Monday, 22 June 2015

Why are there still so many website vulnerabilities?

The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.

CSO Magazine traverses the treacherous terrain of the massive security craters present in today’s websites. Find out what it takes to fix these holes from the start and throughout the development life cycle.
So many Website security punctures and protrusions

“The primary cause for constant and recurring website (and web application) vulnerabilities is the heavily-modified to fully custom-developed nature of these technologies,” says David J. Venable, CISSP, director, Masergy Communications & former intelligence collector, the NSA. The result is largely untested sites and applications that do not undergo the same rigorous and thorough testing that most commercial software packages such as operating systems and server packages do.
Lost in the clouds: Your private data has been indexed by Google

In fact, more vulnerabilities appear in websites and web applications than just about anywhere else in the enterprise. These security holes crop up in .PHP sites, third-party and homegrown software, and WordPress code and installations as well as in OpenSSL, Single Sign-On, and SQL and LDAP implementations and technologies.

PHP sites that use third-party software present inherent vulnerabilities due to the fact that third-party application development is out of the hands of the afflicted enterprise. “You can design your site so that all of your home-baked code is perfectly secure, but then if you rely on third-party software for anything, you inherit any vulnerability that might exist in it,” says Joe Sremack, director, Berkeley Research Group.
ADVERTISING

WordPress is a growing problem as sites that represent small to midsize enterprises increasingly incorporate it along with its countless plug-ins that require constant updating. “Companies want the WordPress functionality but unfortunately the risk also comes with it,” says Sremack.

OpenSSL is continuously running into trouble. As people innovate improvements to the technology, those innovations create new vulnerabilities that attackers discover and exploit. Attackers continue to exploit OpenSSL vulnerabilities new and old as part of large breaches a few times a year. Many seemingly new holes were actually old ones that had not yet been uncovered, says Sremack.
"Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process."

David J. Venable, CISSP, Director, Masergy Communications, & former intelligence collector, the NSA

Even when a coder produces an otherwise secure website, they are largely developing based on the vulnerabilities they are aware of, not the ones that no one has yet confirmed. There are always new vulnerabilities that appear for the first time in the wild.

Injection vulnerabilities are still common and attackers have adjusted how they approach these with the growing popularity of single sign-on. “Single sign-on is very popular at hotels where people check their accounts and the points they earn. New LDAP injection techniques attack vulnerabilities and pass parameters into the code to take over their web sessions,” explains Sremack.

Another website attack vector is the local and remote file inclusions. “A website’s code can call files either on a local server or on a remote public server. Using injection techniques, attackers can cause the site to display information from a password file or a list of usernames on the web server or to execute code that they want to run,” says Sremack. So the code calls that reach out from the website are also a way in for the attacker.
Fixing Website security holes

“Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process,” says Venable. All testing including web application assessments, pen tests, and static analysis should occur pre-production, after any code changes, and on at least an annual basis, according to Venable. Surround websites and web applications with WAFs and IDS and install a 24/7 monitoring team to identify and remediate attacks in real-time.

“During development, engage with the security team to perform regular tests of affected code and functionality,” says Sremack. If the enterprise is updating a current website, use the security team to test and ensure added capabilities have not added vulnerabilities. Teams inside development should also run scans and tests to isolate vulnerabilities and fix them.

“Rather than design around security, test using the same tools such as Grabber, W3AF, and Zed Attack Proxy that attackers use to break into your website,” says Sremack. Anyone, even with little knowledge of security or security tools can use these applications and gain insights into website vulnerabilities based on the outcomes of the tests, though the enterprise will need to dedicate a staff to this over time.

“Developers should specifically look at how they create and maintain web sessions, specifically checking any inputs that the sessions pass through the website, whether through URLs or input fields,” says Sremack, “then monitor any third-party code for vulnerabilities and watch for exploit announcements from the vendor.”
Final thoughts

The larger the site, the greater its functionality and visibility, and the more it uses third-party software, the more that the process of reducing inherent vulnerabilities in the site will be costly.

The enterprise must monitor and update the site several times a day to keep up with every new attack that cyber mercenaries will level against them using every new vulnerability they find, says Sremack. This process has to include change management, testing, and proper implementation as well as a new specialized security team and a designated testing site.

The more feature rich the site, the more it better be worth to the company in order to make it worth securing. “But there are a lot of open source freeware tools that any programmer can run that will help the developers to stay on top of new vulnerabilities and threats, even for homegrown code,” says Sremack. So all is not lost.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, 18 June 2015

How green is Amazon’s cloud?

