Monday 22 June 2015

Why are there still so many website vulnerabilities?

The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.

CSO Magazine traverses the treacherous terrain of the massive security craters present in today’s websites. Find out what it takes to fix these holes from the start and throughout the development life cycle.
So many Website security punctures and protrusions

“The primary cause for constant and recurring website (and web application) vulnerabilities is the heavily-modified to fully custom-developed nature of these technologies,” says David J. Venable, CISSP, director, Masergy Communications & former intelligence collector, the NSA. The result is largely untested sites and applications that do not undergo the same rigorous and thorough testing that most commercial software packages such as operating systems and server packages do.
Lost in the clouds: Your private data has been indexed by Google

In fact, more vulnerabilities appear in websites and web applications than just about anywhere else in the enterprise. These security holes crop up in .PHP sites, third-party and homegrown software, and WordPress code and installations as well as in OpenSSL, Single Sign-On, and SQL and LDAP implementations and technologies.

PHP sites that use third-party software present inherent vulnerabilities due to the fact that third-party application development is out of the hands of the afflicted enterprise. “You can design your site so that all of your home-baked code is perfectly secure, but then if you rely on third-party software for anything, you inherit any vulnerability that might exist in it,” says Joe Sremack, director, Berkeley Research Group.
ADVERTISING

WordPress is a growing problem as sites that represent small to midsize enterprises increasingly incorporate it along with its countless plug-ins that require constant updating. “Companies want the WordPress functionality but unfortunately the risk also comes with it,” says Sremack.

OpenSSL is continuously running into trouble. As people innovate improvements to the technology, those innovations create new vulnerabilities that attackers discover and exploit. Attackers continue to exploit OpenSSL vulnerabilities new and old as part of large breaches a few times a year. Many seemingly new holes were actually old ones that had not yet been uncovered, says Sremack.
"Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process."

David J. Venable, CISSP, Director, Masergy Communications, & former intelligence collector, the NSA

Even when a coder produces an otherwise secure website, they are largely developing based on the vulnerabilities they are aware of, not the ones that no one has yet confirmed. There are always new vulnerabilities that appear for the first time in the wild.

Injection vulnerabilities are still common and attackers have adjusted how they approach these with the growing popularity of single sign-on. “Single sign-on is very popular at hotels where people check their accounts and the points they earn. New LDAP injection techniques attack vulnerabilities and pass parameters into the code to take over their web sessions,” explains Sremack.

Another website attack vector is the local and remote file inclusions. “A website’s code can call files either on a local server or on a remote public server. Using injection techniques, attackers can cause the site to display information from a password file or a list of usernames on the web server or to execute code that they want to run,” says Sremack. So the code calls that reach out from the website are also a way in for the attacker.
Fixing Website security holes

“Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process,” says Venable. All testing including web application assessments, pen tests, and static analysis should occur pre-production, after any code changes, and on at least an annual basis, according to Venable. Surround websites and web applications with WAFs and IDS and install a 24/7 monitoring team to identify and remediate attacks in real-time.

“During development, engage with the security team to perform regular tests of affected code and functionality,” says Sremack. If the enterprise is updating a current website, use the security team to test and ensure added capabilities have not added vulnerabilities. Teams inside development should also run scans and tests to isolate vulnerabilities and fix them.

“Rather than design around security, test using the same tools such as Grabber, W3AF, and Zed Attack Proxy that attackers use to break into your website,” says Sremack. Anyone, even with little knowledge of security or security tools can use these applications and gain insights into website vulnerabilities based on the outcomes of the tests, though the enterprise will need to dedicate a staff to this over time.

“Developers should specifically look at how they create and maintain web sessions, specifically checking any inputs that the sessions pass through the website, whether through URLs or input fields,” says Sremack, “then monitor any third-party code for vulnerabilities and watch for exploit announcements from the vendor.”
Final thoughts

The larger the site, the greater its functionality and visibility, and the more it uses third-party software, the more that the process of reducing inherent vulnerabilities in the site will be costly.

The enterprise must monitor and update the site several times a day to keep up with every new attack that cyber mercenaries will level against them using every new vulnerability they find, says Sremack. This process has to include change management, testing, and proper implementation as well as a new specialized security team and a designated testing site.

The more feature rich the site, the more it better be worth to the company in order to make it worth securing. “But there are a lot of open source freeware tools that any programmer can run that will help the developers to stay on top of new vulnerabilities and threats, even for homegrown code,” says Sremack. So all is not lost.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday 18 June 2015

How green is Amazon’s cloud?

