SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Don’t Judge an       by its            ICON




                     Jeff Williams
                         Aspect Security CEO
                             OWASP Chair
                 jeff.williams@aspectsecurity.com
                         twitter @planetlevel
‱ iPhone

‱ Android

‱ tinyURL

‱ installer
http://tinyurl.com/y6ddmqu
BACKER    STANDARD            DETAIL           ENFORCED

Nutrition Facts       Gov’t       Open             Complex*          Mandatory

New Car Labels        Gov’t       Open             Complex*          Mandatory

Movie Ratings         Private    Closed             Simple           Voluntary

Music Labels          Private    Closed             Simple           Voluntary

Television Programs   Private    Closed             Simple           Mandatory

Video Games           Private    Closed             Simple           Voluntary

Drug Facts            Gov’t       Open             Complex*          Mandatory

Energy Guide          Gov’t       Open              Simple*          Mandatory

Smart Choices         Private     Open              Simple*          Voluntary

Smoking               Gov’t       Open             Terrifying        Mandatory

                                          * Leverages significant other standards
USDA - “The Economics of Food Labeling”

‱ Voluntary labels – for promotion

‱ Mandatory labels – fill information gaps

‱ Mandatory labeling may initially have a larger
  impact on manufacturers’ production
  decisions than on consumers’ choices.
Security
             Label
               

               

               





Software                Software
Producers              Consumers
Software Facts
                                         Expected Number of Users 15
                                         Typical Roles per Instance 4


                                         Modules 155              Modules from Libraries 120
                                                              % Vulnerability*
                                         Cross Site Scripting 22         65%
                                              Reflected        12
                                           Stored    10
                                         SQL Injection 2
                                         Buffer Overflow 5                                        95%
                                         Total Security Mechanisms 3
                                         Modularity .035
                                            Cyclomatic Complexity 323
                                         Encryption 3

                                         Authentication 15
                                         Access Control 3
                                         Input Validation 233
                                         Logging 33
                                         * % Vulnerability values are based on typical use scenarios for
                                         this product. Your Vulnerability Values may be higher or lower
                                         depending on your software security needs:
                                                                 Usage           Intranet       Internet
Ingredients: Sun Java 1.5 runtime, Sun   Cross Site Scripting     Less Than         10             5
J2EE 1.2.2, Jakarta log4j 1.5, Jakarta      Reflected
                                            Stored
                                                                  Less Than
                                                                  Less Than
                                                                                    10
                                                                                    10
                                                                                                   5
                                                                                                   5
                                         SQL Injection            Less Than         20             2
Commons 2.1, Jakarta Struts 2.0,         Buffer Overflow          Less Than         20             2
                                         Security Mechanisms                        10            14
Harold XOM 1.1rc4, Hunter JDOMv1            Encryption                               3            15
Hook: Starts          Displays Pop-Ups
Automatically


Dial: Places a Call   Remote Control



Modify: Alters OS     Self-Updates



Monitors you when     Stuck: Cannot be
not active program    Uninstalled
OWASP
                                               OpenSAMM

OWASP T10




http://www.aspectsecurity.com/SecurityFacts/
“Security in Sunshine”
                                     Architects



          Research     Create Security           Define Security
                                                                   Developers
                        Architecture              Requirements



           Monitor                                                  Implement
           Threat                                                    Controls

                               AppSec                                           Infosec
Users
                               Visibility
         Understand
                                Cycle                                 Share
        Stakeholders                                                 Findings




        Business        Understand                     Verify
                                                                       Audit
                           Laws                      Compliance



                                         Legal
Don't Judge a Website by its Icon - Read the Label!

Weitere Àhnliche Inhalte

Ähnlich wie Don't Judge a Website by its Icon - Read the Label!

Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsBlack Duck by Synopsys
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp0224 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02Smals
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdfRavi Aggarwal
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application SecurityJavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application SecurityTheresa Mammarella
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
Why AppSec Matters
Why AppSec MattersWhy AppSec Matters
Why AppSec MattersInnoTech
 
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...VMware Tanzu
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
Neil Tompson - SoftTest Ireland
Neil Tompson - SoftTest IrelandNeil Tompson - SoftTest Ireland
Neil Tompson - SoftTest IrelandDavid O'Dowd
 
Cybersecurity overview - Open source compliance seminar
Cybersecurity overview - Open source compliance seminarCybersecurity overview - Open source compliance seminar
Cybersecurity overview - Open source compliance seminarRogue Wave Software
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingAndris Soroka
 

Ähnlich wie Don't Judge a Website by its Icon - Read the Label! (20)

Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp0224 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application SecurityJavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Why AppSec Matters
Why AppSec MattersWhy AppSec Matters
Why AppSec Matters
 
