Application Control .

51
• Application Control https://store.theartofservice.com/the-application-control- toolkit.html

Transcript of Application Control .

Page 1: Application Control .

• Application Control

https://store.theartofservice.com/the-application-control-toolkit.html

Page 2: Application Control .

W3C MMI - Current work

1 Multimodal architecture: A loosely coupled architecture for the

multimodal interaction framework that focuses on providing a general

means for components to communicate with each other, plus basic infrastructure for application

control and platform services.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 3: Application Control .

ISO/IEC 27001:2005 - Operating System & Application Control

1 If an attacker can easily view someone's username and password, he can impersonate

that user, and do massive damage by modifying critical information, read corporate emails, damage corporate websites etc. The procedure to log into an Operating System or application control should minimize the risk of unauthorized access. The procedure shall therefore follow a strict set of rules to govern what information is displayed to the potential

user during the process of log-in.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 4: Application Control .

ISO/IEC 27001:2005 - Operating System & Application Control

1 Sample Operating System and

application control policies include:

https://store.theartofservice.com/the-application-control-toolkit.html

Page 5: Application Control .

Information technology controls

1 The COBIT Framework (Control Objectives for Information

Technology) is a widely used framework promulgated by the IT

Governance Institute, which defines a variety of ITGC and application

control objectives and recommended evaluation approaches

https://store.theartofservice.com/the-application-control-toolkit.html

Page 6: Application Control .

Information technology controls - IT application controls

1 IT application or program controls are fully automated (i.e., performed automatically by

the systems) designed to ensure the complete and accurate processing of data, from input through output. These controls vary based on the business purpose of the

specific application. These controls may also help ensure the privacy and security of data

transmitted between applications. Categories of IT application controls may

include:https://store.theartofservice.com/the-application-control-toolkit.html

Page 7: Application Control .

Information technology controls - COBIT (Control Objectives for Information Technology)

1 COBIT is a widely utilized framework containing best practices for both ITGC and application controls. It

consists of domains and processes. The basic structure indicates that IT

processes satisfy business requirements, which is enabled by specific IT control activities. It also recommends best practices and

methods of evaluation of an enterprise's IT controls.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 8: Application Control .

Information technology controls - IT controls and the Sarbanes-Oxley Act (SOX)

1 Application controls are generally aligned with a business process that

gives rise to financial reports

https://store.theartofservice.com/the-application-control-toolkit.html

Page 9: Application Control .

Internal control - Activity categorization

1 IT application controls – Controls over information processing enforced by IT applications, such as edit checks

to validate data entry, accounting for transactions in numerical sequences, and comparing file totals with control

accounts.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 10: Application Control .

Information technology audit - Types of IT audits

1 And some lump all IT audits as being one of only two type: "general

control review" audits or "application control review" audits.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 11: Application Control .

Information technology audit - History of IT Auditing

1 For the other types of business, IT plays the big part of company

including the applying of workflow instead of using the paper request form, using the application control instead of manual control which is more reliable or implementing the

ERP application to facilitate the organization by using only 1

applicationhttps://store.theartofservice.com/the-application-control-toolkit.html

Page 12: Application Control .

Data loss prevention software - Endpoint DLP (aka Data in Use <DiU>)

1 Some endpoint-based systems can also provide application controls to block attempted transmissions of

confidential information, and provide immediate feedback to the user

https://store.theartofservice.com/the-application-control-toolkit.html

Page 13: Application Control .

Unified threat management - How UTM secures the network

1 In this context, UTMs represent all-in-one security appliances that carry a variety of

security capabilities including firewall, VPN, gateway anti-virus, gateway anti-spam, intrusion prevention, content filtering,

bandwidth management, application control and centralized reporting as basic features.

The UTM has a customized OS holding all the security features at one place, which can lead to better integration and throughput than a

collection of disparate devices.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 14: Application Control .

