In: Computer Science
Regarding the book"ESSENTIAL CYBER SECURITY SCIENCE by JOSIAH DYKSTRA, Chapter 4 & Chapter 5 ., especially CHapter 4 & Ch-5 ONLY... Will you please describe in detail the hardware and software used in those chapter (4&5 only)? Thanks
The book "ESSENTIAL CYBERSECURITY SCIENCE" by JOSIAH
DYKSTRA, Chapter 4 and Chapter 5 describes in detail the following
hardware and software been used:
From a broad perspective, chapter 4 discusses about software
assurance, cybersecurity science for software assurance, especially
about a scientific experiment example in software assurance, then
fuzzing for software assurance, the scientific method and the
Software Development Life Cycle (SDLC), the adversarial models, and
a case study about the risk of software exploitability with a new
experiment.
The chapter talks about Fitbot hardware device, "Galileo", a Python utility software used to communicate with Fitbit devices, "Peach fuzzer" or a custom Python script (software) to send random data to the Fitbit device trying to generate crashes. It in general talks about general Operating System (OS); Jira software for issue-tracking system, documenting bugs and allowing the organization to prioritize the order the issues are addressed. It talks about Microsoft’s crash analyzer which calculates an exploitability rating based on crash dumps determining exploitability. It talks about FreeBSD and Windows 7 OS software of obtaining the Evaluation Assurance Level (EAL Level 4). It talks about using CPU days on Amazon Elastic Compute Cloud (EC2), which is the processors (virtual processors, CPUs or hardware) in the cloud. It further talks about web app (software) used in fuzzing for software assurance. It talks about verifying complex hardware and software system using formal methods to evaluate a hypothesis using mathematical models.
It talks about the SLAM engine to be used to check if Windows device drivers satisfy driver API usage rules. Metasploit, Armitage, and Cortana to set up a penetration test.
From a broad perspective, chapter 5 talks about an IDS (Intrusion Detection System) machine for intrusion detection and an IDS analysis engine as free and open-source software. It talks about Snort software to detect Denial-of-Service (DoS) alerting on traffic with the same source and destination IP address raising alarms. It talks about "hping3" which is a versatile packet creation tool; with respect to performance benchmarks, netperf software to measure network traffic; Rodinia software to measure accelerated computing such as GPUs, etc.; Linpack software to measure computing power, sysstat software to provide CPU utilization statistics for analysis; Valgrind software tool to detect memory usage and errors; and many other tools for measuring performance.
It talks about the Snort software tool, which is the free and lightweight network intrusion detection package, a rule-based signature engine and a rich language to create signatures to detect the activity of interest. It talks about CPU and RAM hardware.