SlideShare a Scribd company logo
Security                                eBooks




  Protecting Passwords &
     Securing Servers
                               Steven Davis

                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                      eBooks

     Standard Server
       Architecture




                               •   3-Tier / N-Tier
                               •   Lots of Apps and Services on a box
                               •   Split up for performance, if at all
                               •   … a “mini-cloud”
                               •   Why? Servers Expensive… in the old days
                                                     steve@free2secure.com
Games, iGaming, and Gambling                               +1.650.278.7416
Security                                                        eBooks


   Bootstrap
    Attack!

   • Attackers use weakness in one part of a system to attack
     another
       – Privilege Escalation … dangerous if more privileges can get you
         somewhere
       – SQL Injection … only dangerous if there is something valuable in
         the same database or accessible via the same account


                                                       steve@free2secure.com
Games, iGaming, and Gambling                                 +1.650.278.7416
Security                                                  eBooks

                                   The Server Architecture Problem




•   Lots of tools and lots of developers
     – Many of them not on your team
     – Very few security focused

•   Too many things to go wrong!
                                                   steve@free2secure.com
Games, iGaming, and Gambling                             +1.650.278.7416
Security                                               eBooks

       Solution – More
      Servers (or Virtual
          Servers)


   • Break up online service infrastructure
     to multiple servers by function
   • Reduce number that are internet
     facing
   • Reduce and simplify security
     interfaces
   • Add proxies to isolate data and
     applications


                                              steve@free2secure.com
Games, iGaming, and Gambling                        +1.650.278.7416
Security                                                              eBooks

                One Data Store per Server App




                                                                        Divide for Security
                                        Game Engine

                                        Player Assets

                                        Player Account

                                         Community

                                      Player Access Info

            •   Separate Database & Access Account
            •   Separate Data Store
   BETTER




            •   Separate Virtual Server w/own Database App
            •   Separate Actual Server

            Add “Connector” Datastores (Login Status, Player Stats, etc.) rather
              than links to critical databases
                                                             steve@free2secure.com
Games, iGaming, and Gambling                                       +1.650.278.7416
Security                                                                              eBooks

               Combine with Proxy Security
   Some online games dangerously include a SQL client and talk directly to the game server




                                                          Rules Validation
                                        Data Validation
                        Validation
                        Message


    Incoming
    Message                                                                     Database




   • Protecting Database from SQL injection / direct queries
   • Allows Rules Validation on Server or reallocation to other
     players

                                                                             steve@free2secure.com
Games, iGaming, and Gambling                                                       +1.650.278.7416
Security                                                                eBooks

 Make Password Service a “Dumb Appliance”

                            Secure             User Name / Account Name
   Password
                            Session
    Server                                 Account Name / Password Identifier
                            Server
                                           Password Identifier / Password Seed
             Login Server
                                        Password Identifier / Password Transform

   • Separate out Password verification from Login Service/Server
   • Have Password Service work at a slow pace
   • Use VERY SLOW Cryptography
       – Select algorithms or combinations of algorithms to take a specific
         amount of time… traditional cryptography is designed to run fast to
         support communications…. This is not the problem we face with
         passwords!
   • Consider Split Architectures

                                                             steve@free2secure.com
Games, iGaming, and Gambling                                       +1.650.278.7416
Security                                               eBooks

                                     Protect Email and
             Online Service
                                     Identity Info… by
                 Login Service          taking them
              (Encrypted) Active           offline
             Info Updates Service



  •   Users don’t need regular        Back Office
      access to their entire
      identity profile… so take        Personal Info
      what is not needed
      regularly offline                   Email
  •   Only have temporary
      store for user info while it
      is being entered or              Payment Info
      changed

                                              steve@free2secure.com
Games, iGaming, and Gambling                        +1.650.278.7416
Security                                                   eBooks


                    Six Forms of
                    Personal ID

    • Separate them and use
      them all
       – Login Name                Using emails for user names or
       – Internal Account Number   user names for handles just
       – Handle (Community name)   makes attacking easier
       – Email
       – Personal Contact
         Information
       – Payment Information

                                                 steve@free2secure.com
Games, iGaming, and Gambling                           +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
       – I have worked on everything from
         online games and satellite TV to
         Nuclear Command and Control and
         military communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”

  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/
       – Join me there, ask questions, challenge assumptions, let’s make things
         better

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

More Related Content

PPTX
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
PPTX
Pricing and Revenue Projection in a Cloud-Centric World
PDF
I GOvirtual En Brochure
PPTX
Getting Started with Containers
PPTX
The VDI InfoSec Conundrum
PPTX
17h30 aws enterprise_app_jvaria
PPTX
AWS Users Authentication
PPTX
Introduction To AWS IoT - SoCalCodeCamp Nov 2016
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
Pricing and Revenue Projection in a Cloud-Centric World
I GOvirtual En Brochure
Getting Started with Containers
The VDI InfoSec Conundrum
17h30 aws enterprise_app_jvaria
AWS Users Authentication
Introduction To AWS IoT - SoCalCodeCamp Nov 2016

Viewers also liked (6)