Check Point - Products

1 Network Security — Check Point's core business has historically focused on network security components including Firewall, IPsec VPN,

Mobile Access, Intrusion Prevention, Antivirus, Anti-spam, URL filtering, Data Loss Prevention and Application Control. These products are

deployed as software on x86-based hardware made by third parties including Crossbeam and Hewlett-Packard, or by Check Point(Safe@Office, UTM-1 Edge, UTM-1, Power-1, IP Appliances, and

Integrated Appliance Solutions platforms).

https://store.theartofservice.com/the-application-control-toolkit.html

Page 15: Application Control .

Check Point Integrity

1 application controls that block or terminate malicious software

programs before they can transmit information to an unauthorized party;

https://store.theartofservice.com/the-application-control-toolkit.html

Page 16: Application Control .

Handshaking

1 The "squealing" (which is actually a sound that changes in pitch 100 times every

second) noises made by some modems with speaker output immediately after a

connection is established are in fact the sounds of modems at both ends engaging in

a handshaking procedure; once the procedure is completed, the speaker might be silenced, depending on the settings of

Operating System or the application controlling the modem.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 17: Application Control .

Categorical list of programming languages - In object code

1 A wide variety of dynamic or scripting languages can be embedded in compiled

executable code. Basically, object code for the language's interpreter (computing)|interpreter needs to be linked into the executable. Source code fragments for the embedded language can then be passed to an evaluation function as strings. Application control languages can

be implemented this way, if the source code is input by the user. Languages with small

interpreters are preferred.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 18: Application Control .

Microsoft Direct3D - Direct3D 10.1

1 Direct3D 10.1 sets a few more image quality standards for graphics vendors, and gives

developers more control over image quality. Features include finer control over anti-

aliasing (both multisampling and supersampling with per sample shading and application control over sample position) and

more flexibilities to some of the existing features (cubemap arrays and independent

blending modes). Direct3D 10.1 level hardware must support the following features:

https://store.theartofservice.com/the-application-control-toolkit.html

Page 19: Application Control .

CPU cache - Page coloring

1 Large physically indexed caches (usually secondary caches) run into a problem: the

Operating System rather than the application controls which pages collide with one another

in the cache. Differences in page allocation from one program run to the next lead to differences in the cache collision patterns, which can lead to very large differences in

program performance. These differences can make it very difficult to get a consistent and

repeatable timing for a benchmark run.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 20: Application Control .

Software asset management - SAM Technology

1 *'Application control' tools restrict what and by whom particular

software can be run on a computer as a means of avoiding security and

other risks.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 21: Application Control .

Data leakage protection - Endpoint DLP (aka Data in Use )

1 Some endpoint-based systems can also provide application controls to block attempted transmissions of

confidential information, and provide immediate feedback to the user

https://store.theartofservice.com/the-application-control-toolkit.html

Page 22: Application Control .

Apache Maven

1 Maven is built using a plugin-based architecture that allows it to make use of any application controllable

through standard input

https://store.theartofservice.com/the-application-control-toolkit.html

Page 23: Application Control .

TippingPoint

1 HP maintains the TippingPoint name today. In September 2013, HP announced that it

entered the next-generation firewall market with a new line of TippingPoint firewalls. The

new line extends TippingPoint's existing intrusion prevention system (IPS) appliances with traditional stateful packet filtering and

application control. http://searchnetworking.techtarget.com/news

/22 40205649/HP-launches-Tipping-Point-firewall-with-next-generation-app-control

https://store.theartofservice.com/the-application-control-toolkit.html

Page 24: Application Control .

Synaptics - History

1 The company started shipping commercial products in 1995, with its

flagship TouchPad interface for notebook PCs. The TouchPad is a

touch-sensitive pad for notebooks or keyboards that senses the position of

a user’s finger(s) on the surface to provide screen navigation, cursor

movement, application control, and a platform for interactive input.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 25: Application Control .

REXX - History

1 The Amiga version of Rexx, called ARexx, was included with AmigaOS 2

onwards and was popular for scripting as well as application

control. Many Amiga applications have an ARexx port built into them

which allows control of the application from Rexx. One single

Rexx script could even switch between different Rexx ports in order

to control several running applications.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 26: Application Control .