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Neil Tompson - SoftTest Ireland
Neil Tompson - SoftTest IrelandNeil Tompson - SoftTest Ireland
Neil Tompson - SoftTest Ireland
 
Cybersecurity overview - Open source compliance seminar
Cybersecurity overview - Open source compliance seminarCybersecurity overview - Open source compliance seminar
Cybersecurity overview - Open source compliance seminar
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 

Mehr von Dinis Cruz

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)Dinis Cruz
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceDinis Cruz
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019Dinis Cruz
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data scienceDinis Cruz
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyDinis Cruz
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Dinis Cruz
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityDinis Cruz
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsDinis Cruz
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)Dinis Cruz
 
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6 (OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6 Dinis Cruz
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)Dinis Cruz
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)Dinis Cruz
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Dinis Cruz
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)Dinis Cruz
 
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Dinis Cruz
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th febDinis Cruz
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th febDinis Cruz
 

Mehr von Dinis Cruz (20)

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data science
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
 
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6 (OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)
 
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th feb
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
 

KĂŒrzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

KĂŒrzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Don't Judge a Website by its Icon - Read the Label!

  • 1. Don’t Judge an by its ICON Jeff Williams Aspect Security CEO OWASP Chair jeff.williams@aspectsecurity.com twitter @planetlevel
  • 2. ‱ iPhone ‱ Android ‱ tinyURL ‱ installer
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. BACKER STANDARD DETAIL ENFORCED Nutrition Facts Gov’t Open Complex* Mandatory New Car Labels Gov’t Open Complex* Mandatory Movie Ratings Private Closed Simple Voluntary Music Labels Private Closed Simple Voluntary Television Programs Private Closed Simple Mandatory Video Games Private Closed Simple Voluntary Drug Facts Gov’t Open Complex* Mandatory Energy Guide Gov’t Open Simple* Mandatory Smart Choices Private Open Simple* Voluntary Smoking Gov’t Open Terrifying Mandatory * Leverages significant other standards
  • 17. USDA - “The Economics of Food Labeling” ‱ Voluntary labels – for promotion ‱ Mandatory labels – fill information gaps ‱ Mandatory labeling may initially have a larger impact on manufacturers’ production decisions than on consumers’ choices.
  • 18. Security Label 
 
 
 Software Software Producers Consumers
  • 19. Software Facts Expected Number of Users 15 Typical Roles per Instance 4 Modules 155 Modules from Libraries 120 % Vulnerability* Cross Site Scripting 22 65% Reflected 12 Stored 10 SQL Injection 2 Buffer Overflow 5 95% Total Security Mechanisms 3 Modularity .035 Cyclomatic Complexity 323 Encryption 3 Authentication 15 Access Control 3 Input Validation 233 Logging 33 * % Vulnerability values are based on typical use scenarios for this product. Your Vulnerability Values may be higher or lower depending on your software security needs: Usage Intranet Internet Ingredients: Sun Java 1.5 runtime, Sun Cross Site Scripting Less Than 10 5 J2EE 1.2.2, Jakarta log4j 1.5, Jakarta Reflected Stored Less Than Less Than 10 10 5 5 SQL Injection Less Than 20 2 Commons 2.1, Jakarta Struts 2.0, Buffer Overflow Less Than 20 2 Security Mechanisms 10 14 Harold XOM 1.1rc4, Hunter JDOMv1 Encryption 3 15
  • 20. Hook: Starts Displays Pop-Ups Automatically Dial: Places a Call Remote Control Modify: Alters OS Self-Updates Monitors you when Stuck: Cannot be not active program Uninstalled
  • 21.
  • 22.
  • 23.
  • 24. OWASP OpenSAMM OWASP T10 http://www.aspectsecurity.com/SecurityFacts/
  • 25.
  • 26. “Security in Sunshine” Architects Research Create Security Define Security Developers Architecture Requirements Monitor Implement Threat Controls AppSec Infosec Users Visibility Understand Cycle Share Stakeholders Findings Business Understand Verify Audit Laws Compliance Legal

