




已閱讀5頁(yè),還剩53頁(yè)未讀, 繼續(xù)免費(fèi)閱讀
版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
Session: Essentials of Application Security 應(yīng)用系統(tǒng)安全內(nèi)幕,鐘衛(wèi) 微軟公司,Session Overview 概述,The Importance of Application Security 應(yīng)用系統(tǒng)安全的重要性 Secure Application Development Practices 開(kāi)發(fā)安全的系統(tǒng)的實(shí)踐 Security Technologies 可用的安全技術(shù) Secure Development Guidelines 開(kāi)發(fā)安全應(yīng)用的指導(dǎo),Session Prerequisites 課程的要求,Development experience with Microsoft Visual Basic, Microsoft Visual C+, or C# 在Visual Basic, Microsoft Visual C+, or C#有實(shí)際的開(kāi)發(fā)經(jīng)驗(yàn) Internet user experience Internet 用戶(hù),Level 200,The Importance of Application Security 應(yīng)用程序安全的重要性,The Importance of Application Security 應(yīng)用系統(tǒng)安全的重要性 Secure Application Development Practices 開(kāi)發(fā)安全的系統(tǒng)的實(shí)踐 Security Technologies 可用的安全技術(shù) Secure Development Guidelines 開(kāi)發(fā)安全應(yīng)用的指導(dǎo),Trustworthy Computing 可信計(jì)算,“Trustworthy Computing has four pillars: Reliability means a computer system is dependable, is available when needed, and performs as expected and at appropriate levels. Security means a system is resilient to attack, and the confidentiality, integrity, and availability of both the system and its data are protected. Privacy means that people can control their personal information and organizations that use the information faithfully protect it. Business integrity is about companies in our industry being responsible to customers and helping them find appropriate solutions for their business issues, addressing problems with products or services, and being open in interactions with customers.”,Bill Gates July 18, 2002,Common Types of Attacks 常見(jiàn)的攻擊類(lèi)型,Examples of Security Intrusions 安全侵入的例子,CodeRed ILoveYou Nimda,Consequences of Poor Security 低安全級(jí)別會(huì)引發(fā)的一些問(wèn)題,Stolen intellectual property 知識(shí)產(chǎn)權(quán)被竊取 System downtime 系統(tǒng)停滯 Lost productivity 系統(tǒng)效率低下 Damage to business reputation 損害了公司的商業(yè)信譽(yù) Lost consumer confidence 喪失客戶(hù)的信心 Severe financial losses due to lost revenue 導(dǎo)致嚴(yán)重的經(jīng)濟(jì)損失,Challenges When Implementing Security 我們?cè)谔岣邞?yīng)用安全時(shí)遇到的挑戰(zhàn),The Developer Role in Application Security 作為一個(gè)開(kāi)發(fā)人員在系統(tǒng)安全的責(zé)任,Developers must: 開(kāi)發(fā)者必須: Work with solution architects and systems administrators to ensure application security 與架構(gòu)師和系統(tǒng)管理員一起商討系統(tǒng)的安全性問(wèn)題 Contribute to security by: 會(huì)給系統(tǒng)安全帶來(lái)的好處 Adopting good application security development practices 采用開(kāi)發(fā)安全應(yīng)用的一些策略 Knowing where security issues occur and how to avoid them 知道安全問(wèn)題會(huì)發(fā)生在什么地方以及如何避免 Using secure programming techniques 提高編寫(xiě)安全代碼的技巧,Secure Application Development Practices 開(kāi)發(fā)安全應(yīng)用的實(shí)踐,The Importance of Application Security 應(yīng)用系統(tǒng)安全的重要性 Secure Application Development Practices 開(kāi)發(fā)安全的系統(tǒng)的實(shí)踐 Security Technologies 可用的安全技術(shù) Secure Development Guidelines 開(kāi)發(fā)安全應(yīng)用的指導(dǎo),Holistic Approach to Security 安全的整體性考慮,“Security is only as good as the weakest link” 安全只不過(guò)是最薄弱的一個(gè)環(huán)節(jié),Security Throughout