Report gives Amazon a ‘D’ for energy efficiency; Google gets a ‘B’

Amazon Web Services has been under fire in recent weeks from a group of activist customers who are calling for the company to be more transparent in its usage of renewable energy.

In response, rather than divulge additional details about the source of power for its massive cloud infrastructure, the company has argued that using the cloud is much more energy efficient than customers powering their own data center operations.

But the whole discussion has raised the question: How green is the cloud?
In early June a pact of 19 AWS customers – including Hootsuite, Change.org and Tumblr - wrote Amazon Senior Vice President Andy Jassy requesting increased transparency in the company’s efforts to use clean energy.

The letter was in response to a report from environmental activist group Greenpeace, which singled out Amazon Web Services, saying “no company could do more” to help tech companies be more energy friendly than AWS. The company’s cloud platform hosts so many popular websites that any steps it takes to increase efficiency would benefit many other companies.

“Amazon Web Services is holding many of our favorite sites hostage to dirty energy,” the report notes. Specifically, it says AWS’s US East region, located in Virginia, houses 60% of the company’s servers and uses a mix of about one-third coal, one-third nuclear, one-fifth gas and only 2% renewable energy.

In response, the next week AWS announced plans to build an 80 megawatt solar farm in Virginia. Company officials are on the defensive again this week, releasing figures saying that overall, its cloud platform runs on 25% renewable energy, with a goal of using 40% renewable energy by 2016, and eventually 100% green power.

Greenpeace says that’s not enough. “It remains impossible for its customers or the public to benchmark any progress toward that goal, since the company refuses to disclose any of its energy data,” the report states.
amazon aws going green renewable

AWS officials argue that the simple fact that so many customers use the company’s cloud is saving energy. AWS is more efficient at running data centers compared to its customers, even if it uses fossil fuels to power those data centers, AWS Distinguished Engineer James Hamilton contends in a blog post.

AWS says customers use 77% fewer servers and 84% less power by running their workloads in its cloud compared to their own data centers. That creates an 88% reduction in carbon emissions for customers who use Amazon’s cloud, AWS Evangelist Jeff Barr’s blog post says.

Furthermore, the company’s US-West location in Oregon, its EU region in Frankfurt and its GovCloud region in the U.S. are what the company calls “carbon-neutral” – which refers to the practice of offsetting the amount of carbon the site is responsible for with the purchase of a corresponding number of carbon credits that fund green projects. And AWS is building a 150 megawatt wind farm in Indiana.

AWS isn’t alone in having work to do to become more environmentally-friendly. Competitor Google received higher grades from Greenpeace – the report gives Google a grade of B, while AWS got a D. Google has also committed to using 100% renewable energy too, although with no specific timeline. Google says about 35% of its operations are currently powered from green sources.

Microsoft, meanwhile stands somewhere in the middle between AWS and Google, receiving a C grade from Greenpeace. The company has committed to being 100% carbon-neutral.

“We know that 100% renewable energy is an ambitious goal that won’t be possible overnight,” the group of Amazon customers wrote. “While you pursue this journey, we would suggest some steps that will give us full confidence in AWS’ commitment to renewable energy.” Now there is more pressure than ever for the cloud to be green.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 9 June 2015

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Side-by-side apps, video overlays, and much more are coming to iPads when Apple's mobile OS releases this fall.

Major changes are coming to our iPads, from the way we select text, to the way we interact with our favorite apps and play videos.

Speaking at Apple's Worldwide Developer Conference on Monday, Senior Vice President Craig Federighi showcased an updated version of iOS 9 that included a few new features designed specifically with tablet users in mind.

Let’s start with QuickType, an enhancement to the iPad’s onscreen keyboard that includes new shortcuts and turns into a trackpad when you place two fingers on it. The trackpad can be used to select text, move objects around, and generally combine the convenience of touch controls and the precision of a mouse.

iPads will also get access to true, onscreen multitasking, which allows two apps to run side-by-side on the screen at the same time. The new feature, which Apple calls Split View, opens two resizable virtual windows on the screen. Users will be able to control each app independently, transferring information from one to the other using simple gestures, and quickly change the program running inside each panel using a brand-new app switcher. Note: While multitasking will work on most recent iPad models, Split View will be available only on the iPad Air 2.

Finally, a new picture-in-picture feature allows users to play a video from one app while using a different app. The video appears in a tiny window can be moved around, or even pushed temporarily off-screen to allow you to focus on your work while your favorite movie or game keeps playing along. The window also includes a set of simple controls that let you pause the video or close and dismiss it without leaving the current app.

The new iPad features will arrive with iOS 9 this fall, with a public beta program open to all starting in July.