Hinweis der Redaktion

  1. Key MessagesI’ve witnessed the transformative power of visibilityNutrition facts labels have transformed the food marketCompanies will voluntarily use labels that help them market their productMandatory labels add ____Internal Use of Labels!Liability?Certification?Maturity Models?
  2. Akerlof.ASecurityFacts label helps to solve this information assymmetry.
  3. Nutrition Facts1906 - Food “misbranding” legislation goes back to 1906 era – just after Coca Cola removed cocaine from their product. more legislation Upton Sinclair’s “The Jungle”.1950 – the first mandatory labeling regime was created for Margarine.1958 -- you had to declare all additives.1990 – Nutrition Labeling and Education Act (NLEA) passed. Basically today’s Nutrition Facts label1990’s -- Several updates including trans fatGovernment sponsored MANDATORY label with lots of detail – it leverages other standards (US RDA)
  4. Car labels1958 - The Monroney sticker — as it is called in the auto industry — is named for the late Almer Stillwell "Mike" Monroney, a senator from Oklahoma who sponsored the federal Automobile Information Disclosure Act in 1958. This statute requires that a sticker be affixed to the side window or windshield of every new car sold in the United States. While the law does not specifically mandate Monroney stickers for some trucks, automakers affix them across their entire vehicle lineups. Failure to display one can result in a fine of $10,000 per vehicle to the dealership.Mandatory government label with lots of detail (leverages EPA and NHTSA standards)“The dealer who is honest about the so-called ‘list price’ cannot compete with the one who ‘packs’ several hundred dollars extra into it so he can pretend to give you more on your trade-in,” Monroney said when the bill was introduced in March 1958“He believed in getting information out,” The sticker must include the following information:The manufacturer's suggested retail price (MSRP)Engine and transmission specificationsStandard equipment and warranty detailsOptional equipment and pricingCity and highway fuel economy ratings, as determined by the Environmental Protection Agency (EPA)As of September 2007, crash test ratings as determined by the National Highway Traffic Safety Administration
  5. 1930 – the “Hays Code”1968 - the voluntary MPAA file rating system was established with three groups to monitor. There were some changes over the years – most importantly adding PG-13. Many have accused the standards of slipping.GOAL: Movie ratings do not determine whether a film is "good" or "bad." They simply provide basic information to parents about the level of various elements in the film, such as sex, violence and language so that parents can decide what their children can and cannot see.Voluntary Closed standard, very simpleIt’s private, non-standard, completely closed, anonymous, not the lawIt’s totally voluntary – however all the major studios have agreed to submit all their movies.No specific guidelines, just factors like 
“The MPAA does not release specific guidelines as to what content will receive which rating. However, they do state that many factors are considered including content such as sex, violence, nudity, language, adult topics and drug use.”
  6. 1985 - Albums began to be labeled for "explicit lyrics" in 1985, after pressure from the Parents Music Resource Center (PMRC).2000, the PMRC worked with the RIAA to standardize the label, creating the now-familiar black and white design. Tweaked fonts and wording as late as 2001.MANDATE: Voluntary, No agreed on standards, very simpleIn some cases, the stickers appear to have had the reverse effect to what was intended—the sticker can make an album more desirable, and the sticker has been called the musical equivalent of an "alcohol content" label. Indeed, the PAL notice itself has achieved a degree of cult status, with comedian George Carlin entitling an album Parental Advisory: Explicit Lyrics and numerous t-shirts[1], metal signs, and other paraphernalia bearing the logo.It is not a rating; there are no agreed-upon standards for a parental advisory label. It is the record company's decision whether an album needs one or not.
  7. 1997 the broadcasting industry created the TV Parental Guidelines to forestall regulation. The TV Parental Guidelines Monitoring Board is responsible for ensuring there is as much uniformity and consistency in applying the Parental Guidelines as possible and is comprised of experts from the television industry and public interest advocates.Voluntary (gov’t influenced) closed standard, very simple labelThe rating system, TV Parental Guidelines, was established in 1997 by the National Association of Broadcasters, the National Cable Television Association, and the Motion Picture Association of America. Modeled after the rating system used for movies, the TV rating system focuses on age recommendations. TIED into a technical control!! The V-Chip. The V-chip is a technology that lets parents block television programming they don't want their children to watch. The V-Chip electronically reads television-programming ratings and allows parents to block programs they believe are unsuitable for their children. (Ratings appear in the corner of your television screen during the first 15 seconds of a program and in TV programming guides). This rating is encoded into the program, and the V-chip technology reads the encoded information and blocks shows accordingly. Using the remote control, parents can program the V-chip to block certain shows based on their ratings.Imagine a software security control that prevents my mom from using any software that isn’t really secure.
