A Secure Infrastructure for Computationally Weak Clients

Size: px
Start display at page:

Download "A Secure Email Infrastructure for Computationally Weak Clients"

Transcription

1 A Secure Infrastructure for Computationally Weak Clients J. Robert von Behren and ByungHoon Kang Abstract: Security in systems involves computationally expensive public key cryptography operations. This makes it difficult to deploy secure systems for computationally weak environments, such as personal digital assistants. To solve this problem, we have developed a secure framework in which computationally weak clients can use a trusted server to perform difficult cryptographic operations on their behalf. As an added benefit, slight modifications to our scheme make it simple to add security on top of older systems that do not support security. 1 Introduction 1.1 Problem Security in communication is generally achieved through public key cryptography. Unfortunately, public key operations are computationally expensive, and hence inappropriate for some computing environments. In particular, personal digital assistants (PDAs) are too slow to make wide use of public key cryptography feasible. This is an increasingly important problem, as small computing devices are becoming more widespread. Moreover, the disparity in computing resources between PDAs and workstation or server machines is fundamental. In order to be convenient and appeal to a mass market, PDAs must be small and inexpensive. Hence they will never have as much computational power as larger, more expensive machines, and won t be able to "catch up" to the cryptographic capabilities of their larger counterparts. 1.2 Current State of Security Current secure systems (PGP and S/MIME, for example) place the responsibility for security in the hands of the sender and the recipient. This means that while the software and machines of the end users must be completely trusted, none of the remaining infrastructure need be trusted at all. Additionally, current systems have relatively good failure modes. Although the end-user machine stores the private key used by the user for decrypting and signing messages, this key is stored encrypted with a pass phrase known only to the user. The key itself is decrypted only when it is used. This limits the damage potential if the user s machine is compromised. 1.3 Our Approach To allow PDA software to take advantage of secure , we have created a proxy server that the PDA can use to perform cryptographic operations on its behalf. This extends the trust perimeter to include not only the PDA but the proxy server as well. Our primary goal was to minimize the amount of trust an end user would need to place in the proxy server, and hence carry as much of the current trust semantics for secure systems over to the PDA environment. 1.4 Organization of This Paper This paper is organized into seven additional sections. Section two details the motivation for this work, as well as our initial goals. Section three describes our design and four our specific implementation decisions. In section five, we evaluate the security implications of our work, and in eight we summarize some of the important things we learned and suggest possible future directions. Finally, we conclude in section seven and list our references in section eight.

2 2 Motivation and Goals 2.1 The Problem Why cryptographic ? is an extremely important means of communication for an increasingly large population. Compared with traditional paper communications such as letters or faxes, has the tremendous advantages that it is almost instantaneous (barring backlogged servers, network outages, etc.) and that it allows easy communication both between pairs of individuals and larger groups. In its most basic incarnation, however, it provides no good mechanism for ensuring the privacy of the contents of messages or for proving their authenticity. Cryptographic systems such as PGP and S/MIME overcome these shortcomings by allowing users to encrypt and/or digitally sign the text of their messages before they are sent out. This provides end-to-end security between the sender and receiver. As becomes increasingly used for business transactions, the authenticity and privacy guarantees that cryptographic systems provide will become increasingly attractive. Public key cryptography in systems Public key cryptography is an essential technology for allowing the widespread use of encryption. One of the primary advantages of communication via is its convenience - makes it very simple to communicate with people all over the world without ever meeting them. Hence, it is important for any technology that secures communication to preserve this ease of use. Public key cryptography is essential for this, because it allows individuals who have never communicated before to send each other private messages. This would not be possible with shared-key cryptography, since they would first have to have some out of band mechanism for exchanging cryptographic keys. Enter the Personal Digital Assistant Unfortunately, current public key cryptosystems are not well suited to certain application environments. Public key cryptography relies on mathematical functions that are difficult to invert without some special piece of knowledge. Since the numbers involved in this are typically of a particular form, a would-be attacker could easily rule out a large fraction of possibilities when trying to guess for the private key. This means that a k-digit pubic key will always be less secure than a k-digit key in a shared key cryptosystem. The end result is that keys used in public key systems must be much larger than the keys used in shared key systems to achieve the same level of security. This poses a significant problem for computationally weak platforms such as Personal Digital Assistants (PDAs). For example, while manipulating 128-bit shared keys using the blowfish shared key cryptosystem is quite easy on the 3COM PalmPilot, performing operations on 1024-bit RSA public keys is very time consuming. Hence, using secure on PDAs requires an unreasonable time investment on the part of the user, while they wait for their mail to be decrypted. A fundamental problem? The seemingly natural solution to this problem would be to wait for technology to improve a little, and provide more computational power for small devices. In a couple of years, it may not be unreasonable to have an inexpensive hand-held device that can quickly perform operations on 1024-bit numbers. At the same time, however, the more expensive machines attackers would use to find a user s private key would have also become more powerful. The fundamental question is whether or not the computational power of PDAs will increase quickly enough to allow them to perform public key operations on numbers that are large enough that an attacker cannot break them. Fortunately, mathematics is somewhat on the side of the PDA in this case, since as key size increases the difficulty of breaking the key grows much faster than the difficulty of using it. It is not clear that this alone will be enough, however, since there are a number of factors that tend to limit the increased computational power available to PDAs:

3 1. Cost. PDAs are designed to appeal to a wide consumer audience. Hence, to succeed, manufactures must try to deliver acceptable performance for the lowest possible cost. Since the common PDA tasks such as appointment scheduling are not CPU intensive, it seems likely that manufacturers will not want to increase the cost of their devices by using microprocessors that are faster than required for most applications. 2. Size. For convenient integration into day to day life, PDAs must be very small. In fact, the trend seems to be toward adding computation capabilities to smaller and smaller devices, such as cellular phones and watches. Given this strong requirement for smaller and more easily portable devices, it is likely that processor speed and sophistication may be compromised in favor of smaller size. Furthermore, small size precludes many of the advantages of newer workstations, such as the option of multiple CPUs or special-function chipsets to increase computation power. 3. Power requirements. Because PDAs are battery operated, they must also be very conservative with their power consumption. Hence, manufacturers may choose energy efficiency over computation power when deciding on microprocessors for the next generation of PDAs. 4. Increased resources for attackers. With networked computation becoming more and more feasible, attackers may well be able to use not only their own machines but potentially a huge number of unused CPU cycles on other machines in order to break someone s private key. This will make it even more difficult for an unaided PDA to compete with the computational resources available to a would-be attacker. 2.2 Design Objective The approach we have taken to solve this disparity in force between potential attackers and PDA users is to find a secure mechanism through which a PDA user could harness the computing resources of a trusted server machine. Our fundamental goal was to design a system in such a way that its trust perimeter would match that of existing secure systems as closely as possible. Hence, users would be just as safe using our system as they would be using existing secure systems. 2.3 Background on Systems security In order to understand the implications of our desire to mimic the trust boundaries of current secure systems, we first must clearly understand the properties we are trying to emulate. Current secure systems place the responsibility for all of the privacy decisions in the user s hands. For example, with the commonly used Pretty Good Privacy (PGP) system, users use shell commands to perform cryptographic operations on both incoming and outgoing messages. To send a secure message, the user goes through the following steps: Create a file with the plaintext of the message to be encrypted Invoke PGP to do the encryption and/or signing Insert the encrypted text into an message The steps for receiving cryptographic messages are similar: Save the encrypted text to a file Invoke PGP to do decryption and/or signature verification Read the decrypted output file Naturally, many mail readers have been modified to do these steps automatically, which makes using the system more convenient. PGP stores the user s private key in a file on the file system, but encrypts it with a pass phrase chosen by the user. When the privileged actions of decryption and signing are required, the user is prompted for the pass phrase to unlock the private key. Since other secure systems such as S/MIME and PEM are structured similarly, we focus on the use of PGP in our examples and in our implementation. The threat model There are two things that any secure system tries to guarantee:

4 The contents of messages that are deemed private by the user (via encryption). The authenticity of messages that come from the user (via digital signatures). Any compromise to either of these is a serious breach in the system s security. Since knowledge of the user s private key would allow an attacker to break both of the above guarantees, security of the private key is one of the most important aspects of cryptography. Although there may be unknown flaws in the cryptographic aspects of an security system, our design simply allows a PDA user to make use of an existing cryptographic system on a proxy server. Hence, the cryptographic security of the decryption and signing activities are identical between our system and the existing system on which it is deployed. Similarly, encryption and signature verification rely on being able to learn the correct public key for the person with whom we are communicating. Since this issue also does not change for our system, we do not deal with it here. In analyzing the differences between our system and the status quo, we are therefore primarily interested in attacks on the infrastructure, rather than attacks on the cryptographic algorithms themselves. Potential points of failure are as follows: 1. Attacks on individual messages or signatures. An attacker with access to the user s account could read or modify the plaintext before it is signed, or after it is decrypted (depending on whether the user is sending or receiving the message). 2. Attacks on pre-installed software. An attacker with administrator access to the user s machine could install a rogue mail or PGP program on the system. (This could probably also be done with just user-level access, by modifying the user s PATH environment variable.) 3. Attacks on running software. An attacker with access to the user s account could use debugging tools to attach to a running copy of the PGP binary, and read the user s private key from memory. 4. Attacks on the PGP pass phrase. An attacker with access to the user s account could use a brute-force attack to try to break the pass phrase encryption of the user s private key. Since pass phrases are usually meaningful natural language phrases (or slight variations thereof) they may be susceptible to dictionary attacks. Additionally, pass phrases are often much shorter than the private keys they protect, so a brute force attack may be feasible. Trusted computing base Since we are not concerned with the cryptographic security issues of PGP, it is not surprising that all of the attacks above require access to the user s account. This allows us to easily define the trusted computing base for secure 1. Cryptography and software. These must be trusted not to divulge the user s private key (or equivalently the user s pass phrase), as well as to sign only the messages requested by the user and to not divulge the contents of any decrypted messages. To trust this software means that the user feels reasonably confident that they know enough about the software to know that it should perform only appropriate actions and that it has not been tampered with - either before or after installation. 2. The user s machine. Clearly, the user must be able to trust that her machine has not been compromised in some way, as otherwise all of the above attacks will be possible. Although it might be possible to limit the trust in the user s machine in some way, in practice it is probably better to err on the side of being overly suspicious. Hence, as long as the user can ensure both that their software does not intentionally violate their privacy and that no untrustworthy parties have access to their account. 3 Design - the Secure Proxy 3.1 Overall System Architecture

5 As shown in Figures 1 and 2, our Secure Proxy (SEProxy) is located between the client program and the existing server. The client connects to the proxy and provides it with the information it needs to retrieve messages from the user s mail server. Additionally, the client provides the proxy with the capability to both decrypt and sign messages on her behalf by sending the proxy the user s PGP pass phrase. To retrieve messages, the client software first fetches a list of available messages from the proxy. The client checks to see if any are new, and if so requests them. When the proxy receives a request for a specific message, it downloads it from the mail server, decrypts and verifies signatures (if necessary), and then sends it off to the client. N e tw o r k D ia g ra m IM A P I M A P S e rv e r SE P protocol SE P protocol S e c u re E m a il P ro x y L egacy protocol e.g ) P O P L e g a c y E m a il S e rv e r e.g ) P O P S e rv e r C o m p u ta tio n a lly w e a k C lie n t F u t u re p ro to c o l F u tu re E m a il S e rv e r : E n c ry p te d L in k : U n E n c ry p t e d L in k Figure Secure Proxy Protocol To control the communication between the client and the proxy, we have developed a Secure Proxy Protocol (SEPprotocol). SEPprotocol provides a very simple mechanism for allowing the client to send the proxy the information it requires for retrieving mail from the server and for performing message decryption and signing on behalf of the user. SEPprotocol also defines some simple mechanisms for sending messages between the client and the proxy, and for requesting specific messages. The typical data flow for downloading a message is shown in Figure 2. S ecure E mail P roxy Protocol Example 1. Retr hint Cache Hit 2. Check Cache Secure Proxy 5. Decrypt PGP message and Encrypt with shared-key Cache Miss 3. Request message 4. PGP message Legacy Server 6. Message Data : Encrypted Link : UnEncrypted Link Figure 2