Project Lifecycle 項(xiàng)目生命周期各個(gè)環(huán)節(jié)的安全問(wèn)題,The SD3 Security Framework SD3安全框架,Threat Modeling 威脅建模,Threat modeling is: A security-based analysis of an application 對(duì)于應(yīng)用程序的安全分析 A crucial part of the design process 設(shè)計(jì)過(guò)程中至關(guān)重要的環(huán)節(jié) Threat modeling: Reduces the cost of securing an application 減少應(yīng)用程序的安全隱患 Provides a logical, efficient process 規(guī)定一個(gè)合理有效的流程 Helps the development team:幫助開(kāi)發(fā)組 Identify where the application is most susceptible 幫助分析判斷系統(tǒng)最容易受到攻擊的環(huán)節(jié) Determine which threats require mitigation and how to address those threats 決定如何降低被攻擊的風(fēng)險(xiǎn)和如何定位攻擊,Ongoing Education 不斷的學(xué)習(xí),Provide training about: 預(yù)防攻擊需要學(xué)習(xí)的東西 How security features work 安全策略是怎樣工作的 How to use the security features to build secure systems 怎樣應(yīng)用安全策略構(gòu)建安全系統(tǒng) What security issues look like in order to identify flawed code 不同的安全問(wèn)題暴是因?yàn)楹畏N缺陷代碼引起的 How to avoid common security issues 如何避免常見(jiàn)的安全問(wèn)題 How to avoid repeating mistakes 如何避免常見(jiàn)的錯(cuò)誤,Input Validation 輸入校驗(yàn),Buffer overruns 緩沖區(qū)溢出 SQL injection 數(shù)據(jù)庫(kù)輸入 Cross-site scripting 跨網(wǎng)站指令碼攻擊,“All input is evil until proven otherwise!”,Buffer Overruns 緩沖區(qū)溢出,Practices for Improving Security 提高應(yīng)用程序安全的各種實(shí)踐,Security Technologies 安全技術(shù),The Importance of Application Security 應(yīng)用系統(tǒng)安全的重要性 Secure Application Development Practices 開(kāi)發(fā)安全的系統(tǒng)的實(shí)踐 Security Technologies 可用的安全技術(shù) Secure Development Guidelines 開(kāi)發(fā)安全應(yīng)用的指導(dǎo),Overview of Security Technologies 安全技術(shù)概要,Developers need to use and apply: 開(kāi)發(fā)者常常需要下面的一些安全手段 Encryption 加密 Hashing 哈希(散列) Digital signatures 數(shù)字簽名 Digital certificates 數(shù)字證書(shū) Secure communication 安全的通訊方式 Authentication 身分認(rèn)證 Authorization 授權(quán) Firewalls 防火墻 Auditing 審核 Service packs and updates 補(bǔ)丁和更新,Encryption 加密,Encryption is the process of encoding data: 加密是對(duì)數(shù)據(jù)的重新編碼的過(guò)程 To protect a users identity or data from being read 保護(hù)用戶(hù)數(shù)據(jù)被任意讀取 To protect data from being altered 百戶(hù)用戶(hù)數(shù)據(jù)被任意修改 To verify that data originates from a particular user (non-repudiation) 驗(yàn)證數(shù)據(jù)來(lái)源于特定的用戶(hù) Encryption can be: 加密的方式 Asymmetric 不對(duì)稱(chēng)形式 Symmetric 對(duì)稱(chēng)形式,Symmetric vs. Asymmetric Encryption 對(duì)稱(chēng)性加密 vs 非對(duì)稱(chēng)性加密,User B,User A,Data,Data,Hash Value,Hash Algorithm 哈希算法,Data,Hash Value,Hash Value,Hash Algorithm 哈希算法,If hash values match, data is valid 如果生成的hash值和有A傳過(guò)的hash匹配的話(huà),說(shuō)明數(shù)據(jù)真實(shí),User A sends data and hash value to User B,Verifying Data Integrity with Hashes 使用哈希驗(yàn)證數(shù)據(jù)完整性,User B,User A,Data,Hash Value,Hash Algorithm,User A Private Key 私鑰,Data,Hash Value,User A Public Key 公鑰,Hash Algorithm,Hash Value,If hash values match, data came from the owner of the private key and is valid,Digital Signatures 數(shù)字簽名,How Digital Certificates Work 數(shù)字證書(shū)的工作流程,Private Key,Private/Public Key Pair 私鑰/公鑰對(duì),User 用戶(hù),Application 應(yīng)用程序,Computer 計(jì)算機(jī),Service 服務(wù),Certified Administrator 鑒定管理員,Certification