Sourcefire - FirePOWER NGIPS and NGFW

1 * Next-Generation Firewall (computing)|Firewall (NGFW) with NGIPS, incorporating access and

application control, threat prevention and firewall capabilities

https://store.theartofservice.com/the-application-control-toolkit.html

Page 27: Application Control .

Altiris - Acquisitions

1 *August 2009 Where are they now? Greg Butterfield, Dwain Kinghorn and other key

former Altiris leaders and developers launched a new company that extends the

Altiris Platform (now Symantec Management Platform) with Desktop

Security Solutions. The company is Arellia and they provide Application Control and

Local User and User Group password security.[ http://www.arellia.com

www.arellia.com]https://store.theartofservice.com/the-application-control-toolkit.html

Page 28: Application Control .

Visual Test - 32-bit enhancements

1 It was able to support the testing of the new application control that arrived with Windows '95 and NT

https://store.theartofservice.com/the-application-control-toolkit.html

Page 29: Application Control .

IT audit - Types of IT audits

1 And some lump all IT audits as being one of only two type: 'general control review' audits or 'application control

review' audits.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 30: Application Control .

Marius Nacht - Products

1 *Network Security— Check Point's core business has historically focused

on network security components including Firewall, IPsec VPN, Mobile

Access, Intrusion Prevention, Antivirus, Anti-spam, URL filtering,

Data Loss Prevention and Application Control

https://store.theartofservice.com/the-application-control-toolkit.html

Page 31: Application Control .

Untangle - History

1 In February 2012 Untangle released Untangle 9.2, which included

Application Control. Application Control allows users to block, flag, or tarpit applications and protocols. For

a greater degree of control, administrators can create custom rules in the proprietary Integrated Rules Engine (IRE), which target more complex traffic patterns.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 32: Application Control .

Untangle - History

1 The IRE allows Application Control to work in concert with other aspects of the multi-function firewall suite to enable rule-based blocking of the most challenging traffic types. In fact, this integrated approach is the only known way to

control protocol-agile applications like the Ultrasurf proxy. Untangle users can think about the IRE as a voting expert system that accepts inputs from all Untangle filters and then meters out blended control responses based on threat

type and policy.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 33: Application Control .

Untangle - History

1 In April, 2012, Untangle changed the content of the Standard Package to

include both IPsec VPN and Application Control.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 34: Application Control .

Transaction processing system - List of transaction processing systems

1 * Burroughs Corporation supported transaction processing capabilities in

its Burroughs MCP|MCP Operating Systems. As of 2012 UNISYS

Burroughs large systems|ClearPath Enterprise Servers include

Transaction Server, an extremely flexible, high-performance message

and application control system.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 35: Application Control .

Transaction processing system - List of transaction processing systems

1 * Digital Equipment Corporation (DEC) Application Control and

Management System (ACMS) - 1985. Provides an environment for creating

and controlling online transaction processing (OLTP) applications on the

VMS Operating System. Runs on VAX/OpenVMS|VMS systems.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 36: Application Control .

Data analysis (information technology) - Continuous monitoring

1 Continuous monitoring is an ongoing process for acquiring, analyzing, and

reporting on business data to identify and respond to operational business risks. For

auditors to ensure a comprehensive approach to acquire, analyze, and report on business data, they must make certain the

organization continuously monitors user activity on all computer systems, business

transactions and processes, and application controls.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 37: Application Control .

SOX 404 top-down risk assessment - Centralization and automation

1 Benchmarking (see Appendix B of the PCAOB guidance) allows fully

automated IT application controls to be excluded from testing if certain IT

change management controls are effective

https://store.theartofservice.com/the-application-control-toolkit.html

Page 38: Application Control .

SOX 404 top-down risk assessment - IT assessment approach

1 By nature, ITGC enables management to place reliance on

fully automated application controls (i.e., those that operate without

human intervention) and IT-dependent controls (i.e., those that involve the review of automatically

generated reports)

https://store.theartofservice.com/the-application-control-toolkit.html

Page 39: Application Control .

