “vulnerability” will be defined and differentiated here: Risk. SANS Institute InfoSec Reading Room - SANS Information, … www.sans.org/.../introduction-information-system-risk-management_1204 · PDF file 4.2.3 Relating Threats to Vulnerabilities ... Once again, NIST SP 800-30 provides an excellent de finition of vulnerability as it pertains to information systems. Difference Between Threat & Vulnerability | eHow.com www.ehow.com › … › Operating Systems › Other Operating Systems A vulnerability is a weakness or flaw found in software and operating systems that threats try to exploit. Threats are malicious files or programs that attack an ... Securing Windows 2000 Server - Resources and Tools for IT ... technet.microsoft.com/en-us/library/cc751212.aspx Nov 17, 2004 · A threat is any potential...

Words: 527 - Pages: 3

Premium Essay

Information Security White Paper

...Information Security White Paper UMUC In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical and information technology assets, and to ensure that all information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as: Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized...

Words: 697 - Pages: 3

Premium Essay

Quality Web Design

...Company Overview Quality Web Design (QWD) is a company that specializes in Websites and Web Design content for any type of business. Their mission is to help other businesses increase their revenue by providing them with top quality websites for their customers. In addition, they own over 250,000 of proprietary images, and graphical designs. These designs are customized for every industry and demographic. Their business process is quite simple. They have a server at the Company Headquarters, where they store all of their proprietary data (including images, scripts, templates, etc). They utilize a Microsoft Visual Studio Team Foundation Service (TFS) server to manage their content and the progress of the project. “Team Foundation is a set of tools and technologies that enable a team to collaborate and coordinate their efforts on building a product or completing a project. Team Foundation enhances team communication, tracks work status, supports team roles, enacts the team process, and integrates team tools.” (Microsoft.com (2011) Team Foundation Overview) In addition to the Team Foundation, they also utilize Visual Studio to code, and build the websites. These resources are accesses through different methods. Those methods include WAN connection, VPN connection through a remote office, and through the corporate office via LAN. They also have other services such as Outlook Web Access for E-mail that is accessed via the methods mentioned above. They have also created...

Words: 927 - Pages: 4

Free Essay

Iris Recognition

...Iris Recognition In the computer world, they say it is important to keep your eyes on the future, and in the research that follows, we're going to do just that. I am planning on exploring the ins and outs of iris recognition biometrics. Whether we like it or not, biometrics are here to stay and are becoming more and more popular as each year passes. Although the automated method of iris recognition has only existed in patent since 1994, an ophthalmologist, by the name of Frank Burch, first proposed the idea of using ones iris patterns as a method to recognize someone in 1936. It's hard to imagine that this type of biometrics recognition began almost 80 years ago. (FBI) Iris recognition is being used worldwide and is growing in popularity at an astonishing rate. Twenty-nine Canadian airports are using iris recognition for their employees and at Amsterdam's Schiphol Airport, they have fast-track lines at passport control that use iris scanning to identify flight crews and frequent travelers. You may think that airports and banks are the only type of companies that have these types of biometric security, but iris recognition is being used in more basic applications. Such as, a sugar beet factory in Wisconsin uses iris scanning to keep track of time and attendance of their employees because its more accurate than a card swipe ad less intrusive as other types of biometrics. (Iris Recognition Systems for Access Control and Identity Management Gain Popularity) We may look at iris scanning...

Words: 636 - Pages: 3

Premium Essay

Nothing Yet

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Conducting a Penetration Test on an Organization This document is decided to give readers an outlook on how a penetration test can be successfully done on an organization. A methodology has been drawn out in this document to allow readers to be acquainted with the process that penetration testers go through to conduct a penetration test. Copyright SANS Institute Author Retains Full Rights AD Conducting a Penetration Test on an Organization TABLE OF CONTENTS PAGE Abstract 2 Bibliography ut ho Conclusion rr Limitation of Penetration Testing eta ins The Process and Methodology Planning and Preparation Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Information Gathering and Analysis Vulnerability Detection Penetration Attempt Analysis and Reporting Cleaning Up fu ll r igh ts. What is a Penetration Test? 2 3 3 4 6 7 9 9 10 10 11 12 14 Appendix A: Netcraft (www.netcraft.com) results on www.sans.org Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Chan Tuck Wai (twchan001) © SA Full name: Chan Tuck Wai GIAC userID: twchan001 Course: Security Essentials Version: First (Original Submission) Conference Location: Malaysia NS In sti DETAILS tu te 20 Appendix...