Authority 證書(shū)認(rèn)證,Public Key,Secure Communication Technologies 安全的通訊方式技術(shù),Technologies include: IPSec SSL TLS RPC encryption,Secure Communication How IPSec Works 安全的通訊方式IPSec,Secure Communication How SSL Works 安全的通訊方式SSL,SSL 服務(wù)器證書(shū),Viewing a Web Site on a Non-Secure Server 察看一個(gè)無(wú)證書(shū)認(rèn)證的web站點(diǎn) Generating a Certificate Request 生成一個(gè)證書(shū)申請(qǐng) Requesting a Trial Certificate 請(qǐng)求一個(gè)臨時(shí)證書(shū) Installing the SSL Certificate 安裝證書(shū) Testing the SSL Certificate 測(cè)試SSL認(rèn)證,Verifies the identity of a principal by: Accepting credentials Validating those credentials Secures communications by ensuring that your application knows who the caller is,Encrypting the data is not enough! 僅僅對(duì)于數(shù)據(jù)的加密是不夠的!,Authentication Purpose of Authentication 身份認(rèn)證身份認(rèn)證的作用,Authentication Authentication Methods 身份認(rèn)證身份認(rèn)證方式,Basic 基本 Digest 摘要 Digital signatures and digital certificates 數(shù)字簽名和數(shù)字證書(shū) Integrated 集成 The Kerberos version 5 protocol NTLM Microsoft Passport 微軟Passport Biometrics 生物認(rèn)證,Authentication Basic Authentication 身份認(rèn)證基本認(rèn)證,Is simple but effective 簡(jiǎn)單有效 Is supported by all major browsers and servers 所有主要的瀏覽器和 服務(wù)期都支持 Is easy to program and set up 簡(jiǎn)單編程就能建立 Manages user credentials 管理用戶(hù)信任級(jí)別 Requires SSL/TLS 需要SSL/TLS支持,Authentication How Digest Authentication Works 身份認(rèn)證數(shù)字認(rèn)證的工作流程,Authentication Client Digital Certificates 身份認(rèn)證客戶(hù)端數(shù)字證書(shū),Used in Web applications web應(yīng)用 Server secures communications using SSL/TLS with a X.509 server certificate 服務(wù)器 Server authenticates clients using data in client X.509 certificate, if required Certificate authority issues a certificate for which the server holds a root certificate Used in distributed applications 分布式應(yīng)用 Application uses SSL/TLS communication channel 應(yīng)用程序使用SSL/TLS信道 Client and server applications authenticate using certificates 客戶(hù)端與服務(wù)器端均使用證書(shū) Can be deployed on smart cards 可以部署于職能卡,Authentication When to Use Integrated Authentication 身份認(rèn)證何時(shí)使用集成認(rèn)證,Authentication How to Use Kerberos Version 5 身份認(rèn)證如何使用Kerberos Version 5,演示3IIS認(rèn)證方式,Using Anonymous Authentication 使用密名認(rèn)證 Using Basic Authentication 使用基本認(rèn)證 Using Integrated Windows Authentication 使用集成認(rèn)證,Authorization What is Authorization? 授權(quán)什么是授權(quán),Authorization:授權(quán) Occurs after your client request is authenticated 發(fā)生于客戶(hù)端請(qǐng)求驗(yàn)證之后 Is the process of confirming that an authenticated principal is allowed access to specific resources 確認(rèn)身份驗(yàn)證之后對(duì)于資源的訪(fǎng)問(wèn)權(quán)限 Checks rights assigned to files, folders, registry settings, applications, and so on 察看訪(fǎng)問(wèn)文件,文件夾,注冊(cè)表,應(yīng)用程序等的權(quán)限 Can be role-based 可以基于角色 Can be code-based 可以基于代碼,Authorization Common Authorization Techniques授權(quán)常見(jiàn)的授權(quán)技術(shù),IIS Web permissions (and IP/DNS restrictions) IISweb訪(fǎng)問(wèn)權(quán)限 .NET role-based security .net 基于角色的安全 .NET code-access security .net 基于代碼的安全 NTFS access control lists (ACLs) NTFS訪(fǎng)問(wèn)控制列表 SQL Server logons SQL 登陸 SQL Server permissions