  8. When games moved from 8 bit to 16 bit the violence got a LOT more realistic.1994 formed after 2 years of Congressional hearings on video game violence – to forestall legislation.Voluntary standard (gov’t influenced) enforced by ESRB – very simple labelEntertainment Safety Ratings Board (ESRB) – Self regulatory organization (SRO) – no legal authority requiredAim is to guide consumers in determining a games suitabilityStrictly voluntary, but virtually universal
  9. Project started took 14 years before finishing in 1999. Now it applies to over 100,000 products.Summary for the safe and effective use of the drugInformative and accurateNot promotional, false, or misleadingNo implied claims or suggestions for use if evidence of safety or effective is lacking Based whenever possible on data derived from human experience Mandatory Govt Label – complex informationNot for patients! Primary purpose is to give healthcare professionals the information they need to prescribe drugs appropriatelyThe Food and Drug Administration (FDA) requires that drug labeling be balanced and not misleading. The label must be scientifically accurate and provide clear instruction to health care practitioners for prescription drugs and to consumers for over-the-counter drugs and supplements. Labeling regulations require that the statement of ingredients must include all ingredients, in the order in which they are used in the drug. These ingredients must also be identified by their established name.
  10. FTC – weird
 FTC doesn’t set environmental policy or standardsMandatorygovt label, open standard, pretty simpleGoal: To help consumersDepends on EPA EnergyStar requirements, DOE Energy Test Procedures1980 – Some appliances required to use sticker2007 – New EnergyGuide label design after 2 years of rulemaking, focus groups, interviews, lots of alternative designs
  11. 2003 The FDA announced industry can now rely on “Some scientific evidence” or “Very limited and preliminary scientific research” to make a health claim. Opponents criticize it as opening the door to ill-founded claims. Advocates believe it will make more information available to the public.Voluntary Industry label, open standard, simple label2004 starts a stream of companies who are ADVERTISING nutrition – Pepsi, Kraft, Hannaford Supermarkets, Kellogs, Mars.2008 – “Smart Choices” - pan-industry for front of package consumer information – General Mills, Con-Agra, Coca-Cola, PepsiCo, and Unilever launched in 2009. Froot Loops becomes the poster child for industry led rating systems. “These are horrible choices,” said Walter C. Willett, chairman of the nutrition department of the Harvard School of Public Health. He said the criteria used by the Smart Choices Program were seriously flawed, allowing less healthy products, like sweet cereals and heavily salted packaged meals, to win its seal of approval. “It’s a blatant failure of this system and it makes it, I’m afraid, not credible,” Mr. Willett said
  12. Cigarettes1966 - Caution: Cigarette Smoking May be Hazardous to Your Health (1966–1970)1970 – 1985 Warning: The Surgeon General Has Determined that Cigarette Smoking is Dangerous to Your Health (1970–1985)SURGEON GENERAL'S WARNING: Smoking Causes Lung Cancer, Heart Disease, Emphysema, And May Complicate Pregnancy. (1985-)SURGEON GENERAL'S WARNING: Quitting Smoking Now Greatly Reduces Serious Risks to Your Health. (1985-)SURGEON GENERAL'S WARNING: Smoking By Pregnant Women May Result in Fetal Injury, Premature Birth, And Low Birth Weight. (1985-)SURGEON GENERAL'S WARNING: Cigarette Smoke Contains Carbon Monoxide. (1985-)Though the United States started the trend of labeling cigarette packages with health warnings, today the country has one of the smallest, least prominent warnings placed on their packages.[18] Warnings are usually in small typeface placed along one of the sides of the cigarette packs with colors and fonts that closely resemble the rest of the package, so the warnings essentially are integrated and do not stand out with the rest of the cigarette package.However, this is subject to change as the Family Smoking Prevention and Tobacco Control Act of 2009 requires color graphics with supplemental text that depicts the negative consequences of smoking to cover 50 percent of the front and rear of each pack. The U.S. Food and Drug Administration will design the health warnings in 2011, and tobacco companies will begin to include them on their cigarette packaging and advertisements in 2012. One alternative many consumers are recommending is detachable graphic warning labels taped to the front of the pack or warning labels printed onto the plastic wrapping itself, so that the message still legally gets across, while people can choose to take it off when they purchase it.
  13. Every combination ofGov’t vs. PrivateOpen vs. ClosedSimple vs. ComplexMandatory vs. Voluntary
  14. 2002
  15. 2003 - Garfield Simpson labels as part of Pure Software Act
  16. Testing and Disclosure policy labels
OWASP Open Security Program – Fully open code review and open testing + full disclosureOWASP Shared Security Program – Open testing + responsible disclosureOWASP Private Security Program – Staged Testing + private disclosureOWASP “Trust Us” Insecurity Program – No testing + no disclosure
  17. Thefirst thing we have to do is create visibility. Once we’ve captured what we know, people can start to poke holes in it. Which will encourage others to think up solutions. If you are working on a software project, what can you do to make security visible? Do you have a clear threat model and security architecture? Do you have coding patterns for using security controls?Unless we make security concrete and visible, we won’t be able to make improvements and everything we do will be forgotten when the next new thing comes along.Security ecosystemscan’t evolve without sunshine.