Report gives Amazon a ‘D’ for energy efficiency; Google gets a ‘B’

Amazon Web Services has been under fire in recent weeks from a group of activist customers who are calling for the company to be more transparent in its usage of renewable energy.

In response, rather than divulge additional details about the source of power for its massive cloud infrastructure, the company has argued that using the cloud is much more energy efficient than customers powering their own data center operations.

But the whole discussion has raised the question: How green is the cloud?
In early June a pact of 19 AWS customers – including Hootsuite, Change.org and Tumblr - wrote Amazon Senior Vice President Andy Jassy requesting increased transparency in the company’s efforts to use clean energy.

The letter was in response to a report from environmental activist group Greenpeace, which singled out Amazon Web Services, saying “no company could do more” to help tech companies be more energy friendly than AWS. The company’s cloud platform hosts so many popular websites that any steps it takes to increase efficiency would benefit many other companies.

“Amazon Web Services is holding many of our favorite sites hostage to dirty energy,” the report notes. Specifically, it says AWS’s US East region, located in Virginia, houses 60% of the company’s servers and uses a mix of about one-third coal, one-third nuclear, one-fifth gas and only 2% renewable energy.

In response, the next week AWS announced plans to build an 80 megawatt solar farm in Virginia. Company officials are on the defensive again this week, releasing figures saying that overall, its cloud platform runs on 25% renewable energy, with a goal of using 40% renewable energy by 2016, and eventually 100% green power.

Greenpeace says that’s not enough. “It remains impossible for its customers or the public to benchmark any progress toward that goal, since the company refuses to disclose any of its energy data,” the report states.
amazon aws going green renewable

AWS officials argue that the simple fact that so many customers use the company’s cloud is saving energy. AWS is more efficient at running data centers compared to its customers, even if it uses fossil fuels to power those data centers, AWS Distinguished Engineer James Hamilton contends in a blog post.

AWS says customers use 77% fewer servers and 84% less power by running their workloads in its cloud compared to their own data centers. That creates an 88% reduction in carbon emissions for customers who use Amazon’s cloud, AWS Evangelist Jeff Barr’s blog post says.

Furthermore, the company’s US-West location in Oregon, its EU region in Frankfurt and its GovCloud region in the U.S. are what the company calls “carbon-neutral” – which refers to the practice of offsetting the amount of carbon the site is responsible for with the purchase of a corresponding number of carbon credits that fund green projects. And AWS is building a 150 megawatt wind farm in Indiana.

AWS isn’t alone in having work to do to become more environmentally-friendly. Competitor Google received higher grades from Greenpeace – the report gives Google a grade of B, while AWS got a D. Google has also committed to using 100% renewable energy too, although with no specific timeline. Google says about 35% of its operations are currently powered from green sources.

Microsoft, meanwhile stands somewhere in the middle between AWS and Google, receiving a C grade from Greenpeace. The company has committed to being 100% carbon-neutral.

“We know that 100% renewable energy is an ambitious goal that won’t be possible overnight,” the group of Amazon customers wrote. “While you pursue this journey, we would suggest some steps that will give us full confidence in AWS’ commitment to renewable energy.” Now there is more pressure than ever for the cloud to be green.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday 8 June 2015

Exam 70-490 Recertification for MCSD: Windows Store Apps using HTML5

Exam 70-490 Recertification for MCSD: Windows Store Apps using HTML5

Published: 01 August 2014
Languages: English
Audiences: Developers
Technology: ASP.NET MVC
Credit towards certification: MCP, MCSD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Design Windows Store apps

Design the UI layout and structure
Evaluate the conceptual design; decide how the UI will be composed; design for the inheritance and re-use of visual elements (e.g. styles, resources); design for accessibility; decide when custom controls are needed; use the Hub App template

Develop Windows Store apps

Implement search

Provide search suggestions using the SearchPane and SearchBox control class; search and launch other apps; provide and constrain search within an app, including inside and outside of search charm; provide search result previews; implement activation from within search; configure search contracts

Implement Share in an app
Use the DataTransferManager class to share data with other apps; accept sharing requests by implementing activation from within Share; limit the scope of sharing using the DataPackage object; implement in-app Share outside of Share charm; use web links and application links

Integrate media features
Support DDS images; implement video playback; implement XVP and DXVA; implement TTS; implement audio and video playback using HTML5 DRM

Create the user interface
Implement WinJS controls

Flipview; flyout; grid layout; list layout; menu object; WebView; item container; repeater

