7 PLUS 19 MORE DEADLY SINS OF HIGH TECH CURRENT LIFE STYLE .......
Posted by Vishva News Reporter on March 29, 2008

 


Original Sin?

According to traditional Christian theology, human beings have fallen from divine grace. Satan tempted Adam and Eve to defy the command of God not to eat of the Tree of the Knowledge of Good and Evil. Eve disobeyed. Original Sin was born. All descendants of Adam and Eve have fallen from a blissful state of innocence and communion with God.


ADD TO 7 DEADLY SINS OF ROMAN CATHOLIC FAITH THE 7 DEADLY SINS OF WESTERN HIGH TECH WORLD & 19 OF SOFTWARE SECURITY


Canadian
Globe and Mail: March 11, 2008: Jack Kapica

On March 10, 2008 the Vatican announced it is expanding its list of the deadly sins from seven to 14, to include such non-individualistic sins as genetic modification, carrying out experiments on humans, polluting the environment, causing social injustice, causing poverty, becoming obscenely wealthy and taking mind-damaging drugs. (Click HERE to read this news posting on this web site)

Since the Vatican was motivated to do this because the world is becoming increasingly globalized, I started to wonder whether anyone has compiled a similar list for technology, much less expanded on them.

Since the Vatican was motivated to do this because the world is becoming increasingly globalized, I started to wonder whether anyone has compiled a similar list for technology, much less expanded on them. Surely there are counterparts in the high-tech world to the original seven deadly sins that were defined by Pope Gregory the Great in the sixth century: luxuria (lust), gula (gluttony), avaritia (greed), acedia (sloth), ira (anger), invidia (envy) and Superbia (pride).



So I humbly propose the following seven deadly sins of tech (I have to be humble or I am a worse sinner than I thought):

1.    Flaming: The irrational desire to attack people online with verbal violence for what you perceive as their failings. Related to anger.

2.   Smarting:
The urge to demonstrate how much smarter you are than everyone else. Related to pride.
 
3.   Badgering: The desire to go online and ask for help when the problem is clearly explained in a manual, but one doesn’t want to RTFM. Related to sloth.
 
4.   Everything: Having to be the first on the block with any new technology. Related to gluttony.

5.   Bubbling: The desire to inflame investors to the point that they will inflate the value of products or services to create another economic bubble. Related to greed.

6.   Bettering: The pathological need to boast about owning technology that is faster, better and more powerful than another’s, even if one doesn’t have it. Related to envy.
 
7.   Firsting: the extravagant belief that anything and everything you say is protected by your God-given right to free speech, including your abusive public postings, because the U.S. constitution guarantees it in its First Amendment, even if you don't live in the United States. Related to lust.

I’m sure I missed a bunch, but then I am a fallible creature. If there are more, do send them on.

Please click in the line outside this column to read about the 19 Deadly Sins of the Software Security Programming Flaws and How to Fix Them .....PVAF also invites you to share of comparative knowledge of different types of 7 deadly sins in other life disciplines....You can do this by writing as a comment to this news posting by  simply clicking on the POST A COMMENT button in the header of this news item or submitting your writing for posting on this web site by emailing it as an attachment by clicking HERE


 

19 Deadly Sins of Software Security

April 18, 2007: CODING ERROR.COM

Sins of Software Security

I picked up a free copy of 19 Deadly Sins of Software Security at a conference last year. I didn't expect the book to be good because it was a free giveaway item from one of the the vendor booths. But I paged through it on the flight home, and I was pleasantly surprised. It's actually quite good.

Software security isn't exactly my favorite topic, so holding my interest is no mean feat. It helps that the book is mercifully brief and to the point, and filled with practical examples and citations. It's an excellent cross-platform, language-agnostic checksheet of common software security risks.

Here's a brief summary of each of the 19 sins, along with a count of the number of vulnerabilities I found in the Common Vulnerabilities and Exposures database for each one.

