1.应用软件安全基础.ppt
《1.应用软件安全基础.ppt》由会员分享,可在线阅读,更多相关《1.应用软件安全基础.ppt(49页珍藏版)》请在三一办公上搜索。
1、软件安全基础-Develop Security Software,主讲人:王 宏,主 题,基本概念.软件安全的重要性.分析软件安全越来越严重的原因和根源.解决软件安全问题的措施和方法.,基本概念,软件安全的定义:在软件受到恶意的攻击下,软件能够正常运行(功能/性能)软件安全课题:了解产生软件安全的风险并怎样去管理他们:“Building secure software:designing software to be secure,make sure that software is secure,educating software developers,architects and use
2、rs about how to build security in”,软件安全的重要性,信息安全的期望信息安全的现状软件安全漏洞的发展趋势传统解决信息安全的努力和投资方向软件安全在信息安全中的重要地位,信息安全的期望,在原理上:我们花更多钱去降低的安全事件和安全利用,以此来帮助我们:,保护我们的业务不会被恶义的家伙破坏”限制责任和义务,满足法规和标准避免对公司品牌和声誉造成破坏,info-sec spending($),incidents&exploits(#),然而在事实上:我们每年都花了数百万的资金在信息安全上,但是效果并不如意,我们遭遇的安全问题越来越多.,breaches grow d
3、ramatically-seriously impacting:uptime,regulatory compliance,liability,brand and reputation,信息安全的现状,分析机构的最近统计,In 2004,average time from vulnerability announcement to 1st attack=5.8 days(99 days,2003)532%increase in CERT incidents reported(2000-2003)43%report an increase in e-crimes and intrusions ve
4、rsus previous year On average,48 new vulnerabilities per week were disclosed in 1H04These four factoids are just a sampling of results found by the FBI,Carnegie Mellons SEI CERT Coordination Center(an industry body that focuses on alerting corporations of security vulnerabilities),and Symantec in it
5、s 5th Internet Security Threat Report(Jan-June 2004).,软件安全漏洞的发展趋势,CERT 2006年的报告,我们的钱花在哪儿去了?为什么我们的安全工作毫无效果?,Why?,传统信息安全的方法和投资方向,The experts are telling us:we have a SOFTWARE problem,“Over 70%of security vulnerabilities exist at the application layer,not the network layer.Its not just operating system
6、s or web browsers,but all types of applications-particularly applications that automate key business processes.”Gartner Group 2004,软件安全在信息安全中的重要地位,结 论,目前我们信息安全的主要问题是:应用软件安全问题!,软件安全越来越严重的原因,为什么软件安全问题日益增长黑客攻击方式的进化传统的分层保护方案减轻系统的风险为什么传统的基于网络的方案不工作黑客可直接利用软件的弱点达到攻击系统演示如何通过攻击软件达到窃取商业信息和破坏应用系统。软件必须保护它们自己传统学
7、校关于安全技术的教育软件补丁和软件安全攻击的关系软件安全的根源问题。,为什么软件安全问题增长,Connectivity(互联性)Extensibility(延展性)Complexity(复杂性),为什么软件安全问题变得如此困难?,ConnectivityThe Internet is everywhere and most software is on itComplexityNetworked,distributed,mobile code is hardExtensibilitySystems evolve in unexpected ways and are changed on the
8、 fly,This simple interface,is this complex program,.NET,1980,1985,1990,1995,2000,黑客攻击方式的进化,Password Guessing,Self-Replicating Code,Password Cracking,Exploiting Known Vulnerabilities,Burglaries,Hijacking Sessions,Networked Management Diagnosis,GUI,Automated Probes/Scans,www Attacks,Distributed Attack
9、 Tools,Staged Attack,Attack Sophistication,Intruder Knowledge,LOW,HIGH,1980,1985,1990,1995,2000,Disabling Audits,Back Doors,Sweepers,Sniffers,Packet Spoofing,Denial of Service,“Stealth”/Advanced Scanning Techniques,Cross-Site Scripting,传统的“加层”保护方案,Hackers,Worms&Viruses,Malicious Insiders,软件的应用因为业务和功
10、能的需要必须打破传统的保护层,直接与外面的系统交互,Web Facing Applications,Legacy App Integration,Connectivity w/Partners&Suppliers,Outsourcing,Employee Self-Service,为什么传统的基于网络方案不工作,KeyNetworkWebRestrict AccessFirewallEveryone has accessAuthenticate usersWindows/Unix authHTTP has WEAK authentication,Monitor for attacksIDS/I
11、PSCritical traffic is in SSL TunnelTrack users(state)User of TCP/IP connectionsHTTP is statelessBlock known attacksIPS(Self-defending networks)Web attacks are extremely hard to distinguish from normal activity,Internet,DMZ,Trusted Inside,Corporate Inside,HTTP(S),IMAP FTPSSH TELNETPOP3,Firewall only
12、allows PORT 80(or 443 SSL)traffic from the Internet to the web server.Any Web Server:80,Firewall only allows applications on the web server to talk to application server.,Firewall only allows application server to talk to database server.,IISSunOneApache,ASP.NETWebSphereJava,SQLOracleDB2,软件易于遭受的安全弱点
13、:SQL Injections Buffer Overflows Information Leakage Other Categories 软件安全弱点的底线:Operations,Availability Compliance Credibility,Reputation,黑客直接利用软件的弱点攻击我们的系统,演示如何通过攻击应用系统达到窃取商业信息和破坏应用系统,使用的攻击方式:SQL Injection Cross-Site Scripting Privacy Violation Forceful Browsing,演 示 攻 击,软件必须自我保护,Outside:,Source IPD
14、estination IPFragmented dataHTTP requests?,Inside,User sessionsSQL queriesApplication variablesHistorical patterns,Inside,软件必须自我保护,Outside:,传统学校关于安全技术的教育的原则:用防火墙来定义系统的”边界”,把软件与外界隔离.过分依赖加密技术 SSLsecure lock on a paper bag!当产品要发布的时候才去审查产品在这个阶段所做的都是“Why did we do this like this?”我们将以补丁(patch)的方式修复它.我们已经
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 应用软件 安全 基础
链接地址:https://www.31ppt.com/p-5307849.html