PPT
Protect Your Client Software and Identification Security
PPT
Fight Game Cheating the Easy Way
PPTX
Fighting online game cheating with cryptography
PPTX
Game Design Principles and Inspiration
PPT
Protect Data in Your Software Client - Data Obfuscation
PPT
Online Security - The Good, the Bad, and the Crooks
Protect Your Client Software and Identification Security
Fight Game Cheating the Easy Way
Fighting online game cheating with cryptography
Game Design Principles and Inspiration
Protect Data in Your Software Client - Data Obfuscation
Online Security - The Good, the Bad, and the Crooks
Ad

Similar to Protect Your Passwords, Secure Your Servers (20)

PDF
Invited Talk - Cyber Security and Open Source
PPTX
IT Security for Nonprofits 101
PDF
Issa chicago next generation tokenization ulf mattsson apr 2011
PPTX
[DSBW Spring 2009] Unit 08: WebApp Security
PPTX
Mis05
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
Unit 08: Security for Web Applications
PPTX
Introducing Oracle Audit Vault and Database Firewall
PPTX
eSecurity! Keeping your Business and Customers Safe
PDF
Basic security concepts
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PDF
Getting users to care about security
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PDF
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
PDF
Information systems security(1)
PDF
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
PPTX
Maloney slides
Invited Talk - Cyber Security and Open Source
IT Security for Nonprofits 101
Issa chicago next generation tokenization ulf mattsson apr 2011
[DSBW Spring 2009] Unit 08: WebApp Security
Mis05
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Unit 08: Security for Web Applications
Introducing Oracle Audit Vault and Database Firewall
eSecurity! Keeping your Business and Customers Safe
Basic security concepts
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Getting users to care about security
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer.pptx
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Information systems security(1)
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Maloney slides
Ad

Recently uploaded (20)

PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
System and Network Administraation Chapter 3
PPTX
Transform Your Business with a Software ERP System
PDF
medical staffing services at VALiNTRY
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Understanding Forklifts - TECH EHS Solution
PDF
AI in Product Development-omnex systems
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Nekopoi APK 2025 free lastest update
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
How to Migrate SBCGlobal Email to Yahoo Easily
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
System and Network Administraation Chapter 3
Transform Your Business with a Software ERP System
medical staffing services at VALiNTRY
Wondershare Filmora 15 Crack With Activation Key [2025
ISO 45001 Occupational Health and Safety Management System
Understanding Forklifts - TECH EHS Solution
AI in Product Development-omnex systems
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
ai tools demonstartion for schools and inter college
Odoo POS Development Services by CandidRoot Solutions
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Softaken Excel to vCard Converter Software.pdf
Nekopoi APK 2025 free lastest update
CHAPTER 2 - PM Management and IT Context
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...

Protect Your Passwords, Secure Your Servers

  • 1. Security eBooks Protecting Passwords & Securing Servers Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Standard Server Architecture • 3-Tier / N-Tier • Lots of Apps and Services on a box • Split up for performance, if at all • … a “mini-cloud” • Why? Servers Expensive… in the old days steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks Bootstrap Attack! • Attackers use weakness in one part of a system to attack another – Privilege Escalation … dangerous if more privileges can get you somewhere – SQL Injection … only dangerous if there is something valuable in the same database or accessible via the same account steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks The Server Architecture Problem • Lots of tools and lots of developers – Many of them not on your team – Very few security focused • Too many things to go wrong! steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks Solution – More Servers (or Virtual Servers) • Break up online service infrastructure to multiple servers by function • Reduce number that are internet facing • Reduce and simplify security interfaces • Add proxies to isolate data and applications steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks One Data Store per Server App Divide for Security Game Engine Player Assets Player Account Community Player Access Info • Separate Database & Access Account • Separate Data Store BETTER • Separate Virtual Server w/own Database App • Separate Actual Server Add “Connector” Datastores (Login Status, Player Stats, etc.) rather than links to critical databases steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Combine with Proxy Security Some online games dangerously include a SQL client and talk directly to the game server Rules Validation Data Validation Validation Message Incoming Message Database • Protecting Database from SQL injection / direct queries • Allows Rules Validation on Server or reallocation to other players steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Make Password Service a “Dumb Appliance” Secure User Name / Account Name Password Session Server Account Name / Password Identifier Server Password Identifier / Password Seed Login Server Password Identifier / Password Transform • Separate out Password verification from Login Service/Server • Have Password Service work at a slow pace • Use VERY SLOW Cryptography – Select algorithms or combinations of algorithms to take a specific amount of time… traditional cryptography is designed to run fast to support communications…. This is not the problem we face with passwords! • Consider Split Architectures steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Protect Email and Online Service Identity Info… by Login Service taking them (Encrypted) Active offline Info Updates Service • Users don’t need regular Back Office access to their entire identity profile… so take Personal Info what is not needed regularly offline Email • Only have temporary store for user info while it is being entered or Payment Info changed steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Six Forms of Personal ID • Separate them and use them all – Login Name Using emails for user names or – Internal Account Number user names for handles just – Handle (Community name) makes attacking easier – Email – Personal Contact Information – Payment Information steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise – I have worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ – Join me there, ask questions, challenge assumptions, let’s make things better steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Editor's Notes

  • #3: http://docs.oracle.com/cd/A97335_02/busint.102/a90287/vwarch1.gif