Words: 5729 - Pages: 23

Premium Essay

Minicase

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Biometric Scanning Technologies: Finger, Facial and Retinal Scanning This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced by French and British police advancements in the nineteenth century and still remain the most widely used Biometric technology today. Facial-scan technology is ... AD Copyright SANS Institute Author Retains Full Rights fu ll r igh ts Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te 20 03 ,A ut ho rr eta ins Edmund Spinella SANS GSEC Original Submission San Francisco, CA Dec 2002 28 May 2003 Biometric Scanning Technologies: Finger, Facial and Retinal Scanning Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2003, As part of the Information Security Reading Room. Author retains full rights. Abstract © SA NS In sti tu te 20 03 ,A ut ho rr eta ...

Words: 5748 - Pages: 23

Premium Essay

Hackng

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Anti-Hacking: The Protection of Computers While the term Anti-Hacking may have different meanings to different people, one thing is certain. By definition, it means , "the opposite of hacking." If hacking is defined as an attack on a computer system, then Anti-Hacking is the protection of that system. The three aspects discussed in this paper: Education of the Security Adminis trator, Securing the Environment, and How to Fight Back are just one combined definition of how to protect a system. Copyright SANS Institute Author Retains Full Rights AD © SANS Institute 2003, Author retains full rights Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2003, As part of the Information Security Reading Room. Author retains full rights. Anti-Hacking: The Protection of Computers Chadd Schlotter In the Computer Security industry, there are many solutions available to help combat cyber crime. Firewalls and Intrusion Detection systems are in place across the Internet to help protect more networks than ever before. Teams at software corporations work diligently on creating patches for known vulnerabilities, yet everyday the number of computers that are compromised increases...

Words: 4983 - Pages: 20

Premium Essay

Conducting a Penetration Test on an Organization

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Conducting a Penetration Test on an Organization This document is decided to give readers an outlook on how a penetration test can be successfully done on an organization. A methodology has been drawn out in this document to allow readers to be acquainted with the process that penetration testers go through to conduct a penetration test. AD Copyright SANS Institute Author Retains Full Rights Conducting a Penetration Test on an Organization TABLE OF CONTENTS PAGE 2 What is a Penetration Test? 2 fu ll r igh ts. Abstract eta ins The Process and Methodology Planning and Preparation Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Information Gathering and Analysis Vulnerability Detection Penetration Attempt Analysis and Reporting Cleaning Up rr Limitation of Penetration Testing ut ho Conclusion 10 10 Appendix A: Netcraft (www.netcraft.com) results on www.sans.org 12 Appendix B: Penetration Testing Tools 14 tu te 20 ,A 11 02 Bibliography 3 3 4 6 7 9 9 sti DETAILS © SA NS In Full name: Chan Tuck Wai GIAC userID: twchan001 Course: Security Essentials Version: First (Original Submission) Conference Location: Malaysia Key fingerprint...

Words: 5638 - Pages: 23

Free Essay

Comparing Soho Hardware Firewalls

...Comparing SOHO Hardware Firewalls Routers As more and more individuals start their own small home businesses and technology is becoming a major part of these businesses, it is just as important that they are able to secure their network from attacks the same as enterprises-level businesses. According to Whitman & Mattord (2011), one of the most effective methods of improving computer security in the Small Office/Home Office (SOHO) setting is a SOHO firewall, which serves as stateful firewalls that enable inside-to-outside and can be configured to allow limited TCP/IP port forwarding and/or screened subnet capabilities (p. 256). This paper will compare the Watchguard Firebox SOHO 6 and the Sonic Wall, which are both VPN router that offers similar specifications. This paper will compare these SOHO firewall products that function as packet-filtering firewalls that offer combine features, and provides SOHO users the strong protection from the use of Network Address translation (NAT) services. Watchguard Firebox SOHO 6 verses SonicWall Watchguard Firebox SOHO 6 is a firewall and VPN router for small business and branch offices that allows the sharing of a single broadband connection, and it is supported by all the leading operating systems. This product includes licenses for 10 users, with an upgrade option for 25 to 50 users. Small office owner often have very little experience managing their office hardware. Therefore, the Watchguard Firebox SOHO 6 is a good chose...