Wednesday, 3 June 2015

Exam 70-411 Administering Windows Server 2012

Exam 70-411 Administering Windows Server 2012
Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 R2
Credit towards certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Deploy, manage and maintain servers (15–20%)

Deploy and manage server images
Install the Windows Deployment Services (WDS) role; configure and manage boot, install and discover images; update images with patches, hotfixes and drivers; install features for offline images; configure driver groups and packages

Implement patch management
Install and configure the Windows Server Update Services (WSUS) role, configure group policies for updates, configure client-side targeting, configure WSUS synchronisation, configure WSUS groups, manage patch management in mixed environments

Monitor servers
Configure Data Collector Sets (DCS), configure alerts, monitor real-time performance, monitor virtual machines (VMs), monitor events, configure event subscriptions, configure network monitoring, schedule performance monitoring

Preparation resources
Windows Deployment Services overview
Windows Server Update Services overview
Update management in Windows Server 2012: Revealing cluster-aware updating and the new generation of WSUS

Configure File and Print Services (15–20%)

Configure Distributed File System (DFS)
Install and configure DFS namespaces, configure DFS Replication Targets, configure Replication Scheduling, configure Remote Differential Compression settings, configure staging, configure fault tolerance, clone a DFS database, recover DFS databases, optimise DFS replication

Configure File Server Resource Manager (FSRM)
Install the FSRM role service, configure quotas, configure file screens, configure reports, configure file management tasks

Configure file and disk encryption
Configure BitLocker encryption; configure the Network Unlock feature; configure BitLocker policies; configure the EFS recovery agent; manage EFS and BitLocker certificates, including backup and restore

Configure advanced audit policies
Implement auditing using Group Policy and AuditPol.exe, create expression-based audit policies, create removable device audit policies

Preparation resources
DFS namespaces and DFS replication overview
DFS replication improvements in Windows Server 2012
File Server Resource Manager overview

Configure network services and access (15–20%)

Configure DNS zones
Configure primary and secondary zones, configure stub zones, configure conditional forwards, configure zone and conditional forward storage in Active Directory, configure zone delegation, configure zone transfer settings, configure notify settings

Configure DNS records
Create and configure DNS Resource Records (RR), including A, AAAA, PTR, SOA, NS, SRV, CNAME and MX records; configure zone scavenging; configure record options, including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates

Configure virtual private networks (VPN) and routing
Install and configure the Remote Access role, implement Network Address Translation (NAT), configure VPN settings, configure remote dial-in settings for users, configure routing, configure Web Application proxy in passthrough mode

Configure DirectAccess
Implement server requirements, implement client configuration, configure DNS for Direct Access, configure certificates for Direct Access

Preparation resources
How the Domain Name System (DNS) works
DNS overview
DNS server operations guide

Configure a Network Policy Server (NPS) infrastructure (10–15%)

Configure Network Policy Server
Configure a RADIUS server, including RADIUS proxy; configure RADIUS clients; configure NPS templates; configure RADIUS accounting; configure certificates

Configure NPS policies
Configure connection request policies, configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing), import and export NPS policies

Configure Network Access Protection (NAP)
Configure System Health Validators (SHVs), configure health policies, configure NAP enforcement using DHCP and VPN, configure isolation and remediation of non-compliant computers using DHCP and VPN, configure NAP client settings

Preparation resources
Network Policy and Access Services overview
Network Policy Server operations guide
Policies in NPS

Configure and manage Active Directory (10–15%)

Configure service authentication
Create and configure Service Accounts, create and configure Group Managed Service Accounts, configure Kerberos delegation, manage Service Principal Names (SPNs), configure virtual accounts

Configure domain controllers
Transfer and seize operations master roles, install and configure a read-only domain controller (RODC), configure domain controller cloning

Maintain Active Directory
Back up Active Directory and SYSVOL, manage Active Directory offline, optimise an Active Directory database, clean up metadata, configure Active Directory snapshots, perform object- and container-level recovery, perform Active Directory restore, configure and restore objects by using the Active
Directory Recycle Bin

Configure account policies
Configure domain and local user password policy settings, configure and apply Password Settings Objects (PSOs), delegate password settings management, configure account lockout policy settings, configure Kerberos policy settings

Preparation resources
Group managed service accounts overview
Step-by-step: Safely cloning an Active Directory domain controller with Windows Server 2012
Administering Active Directory backup and recovery

Configure and manage Group Policy (15–20%)