ARINC - 800 Series

1 * ARINC 840 defines the Application Control Interface (ACI) used with an

Electronic Flight Bag (EFB)

https://store.theartofservice.com/the-application-control-toolkit.html

Page 40: Application Control .

List of features removed in Windows 7 - Other Windows applications and features

1 *Software Restriction Policies no longer support multiple levels of trust

such as Principle of least privilege|basic

user[http://technet.microsoft.com/en-us/library/ee449491(WS.10).aspx

Determining Your Application Control Objectives] (only block or allow are

still supported); this functionality has been superseded by User Account

Control and AppLocker.https://store.theartofservice.com/the-application-control-toolkit.html

Page 41: Application Control .

Blu-ray Disc Java - BD-J Xlet capabilities

1 ** Only (disc) authenticated BD-J applications are allowed to run when

the disc is played. The application controls the use of the network

connection.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 42: Application Control .

Tux Paint - Features

1 * Toolbox, containing the various basic tools (see below) and

application controls (undo, save, new, printing|print)

https://store.theartofservice.com/the-application-control-toolkit.html

Page 43: Application Control .

Direct3D Mobile - Direct3D 10.1

1 Features include finer control over anti-aliasing (both multisampling and

supersampling with per sample shading and application control over

sample position) and more flexibilities to some of the existing

features (cubemap arrays and independent blending modes)

https://store.theartofservice.com/the-application-control-toolkit.html

Page 44: Application Control .

Software-defined Protection - Control Layer

1 Security Solutions commonly implemented within the Control layer

include Firewall, Anti-Virus, Application Control, Zero-day virus|

Threat Emulation, Anti-Bot, Anti-Spam and email security, Data loss

prevention software|Data Loss Prevention (DLP), and Intrusion

prevention system|Intrusion Prevention Systems (IPS)

https://store.theartofservice.com/the-application-control-toolkit.html

Page 45: Application Control .

2X Software - 2X Mobile Device Management

1 2X MDM is a mobile device management platform that enables businesses to address challenges

associated with mobility such as data security, BYOD-related issues, application control and policy

distribution.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 46: Application Control .

Online charging system - Unified charging engine for all services

1 It handles non real-time charging requirements, and its charging

execution process is not directly involved in service application

control

https://store.theartofservice.com/the-application-control-toolkit.html

Page 47: Application Control .

RDM Server - Indexes

1 RDM Server supports regular B-tree based indexes. An index can contain

a single or multiple segments. In addition, it supports optional indexes

where the application controls the index population.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 48: Application Control .

CT Connect - Dialogic Acquired by Intel

1 The late 1990s saw the rising popularity of Voice over Internet Protocol (VoIP) telephony. Realizing that CTI would be as important with VoIP as it had with traditional telephony, the CT Connect team enhanced CT Connect to

support application control of VoIP voice calls. Intel was issued 11 US patentsUS Patents

7,372,957; 7,154,863; 7,126,942; 7,123,712; 7,072,308; 7,068,648; 6,920,216; 6,901,068; 6,876,633; 6,856,618; and 6,201,805. related

to this work.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 49: Application Control .

ThinkPad Tablet - Security

1 *Application control: Lenovo offers preloaded images on the ThinkPad Tablet,

allowing users to customize the applications on the Tablet. Additionally, IT departments can create customized App Shops to restrict the applications that can

be downloaded and installed to the Tablet. The Tablet also included Citrix

receiver, which allows businesses to host and run applications on their own servers.

https://store.theartofservice.com/the-application-control-toolkit.html

Page 50: Application Control .

Rooting (Android OS) - Advantages

1 * Full application control including the ability to backup, restore, or

batch edit applications, or to remove bloatware that comes pre-loaded on

many phones. These features become available with the use of root applications such as Rom Toolbox or Titanium Backup which are among the most popular root applications.

https://store.theartofservice.com/the-application-control-toolkit.html