Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc...
Transcript of Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc...
![Page 1: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/1.jpg)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.
The OWASP Foundation
OWASP
http://www.owasp.org
Security of Mobile Ad Hoc and Wireless Sensor Networks
Edward Bonver
OWASP LA Board Member
Symantec Corporation
July, 2013
![Page 2: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/2.jpg)
OWASP
Agenda
Intro
What are MANETs and WSNs?
Problem Space and Challenges wrt to Security
. . .
Drinking @ BJ’s Restaurant & Brewary, across the street
2
![Page 3: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/3.jpg)
OWASP
Who am I?
3
Senior Principal Engineer, Office of the CTO, Symantec Approaching 10 years @ Symantec
Development @ QA engineering background
Prior to Symantec: operating systems & networking protocols
OWASP LA board member
Father of three (future world changing persons) Note to self: robot programming and first Emails…
Computer Science Ph.D. student
Famous for long introductions
![Page 4: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/4.jpg)
OWASP
What are MANETs?
4
![Page 5: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/5.jpg)
OWASP
Mobile Ad-hoc Networks
Do not rely on an existing infrastructure
Wireless communications
Mobile nodes (constantly changing topology)
Nodes must be able to relay traffic, as communicating nodes might be out of range
MANET can be self-forming and standalone or attached to other networks
5
![Page 6: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/6.jpg)
OWASP 6
MANET vs. “Traditional” Wireless Network
![Page 7: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/7.jpg)
OWASP
MANET Example: Vehicular Ad-Hoc Network (VANET)
7
![Page 8: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/8.jpg)
OWASP 8
![Page 9: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/9.jpg)
OWASP
9
![Page 10: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/10.jpg)
OWASP
What are Wireless Sensor Networks?
10
![Page 11: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/11.jpg)
OWASP
Sensor Network
Consists of a number of small nodes
Each node is capable of:
Communications
Sensing
Computation
Typically, measures physical phenomena
11
![Page 12: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/12.jpg)
OWASP
Wireless Sensor Network
Each sensor node is equipped with a radio transceiver, microprocessor, sensors.
Such nodes can autonomously form a network, through which sensor readings can be propagated
Data can be processed as it travels through the network, because nodes have some intelligence
12
![Page 13: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/13.jpg)
OWASP
Wireless Sensor Network
13
![Page 14: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/14.jpg)
OWASP
Typical WSN Applications
Weather survey in hard-to-access geographical locations (e.g., mountains, ocean floor)
Battlefield (e.g., surveillance and reconnaissance)
14
![Page 15: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/15.jpg)
OWASP
Security in MANETs and WSNs
15
![Page 16: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/16.jpg)
OWASP
Security Trade-offs
16
Cost
Security Performance,
Functionality
![Page 17: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/17.jpg)
OWASP
Types of Attacks
17
Application Layer: Malicious code, Repudiation
Transport Layer:
Session hijacking, Flooding
Network Layer:
Black Hole, Worm Hole, Link Spoofing, Location disclosure etc.
Data Link/MAC:
Malicious Behavior, Selfish Behavior
Physical:
Interference, Traffic Jamming, Eavesdropping
![Page 18: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/18.jpg)
OWASP
Types of Attacks (cont.)
18
Passive (difficult to detect)
Active
External External malicious nodes attempting to DoS the network
Internal A (compromised) node that’s already an authorized part of the
network, performing malicious actions Compromised nodes can use security measures to protect their
attacks
![Page 19: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/19.jpg)
OWASP
Security Challenges
Resource scarcity
Highly susceptible to physical attacks (e.g., node capture)
Sensor networks closely interact with people and with their physical environments
Communication patterns differ from traditional networks
19
![Page 20: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/20.jpg)
OWASP
Physical Security
Main concern: node-capture
How vital is this node? What functionality do adversaries have access to now? Keys? Sensor data? Etc.
“I am behind a firewall” mentality
Drastically different threat model
20
So am I! (behind
your firewall)
![Page 21: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/21.jpg)
OWASP
Crypto-related Challenges
21
![Page 22: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/22.jpg)
OWASP
Key Management
Trust model
Key creation
Key distribution
Key storage
22
![Page 23: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/23.jpg)
OWASP
Key Establishment: Take One
Simplest thing ever: one shared key
23
![Page 24: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/24.jpg)
OWASP
Key Establishment: Take Two
Use a single shared key to establish a set of link keys
24
![Page 25: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/25.jpg)
OWASP
Securing WSNs
Symmetric key crypto was the only way to address encryption, until recently.
Does not scale for WSNs.