Implement HTML layout controls
Implement layout controls to structure your layout; implement templates and bindings; support scrolling and zooming with CSS3; manage text flow and presentation, including overflow

Create layout-aware apps to handle windowing modes

Use CSS3 media queries to adapt to different devices; respond to changes in orientation; adapt to new windowing modes by using the ViewManagement namespace; manage setting for an apps view

Program user interaction

Notify users by using toast
Enable an app for toast notifications; populate toast notifications with images and text by using the ToastUpdateManager; play sounds with toast notifications; respond to toast events; control toast duration; configure and use Azure Mobile Services for push notifications

Manage security and data

Choose a data access strategy
Choose the appropriate data access strategy (file based; web service; remote storage, including Microsoft Azure storage and Azure Mobile Services) based on requirements

Retrieve data remotely
Use XHR or HttpClient to retrieve web services; set appropriate HTTP verb for REST; handle progress of data requests; consume SOAP/WCF services; use WebSockets for bidirectional communication

Manage Windows Authentication and Authorisation
Retrieve a user’s roles or claims; store and retrieve credentials by using the PasswordVault class; implement the CredentialPicker class; verify credential existence by using credential locker; store account credentials in app settings

Manage Web Authentication
Use the Windows.Security.Authentication.Web namespace; set up OAuth2 for authentication; CredentialPicker; set up single sign-on (SSO); implement credential roaming; implement the WebAuthenticationBroker class; support proxy authentication for enterprises

Develop Windows Store apps

Create background tasks
Implement the Windows.applicationmodel.background classes; implement WebUIBackgroundTaskInstance; create a background task to manage and preserve resources; create a background task to get notifications for an app; register the background task by using the BackgroundTaskBuilder class; prioritise tasks by using the Scheduler namespace

Discover and interact with devices

Capture media with the camera and microphone
Use CameraCaptureUI to take pictures or video, and configure camera settings; use MediaCapture to capture pictures, video and audio; configure camera settings; set media formats; handle media capture events; implement advanced photo capabilities, such as sequence mode, thumbnails and focus mode

Get data from sensors
Determine the availability of a sensor (Windows.devices.sensors); add sensor requests to the app manifest; handle sensor events; get sensor properties; determine location via GPS; enable geofencing

Implement device access
USB; Bluetooth; Human Interface Device (HID); 3D printer support; Point of Service (PoS) devices

Program user interaction
Implement Play To by using contracts and charms

Register an app for Play To; use PlayToManager stream media assets; register an app as a PlayToReceiver; programmatically implement PlayTo functionality

Notify users by using Windows Push Notification Service (WNS)

Authenticate with WNS; request, create and save a notification channel; call and poll the WNS; configure and implement push notifications by using Azure Mobile Services

Enhance the user interface

Design for and implement UI responsiveness
Choose an asynchronous strategy between web workers and promises; implement web workers; nest and chain promises; make custom functions promise-aware; improve interface performance by using the Scheduler namespace

Implement animations and transitions
Apply animations from the animation library (WinJS.UI.animation); create and customise animations and transitions by using CSS; apply transformations; create animations by using keypoints; apply timing functions; animate with the HTML5 < canvas > element

Manage data and security

Design and implement data caching

Choose which types of items (user data, settings, application data) in your app should be persisted to the cache based on requirements; choose when items are cached; choose where items are cached (Microsoft Azure, Azure Mobile Services, remote storage); select a caching mechanism; store data by using indexDB, LocalStorage, and SessionStorage

Save and retrieve files
Handle file streams; save and retrieve files by using the StorageFile and StorageFolder classes; set file extensions and associations; save and retrieve files by using file pickers and the folder picker; compress files to save space; access libraries and KnownFolders, for example, pictures, documents and videos; manage appearance of the file picker; improve searchability by using Windows Index; integrate OneDrive with apps; compare files; manage libraries

Secure application data
Encrypt data by using the Windows.Security.Cryptography namespace; enrol and request certificates; encrypt data by using certificates; revoke file permissions

Prepare for a solution deployment

Design and implement a test strategy
Design a functional test plan; implement a coded UI test; design a reliability test plan, including performance testing, stress testing, scalability testing and duration testing; simulate in-app purchases

Evaluate and configure for Windows Store deployment
Configure app options to submit to the Windows Store, such as age restrictions, privacy statement, permissions, images and contact information; create application files, resource files and application bundles; verify application readiness by using the Windows Application Certification Kit (WACK)