Words: 794 - Pages: 4

Premium Essay

Blank

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. SSL Man-in-the-Middle Attacks TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focuses o... Copyright SANS Institute Author Retains Full Rights AD SSL Man-in-the-Middle Attacks Peter Burkholder February 1, 2002 (v2.0) Abstract TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 configured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focusses...

Words: 6154 - Pages: 25

Premium Essay

Cissp

...COMPLIANCE WHAT’S NEW? AN OVERVIEW 24 24 26 DOMAIN 7: SECURITY OPERATIONS WHAT’S NEW? AN OVERVIEW 28 28 29 DOMAIN 8: PHYSICAL & ENVIRONMENTAL SECURITY WHAT’S NEW? AN OVERVIEW 32 32 33 DOMAIN 9: SECURITY ARCHITECTURE & DESIGN WHAT’S NEW? AN OVERVIEW 36 36 38 DOMAIN 10: TELECOMMUNICATIONS & NETWORK SECURITY WHAT’S NEW? AN OVERVIEW 40 40 41 INFOSEC INSTITUTE’S CISSP BOOT CAMP COURSE OVERVIEW COURSE SCHEDULE 44 44 45 INTRODUCTION (ISC)²’s CISSP Exam covers ten domains which are:           Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal regulations, investigations, and compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications and Network Security Over the course of the this eBook, we’ll take a look at each one of the domains; give you some insight into what (ISC)² is looking for in that area; give you some supplemental reading material; and by the time we’re done, you should have the foundation of the information you’ll need to pass the CISSP exam as well as to succeed in your security professional...

Words: 11687 - Pages: 47

Premium Essay

Books of Ark

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Case Study: Critical Controls that Could Have Prevented Target Breach In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. AD Copyright SANS Institute Author Retains Full Rights Case Study: Critical Controls that Could Have Prevented Target Breach GIAC (GSEC) Gold Certification Author: Teri Radichel, teri@radicalsoftware.com Advisor: Stephen Northcutt Accepted: August 5th 2014 Abstract In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. From what is known about the Target breach, there were multiple factors that led to data loss: vendors were subject to phishing attacks, network segregation was lacking, point of sale systems were vulnerable to memory scraping malware and detection strategies employed by Target failed. A possible...

Words: 8983 - Pages: 36

Premium Essay

Continuity Planning Overview

...Strayer University Continuity Planning Overview CIS-359: Disaster Recovery Management October 29, 2015 Introduction: This paper will briefly expound upon the lead position or manager’s role, of a healthcare company. It will provide a list of responsibilities a business continuity manager is expected to perform, how to build the framework for, and execute a business continuity plan, and also display a chart that pertains to giving a BCP presentation. Explain four high-level activities that aid in the initiation of a viable, business continuity plan. The role of an experienced business continuity manager in a healthcare business must identify and implement all of aspects of the business’, business continuity plan or BCP. To remain in accordance with the BCP, in preparation for disaster, from the start date, while it is in ongoing stages, and also afterward. Business continuity managers, work directly and strategically with the in-house BCM (Business Continuity Management) division, the business owner, and also the BCM’s, guidance and/or steering committee. They are expected to supervise, utilize paramount communication skills, monitoring the efficiency and progress of those team members and/or subordinates, who report directly to the, business continuity manager. In a healthcare environment, an efficient and thorough business continuity leader, structures accountability framework, by working close-knit with the business’ IT department, existing business...

Words: 1125 - Pages: 5