Special Training Offer from SANS vLive for IT Professionals Preparing for the New CISSP® Exam

For Immediate Release

Contact: Steve Peterson
Tel: 630-922-7768
Email: speterson@sans.org

 

Bethesda, MD – June 25, 2012 – SANS announces a special opportunity for organizations to send two students to information security training for the price of one. The offer runs through July 30 and will allow organizations to send employees to a live, online session of MGT414: SANS® +S™ Training Program for the New CISSP® Certification Exam.

MGT414 prepares students for the New CISSP® exam with the most current courseware available. This particular class will be taught by Ted Demopoulos and Eric Conrad, author of “CISSP Study Guide” (published by Syngress). Classes will meet two nights a week for seven weeks, beginning July 30 and ending on September 12.

“We are excited to provide extra access to our up-to-date CISSP® preparation program by offering students the opportunity to purchase one seat and bring a friend at no charge to our July 30th vLive course,” said Steve Peterson, Director of SANS Live Virtual Training. “We know many professionals have a limited budget for training or travel and this offer allows them access to our industry-leading training.”

To learn more about this special program, please visit: http://www.sans.org/info/107789

The MGT414: SANS® +S™ Training Program for the New CISSP® Certification Exam class will meet online in a virtual classroom. Classes are live and interactive, but will also be recorded in case a student misses a class or wishes to review the material later. All students will receive 42 hours of LIVE online training, a complete set of course materials, and access to online class archives.

If you are interested in SANS’ MGT414 two for one training offer, please visit http://www.sans.org/info/107789 or email vlive@sans.org.

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted, and by far the largest, source for information security training and security certification in the world. In addition to world-class training, SANS offers certification via the ANSI accredited GIAC security certification program. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, newsletters and it operates the Internet’s early warning system – the Internet Storm Center. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community. (www.sans.org)

Confidentiality Integrity Availability (CIA) Triad

The principal of information security is to protect the confidentiality, integrity and availability of information from harm. These principals together are known as the CIA Triad.

The CIA triad consist of three objectives: confidentiality, integrity and availability.

Confidentiality

Confidentiality is assurance of data privacy. Only the intended and authorized recipients may read the data. Disclosure to unauthorized entities, for example using unauthorized network sniffing is a confidentiality violation.

Countermeasure: Cryptography is the art and science of storing and transmitting confidential data.

Integrity

Integrity is assurance of data non-alteration. Data integrity is having assurance that the information has not been altered in transmission, from origin to reception.

Countermeasures: Digital Signatures and hash algorithms are mechanisms used to provide data integrity.

Availability

Availability is assurance in the timely and reliable access to data services for authorized users. It ensures that information or resources are available when required.

Countermeasures: High availability protocols, fully redundant network architectures and system hardware without any single points of failure ensure system reliability and robustness.

WordPress Security Video – Brad Williams: Lock it Up

Learn how to keep your WordPress-powered website secure from hackers and exploits. Brad Williams from WebDevStudios.com shows examples of hacked sites, shares tips and plugins for keeping WordPress secure, and talks about his experiences with WordPress and security.

Microsoft XML Core Services Attack Activity – Microsoft Security Advisory (2719615)

Original release date: June 22, 2012

Last revised: —

Source: US-CERT

 

Systems Affected

 

Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 are affected.

Microsoft Internet Explorer, Microsoft Office 2003, and Microsoft

Office 2007 are affected due to their use of XML Core Services.

 

 

Overview

 

Microsoft Security Advisory (2719615) warns of active attacks using

a vulnerability in Microsoft XML Core Services. Microsoft Internet

Explorer and Microsoft Office can be used as attack vectors.

 

 

Description

 

Microsoft Security Advisory (2719615), a Google Online Security

blog post, Sophos, and other sources report active attacks

exploiting a vulnerability in Microsoft XML Core Services

(CVE-2012-1889). Attack scenarios involve exploits served by

compromised web sites and delivered in Office documents. Reliable

public exploit code is available, and attacks may become more

widespread.

 

 

Impact

 

By convincing a victim to view a specially crafted web page or

Office document, an attacker could execute arbitrary code and take

any action as the victim.

 

 

Solution

 

As of June 22, 2012, a comprehensive update is not available.

Consider the following workarounds.

 

Apply Fix it

 

Apply the Fix it solution described in Microsoft Knowledge Base

Article 2719615. This solution uses the Application

Compatibility Database feature to make runtime modifications to

XML Core Services to patch the vulnerability.

 

Disable scripting

 

Configure Internet Explorer to disable Active Scripting in the

Internet  and Local intranet zones as described in Microsoft

Security Advisory (2719615). See also Securing Your Web Browser.

 

Use the Enhanced Mitigation Experience Toolkit (EMET)

 

EMET is a utility to configure Windows runtime mitigation

features such as Data Execution Prevention (DEP), Address Space

Layout Randomization (ASLR), and Structured Exception Handler

Overwrite Protection (SEHOP). These features, particularly the

combination of system-wide DEP and ASLR, make it more difficult

for an attacker to successfully exploit a vulnerability.

Configure EMET for Internet Explorer as described in Microsoft

Security Advisory (2719615).

 

 

References

 

* Microsoft Security Advisory (2719615) –

<https://technet.microsoft.com/en-us/security/advisory/2719615>

 

* Microsoft Security Advisory: Vulnerability in Microsoft XML Core

Services could allow remote code execution –

<http://support.microsoft.com/kb/2719615>

 

* NVD Vulnerability Summary for CVE-2012-1889 –

<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1889>

 

* Microsoft XML vulnerability under active exploitation –

<http://googleonlinesecurity.blogspot.com/2012/06/microsoft-xml-vulnerability-under.html>

 

* European aeronautical supplier’s website infected with “state-sponsored” zero-day exploit –

<http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/>

 

* Securing Your Web Browser –

<https://www.us-cert.gov/reading_room/securing_browser/>

 

* Application Compatibility Database –

<http://msdn.microsoft.com/en-us/library/bb432182(v=vs.85).aspx>

 

Free ‪GIAC‬ Certification Exam ($549 value) when registered for qualifying ‪SANSFIRE‬ 2012

SummerCon 2012 Wrap Up

This past weekend in downtown Brooklyn New York, a few miles away from the new Nets stadium was SummerCon 2012.  SummerCon has the title of being the longest-running American hacker conference where information security professional gets to mingle with hackers, security researchers, law enforcement officials and students thanks to Facebook.

The unique aspect besides the highly technical presentations at SummerCon that leads to some great conversations are how the speakers are encourage to drink an enormous amount of alcohol by the attendees during their talk.

No one was more impressive in the consumption than Gillis Jones who conducted the final presentation of the event. Jones discussed Why Security Still Isn’t Taken Seriously By Business.  Although his presentation was informative and spot on, the memorable part was his drinking demonstration before, during and after the presentation.  Many attendees where surprised he made it through the end.

Mark Trumpbour and redpantz organized a great event in SummerCon 2012 that was rich in content and a comfortable social atmosphere.

The after party (burlesque) was just as entertaining as the actual conference and I will leave it at that…

Cannot wait for next year’s event!