Affected Languages Exploit count
Buffer Overflows C, C++ A buffer overrun occurs when a program allows input to write beyond the end of the allocated buffer. Results in anything from a crash to the attacker gaining complete control of the operating system. Many famous exploits are based on buffer overflows, such as the Morris worm. 3,326
Format String Problems C, C++ The standard format string libraries in C/C++ include some potentially dangerous commands (particularly %n). If you allow untrusted user input to pass through a format string, this can result in anything from arbitrary code execution to spoofing user output. 411
Integer Overflows C, C++, others Failure to range check on integer types. This can cause integer overflow crashes and logic errors. In C/C++, integer overflows can be turned into a buffer overrun and arbitrary code execution, but all languages are prone to denial of service and logic errors. 288
SQL Injection All Forming SQL statements with untrusted user input means users can "inject" their own commands into your SQL statements. This puts your data at risk, and can even lead to complete server and network compromise. 2,225
Command Injection All Occurs when untrusted user input is passed to a compiler or interpreter, or worse, a command line shell. Potential risk depends on the context. 193
Failing to Handle Errors Most A broad category of problems related to a program's error handling strategy; anything that leads to the program crashing, aborting, or restarting is potentially a denial of service issue and therefore can be a security problem, particularly on servers. 80
Cross-Site Scripting (XSS) Any web-facing A web application takes some input from the user, fails to validate it, and echoes that input directly back to the web page. Because this code is running in the context of your web site, it can do anything your website could do, including retrieving cookies, modifying the HTML DOM, and so forth. 2,996
Failing to Protect Network Traffic All Most programmers understimate the risk of transmitting data over the network, even if that data is not private. Attackers can eavesdrop, replay, spoof, tamper with, or otherwise hijack any unprotected data sent over the wire. 26
Use of Magic URLs and Hidden Form Fields Any web-facing Passing sensitive or secure information via the URL querystring or hidden HTML form fields, sometimes with lousy or ineffectual "encryption" schemes. Attackers can use these fields to hijack or manipulate a browser session. 33
Improper use of SSL and TLS All Using most SSL and TLS APIs requires writing a lot of error-prone code. If programmers aren't careful, they will have an illusion of security in place of the actual security promised by SSL. Attackers can use certificates from lax authorities, subtly invalid certificates, or stolen/revoked certificates, and it's up to the developer to write the code to check for that. 123
Use of Weak Password-Based Systems All Anywhere you are using passwords, you need to seriously consider the risks inherent to all password-based systems. Risks like phishing, social engineering, eavesdropping, keyloggers, brute force attacks, and so on. And then you have to worry about how users choose passwords, and where to store them securely on the server. Passwords are a necessary evil, but tread carefully. 1,235
Failing to Store and Protect Data Securely All Information spends more time stored on disk than in transit. Consider filesystem permissions and encryption for any data you're storing. And try to avoid hardcoding "secrets" into your code or configuration files. 56
Information Leakage All The classic trade-off between giving the user helpful information, and preventing attackers from learning about the internal details of your system. Was the password invalid, or the username? 26
Improper File Access All 1) There is often a window of vulnerability between time of check and time of use (TOCTOU) in the filesystem, so an attacker can slip changes in, particularly if the files are accessed over the network.
2) The "it isn't really a file problem"; you may think you have a file, but attackers may substitute a link to another file, or a device name, or a pipe.
3) Allowing users control over the complete filename and path of files used by the program; this can lead to directory traversal attacks.
5, 58
Trusting Network Name Resolution All It's simple to override and subvert DNS on a server or workstation with a local HOSTS file. How do you really know you're talking to the real "secureserver.com" when you make a HTTP request? 20
Race Conditions All A race condition is when two different execution contexts are able to change a resource and interfere with each other. If attackers can force a race condition, they can execute a denial of service attack. Unfortunately, writing properly concurrent code is incredibly difficult. 139
Unauthenticated Key Exchange All Exchanging a private key without properly authenticating the entity/machine/service that you're exchanging the key with. To have a secure session, both parties need to agree on the identity of the opposing party. You'd be shocked how often this doesn't happen. 1
Cryptographically Strong Random Numbers All Imagine you're playing poker online. The computer shuffles and deals the cards. You get your cards, and then another program tells you what's in everybody else's hands. Random numbers are similarly fundamental to cryptography; they're used to generate things like keys and session identifiers. An attacker who can predict numbers-- even with only a slight probability of success-- can often leverage this information to breach the security of a system. 5
Poor Usability All Security is always extra complexity and pain for the user. It's up to us software developers to go out of our way to make it as painless as it can reasonably be. Security only works if the secure way also happens to be the easy way. All

It's true that C and C++ have a heavy cross to bear. But only 3 of the 19 sins can be completely lumped on the plate of K&R. The other 16 apply almost everywhere, to any developer writing code on any platform. It's a sobering thought.

The usability sin is the one that's most interesting to me. Usability is tough under the best of conditions-- and security is the worst of conditions, at least from the user's perspective. It's quite a challenge. There are a few great links in the book on the topic of security usability:

You can certainly find other books that go much deeper on particular aspects of software security. But if you're looking for an excellent primer on the entire gamut of security problems that could potentially afflict your project, 19 Deadly Sins of Software Security is an excellent starting point.



There are 0 additional comments.

 

Send your news items to be posted to news@prajapati-samaj.ca.


If you have any questions or comments about this web site, send mail to Bhavin Mistry.    
© 1997-2003 Prajaapati Vishva Aashram Foundation.    
Site Design by Helios Logistics Inc.