SQL訪(fǎng)問(wèn)權(quán)限,Authorization Impersonation/Delegation Model,Client identity is used to access downstream resources,Authorization Trusted Subsystem Model 授權(quán)可信子系統(tǒng)模型,Clients are mapped to roles 客戶(hù)端映射到角色 Dedicated Windows service accounts are used for each role when accessing downstream resources 當(dāng)用戶(hù)需要訪(fǎng)問(wèn)資源時(shí),賬戶(hù)服務(wù)被啟動(dòng),演示4:可信子系統(tǒng)模型的認(rèn)證技術(shù),Reviewing the Application 回顧Application Setting Authentication on the Web Server 設(shè)置Web Server的認(rèn)證方式 Using Service Accounts on the Web Server 在Web Server使用賬戶(hù)服務(wù),Firewalls 防火墻,Firewalls can provide: Secure gateway to the Internet for internal clients 保護(hù)客戶(hù)端的網(wǎng)關(guān) Packet filtering 信息包過(guò)濾 Circuit-level filtering 不斷循環(huán)的過(guò)濾 Application filtering 應(yīng)用過(guò)濾 Auditing 審核 Firewalls cannot provide: Protection against application-level attacks over HTTP or HTTPS 提供應(yīng)用程序在HTTP or HTTPS抵御攻擊的能力,Auditing 審核,Auditing actions include tracking: Resource access and usage Successful and unsuccessful logon attempts Application failures Auditing benefits include: Help for administrators to detect intrusions and suspicious activities Traceability for legal, non-repudiation disputes Diagnosis of security breaches,Service Packs and Updates 補(bǔ)丁和更新,Secure Development Guidelines,The Importance of Application Security 應(yīng)用系統(tǒng)安全的重要性 Secure Application Development Practices 開(kāi)發(fā)安全的系統(tǒng)的實(shí)踐 Security Technologies 可用的安全技術(shù) Secure Development Guidelines 開(kāi)發(fā)安全應(yīng)用的指導(dǎo),Proactive Security Development,Integrate security improvements throughout the development process 講安全整合到開(kāi)發(fā)的過(guò)程中去 Focus on security and ensure that your code can withstand new attacks 關(guān)注安全問(wèn)題,確保您的代碼抵御攻擊的能力 Promote the key role of education 加強(qiáng)關(guān)鍵人員的學(xué)習(xí) Raise awareness within your team 提高各團(tuán)隊(duì)的安全意識(shí) Learn from your mistakes and from the mistakes of others 從自己或他人的錯(cuò)誤中吸取教訓(xùn),Windows XP SP2 Advanced Security Technologies,Network protection 網(wǎng)絡(luò)的保護(hù) Memory protection 內(nèi)存的保護(hù) Safer e-mail handling 更加安全處理郵件 More secure browsing 更加安全的訪(fǎng)問(wèn) Improved computer maintenance Protection from internal threats 提高了應(yīng)對(duì)攻擊的手段 Get more information on Windows XP Service Pack 2 at /sp2preview,Client Firewall turned on by default 客戶(hù)端windows防火墻,Closes ports that are not in use Reduces
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 安全知識(shí)法試題及答案
- 2025年電動(dòng)汽車(chē)電池?zé)峁芾硐到y(tǒng)熱管理效率優(yōu)化與創(chuàng)新研究報(bào)告
- 安全技能比武試題及答案
- 安全工作教育試題及答案
- 物業(yè)品質(zhì)培訓(xùn)課件目錄
- 魔鏡檢測(cè)皮膚培訓(xùn)課件
- 重疾保險(xiǎn)培訓(xùn)課件
- 《編制說(shuō)明蒙農(nóng)1號(hào)蒙古冰草提純復(fù)壯技術(shù)規(guī)程》
- 中班家園共育課件
- 冬季生產(chǎn)安全培訓(xùn)
- 學(xué)術(shù)論文寫(xiě)作規(guī)范與技巧課件
- 生物高中-基于大數(shù)據(jù)分析的精準(zhǔn)教學(xué)課件
- 工程結(jié)算審計(jì)實(shí)施方案(共8篇)
- 樂(lè)東221氣田投產(chǎn)專(zhuān)家驗(yàn)收匯報(bào)
- 信任五環(huán)(用友營(yíng)銷(xiāo)技巧)課件
- 2022年廣東省深圳市中考化學(xué)真題試卷
- 危險(xiǎn)貨物道路運(yùn)輸安全生產(chǎn)管理制度
- GB∕T 8110-2020 熔化極氣體保護(hù)電弧焊用非合金鋼及細(xì)晶粒鋼實(shí)心焊絲
- 【完美排版】山東科技出版社二年級(jí)下冊(cè)綜合實(shí)踐活動(dòng)教案
- 制造業(yè)成本核算表格(有自動(dòng)計(jì)算的公式)
- 公共政策學(xué)(第三版)-課件
評(píng)論
0/150
提交評(píng)論