Use Identity-Based Encryption
Nodes can exchange information that uniquely identifies each node, and can be used to exchange keys and to encrypt data
(Oliveira, et al., 2007)
25
![Page 26: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/26.jpg)
OWASP
Comparing Crypto Schemes for WSNs
Symmetric key Cryptography
Public Key Cryptography
Identity-Based Cryptography
Computational Complexity
Low High High
Communication Overhead
Low High Low
Key Distribution Problematic Complex Simple
Number of Keys O(n2) O(n) n
Key Directory At Each Node At Each node or Key Center
No
Non-Repudiation No Yes Yes
Forward Encryption No No Yes
26
![Page 27: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/27.jpg)
OWASP
Routing and Intrusion Detection-related Challenges
27
![Page 28: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/28.jpg)
OWASP 28
![Page 29: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/29.jpg)
OWASP
Aggregation Trees in WSNs
29
![Page 30: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/30.jpg)
OWASP
Types of Routing Protocols
Proactive
Typically table-driven and distance-vector protocols
Reactive (source-initiated on-demand)
Hybrid
30
![Page 31: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/31.jpg)
OWASP
Attacks
31
![Page 32: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/32.jpg)
OWASP
Spoofing (Man-in-the-Middle)
32
I am ‘B’!
![Page 33: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/33.jpg)
OWASP
Fabrication
33
Malicious node sends false (but “valid”) routing messages, to change the topology
e.g.: neighbors B and C are no longer available
![Page 34: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/34.jpg)
OWASP
Wormhole Attack
34
![Page 35: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/35.jpg)
OWASP
Modification
35
Tamper with the packet’s data payload (attack on integrity)
![Page 36: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/36.jpg)
OWASP
Denial of Service
36
In general ad-hoc networks are supposed to withstand DoS better than fixed networks
![Page 37: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/37.jpg)
OWASP
Sinkholes
37
Malicious node tries to attract all traffic to itself
e.g. by faking to be the best route for other nodes
![Page 38: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/38.jpg)
OWASP
Sleep Depravation
38
A.k.a. Resource Consumption Attack
Consume battery on the target by constantly communicating with it (routing updates, relay requests, etc.)
![Page 39: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/39.jpg)
OWASP
Sybil Attack
39
Malicious node takes on identity of many other nodes, again, making other nodes communicate with it.
![Page 40: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/40.jpg)
OWASP
Attacking the Sensors
40
Tampering with the surrounding environment to full the sensors
In general, WSNs are well positioned to detect such attacks
![Page 41: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/41.jpg)
OWASP
Other Attacks
41
Eavesdropping
Black hole attack
Malicious node falsely advertises routes without having actual routes established
Byzantine attack
confuse target nodes with non-optimal routing updates
Flooding (the entire network vs. DoS of a single node)
Replay attack
Location disclosure attack
![Page 42: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/42.jpg)
OWASP
Detecting Malicious Events
42
![Page 43: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/43.jpg)
OWASP
References
Ahmed, A. A., Shi, H., & Shang, Y. (2003). A Survey on Network Protocols for Wireless Sensor Networks. Paper presented at the Information Technology: Research and Education, 2003. Proceedings. ITRE2003. International Conference on.
Coelingh, E., & Solyom, S. (2012). All Aboard the Robotic Road Train. Spectrum, IEEE, 49(11), 34-39. doi: 10.1109/MSPEC.2012.6341202
Oliveira, L. B., Dahab, R., Lopez, J., Daguano, F., & Loureiro, A. A. F. (2007). Identity-Based Encryption for Sensor Networks. Paper presented at the Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on.
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in Wireless Sensor Networks. Commun. ACM, 47(6), 53-57. doi: http://doi.acm.org/10.1145/990680.990707
Sharifi, M., Ardakani, S. P., & Kashi, S. S. (2009). SKEW: An Efficient Self Key Establishment Protocol for Wireless Sensor Networks. Paper presented at the Collaborative Technologies and Systems, 2009. CTS '09. International Symposium on.
Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks. Wireless Communications, IEEE, 14(5), 56-63. doi: 10.1109/MWC.2007.4396943
43
![Page 44: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/44.jpg)
OWASP
Conclusion
Don’t treat MANETs & WSNs as your average network
Large problem space wrt security
Always backup your PowerPoint presentations!
44
![Page 45: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/45.jpg)
OWASP
Q&A
45
![Page 46: Security of Mobile Ad Hoc and Wireless Sensor Networks · 2020-01-17 · Security of Mobile Ad Hoc and Wireless Sensor Networks Edward Bonver OWASP LA Board Member Symantec Corporation](https://reader033.fdocuments.us/reader033/viewer/2022042201/5ea1e4e217b4321ba114ed2b/html5/thumbnails/46.jpg)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.
The OWASP Foundation
OWASP
http://www.owasp.org
Thank You!
Edward Bonver