Configure Group Policy processing
Configure processing order and precedence, configure blocking of inheritance, configure enforced policies, configure security filtering and Windows Management Instrumentation (WMI) filtering, configure loopback processing, configure and manage slow-link processing and Group Policy caching, configure client-side extension (CSE) behaviour, force Group Policy Update

Configure Group Policy settings
Configure settings, including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; configure property filters for administrative templates

Manage Group Policy objects (GPOs)
Back up, import, copy and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management

Configure Group Policy preferences (GPP)
Configure GPP settings, including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment and shortcut deployment; configure item-level targeting

Preparation resources
Group Policy in Windows Server 2012: Overview
Work with WMI filters
Back up, restore, import and copy Group Policy objects



QUESTION 1
You work as the network administrator for a Microsoft Windows Server 2008 domain named
Certkingdom.com. Certkingdom.com has a Development division which utilizes two organizational units
(OU) named DevelopUsers and DevelopComputers for user and computer account storage. The
Development division user and computer accounts are configured as members of global security
groups named DevUsers and DevComputers.

During the course of the week you configure two Password Settings objects for Development
division members named CredSettings01 and CredSettings02. You additionally configure a
minimum password length of 10 for CredSettings01 and 9 for CredSettings02. CertKingdom.com
wants you to determine the required password length minimum for Development division users.
What minimum password length should be configured for CredSettings01 applied to DevUsers?

A. You should configure the minimum password length to 9.
B. You should configure the minimum password length to 10.
C. You should configure the minimum password length to 5.
D. You should configure the minimum password length to 4.

Answer: B

Explanation:


QUESTION 2
You administrate an Active Directory domain named CertKingdom.com. The domain has a Microsoft
Windows Server 2012 R2 server named CertKingdom-SR01 that hosts the File Server Resource
Manager role service.
You are configuring quota threshold and want to receive an email alert when 80% of the quota has
been reached.
Where would you enable the email alert?

A. You should consider creating a Data Collector Set (DCS).
B. You should use Windows Resource Monitor.
C. You should use the File Server Resource Manager.
D. You should use Disk Quota Tools.
E. You should use Performance Logs and Alerts.

Answer: C

Explanation:
To make use of email alerts, you need to configure the SMTP Server address details in the File
Server Resource Manager options.


QUESTION 3
You work as a network administrator at CertKingdom.com. CertKingdom.com has an Active Directory
Domain Services (AD DS) domain name CertKingdom.com. All servers in the CertKingdom.com domain
have Microsoft Windows Server 2012 R2 installed.
The computer accounts for all file servers are located in an organizational unit (OU) named
DataOU.
You are required to track user access to shared folders on the file servers.
Which of the following actions should you consider?

A. You should configure auditing of Account Logon events for the DataOU.
B. You should configure auditing of Object Access events for the DataOU.
C. You should configure auditing of Global Object Access Auditing events for the DataOU.
D. You should configure auditing of Directory Service Access events for the DataOU.
E. You should configure auditing of Privilege Use events for the DataOU.

Answer: B

Explanation:


QUESTION 4
You are the administrator of an Active Directory Domain Services (AD DS) domain named
CertKingdom.com. The domain has a Microsoft Windows Server 2012 R2 server named CertKingdomSR05
that hosts the File and Storage Services server role.
CertKingdom-SR05 hosts a shared folder named userData. You want to receive an email alert when
a multimedia file is saved to the userData folder.
Which tool should you use?

A. You should use File Management Tasks in File Server Resource Manager.
B. You should use File Screen Management in File Server Resource Manager.
C. You should use Quota Management in File Server Resource Manager.
D. You should use File Management Tasks in File Server Resource Manager.
E. You should use Storage Reports in File Server Resource Manager.

Answer: B

Explanation:


QUESTION 5
You work as a Network Administrator at CertKingdom.com. CertKingdom.com has an Active Directory
Domain Services (AD DS) domain named CertKingdom.com. All servers in the CertKingdom.com domain
have Microsoft Windows Server 2012 R2 installed and all client computers have Windows 8 Pro
installed.
BitLocker Drive Encryption (Bitlocker) is enabled on all client computers. CertKingdom.com wants you
to implement BitLocker Network Unlock.
Which of the following servers would you required to implement BitLocker Network Unlock?

A. A Domain Controller.
B. A DHCP server.
C. A DNS Server.
D. A Windows Deployment Server.
E. An Application Server.
F. A Web Server.
G. A File and Print Server.
H. A Windows Server Update Services server.

Answer: D

Explanation:
BitLocker Network Unlock requires a Windows Server 2012 R2 server running the Windows
Deployment Services (WDS) role in the environment.