6 The following is the command set currently used in SEProxy. Authorization process 1. USER <username>: username is passed followed by command word USER 2. PASS password : password of user s access is passed followed by command word PASS 3. SECR pass_phrase_to_private_key: pass-phrase to access the user s private key is passed followed by command word SECR (SECR can be unnecessary where pass-phrase is stored on the proxy as in firewall example) After authorization 4. LIDX message-number : last message number the client has retrieved recently is passed followed by command word LIDX (this is typical for optimization and it depend on the client application needs) 5. RETR message-number : the requested message id number is passed followed by command word RETR 6. SEND message-data : the message-data is passed to SEProxy to be PGP processed and sent out 4 Implementation 4.1 SEProxy The SEProxy server is intended to run on a user s workstation, and serve only one user. This assumption has very nice implications for the security of the system, which are discussed in 5. Additionally, this allowed us to take advantage of the existing PGP setup of the host machine. For example, we assume that the user has configured PGP to behave as they would like, in terms of finding public keys from a key server or from the user s key ring, etc. The single user model also simplified the performance requirements of the proxy, and allowed us to focus on the security aspects of the system. The code for the proxy consists of approximately 2300 lines of JAVA code (including copious comments). This makes security analysis of the code extremely simple. The proxy communicates to POP and IMAP servers through the interfaces provided in the javamail package, available from SUN Microsystems [JAVAMAIL]. At present, our implementation uses the existing PGP software for all encryption and decryption functionality [MITPGP]. This presents an additional potential for security holes, since SEProxy must spawn another process and pipe messages through it. This flaw is not intrinsic to our design, however. It should be easy to replace the cryptographic functionality of PGP with internal code by using the JAVA Cryptography package, which should be released in the near future. Configuration of the proxy is handled through an external configuration file. Configurable items include the type (POP or IMAP) and host name of the mail server, the port on which the proxy should listen for connections, and the location of the log file. The log file is particularly important, since it provides an audit trail in the case of a security breach. In order to provide fail-safe default behavior (from the cryptographic sense), the proxy is particularly draconian in its handling of unexpected events. Rather than retrying resources, any failure (for example to write to the log file, or to download a message from the mail server) results in immediate termination of the connection, and the destruction of any secure information stored on the proxy. Although this may make the proxy less friendly in some circumstances, it also makes it much easier to understand and predict its behavior. This simplifies the security analysis. Additionally, since exceptional situations should only happen occasionally, this overreaction should not effect normal usage. 4.2 PDA Client Software To demonstrate our system, we have developed a simple client application for the 3COM PalmPilot platform. Computational resources on the PalmPilot are scarce, which makes it a perfect candidate for outside help with secure functionality. At present, the user interface for the Pilot client is quite rudimentary. Users are given the ability to choose an appropriate SEProxy server and port, as well as to specify their user name and password. When the client connects to SEProxy, the user is asked to provide their PGP pass phrase, which is then sent to the proxy. Finally, the client finds out which messages are new since its last check, and downloads them.

7 Developing secure software for the Pilot is difficult for several reasons. The most important problem is that there is no way to prevent another application from stopping the client software, and reading its memory. As a result, we are forced to consider the entire Pilot to be part of the trusted computing base. (See 5.1) There are a number of improvements to the client interface we hope to implement in the near future. Among them, we would like to offer the user the ability to select which messages to download as well as to control whether or not to truncate or otherwise filter messages as they come in. Additionally, we would like to add some improvements to the SEPprotocol to allow for more efficient decisions as to which messages should be downloaded, etc. These features are tangential to our security concerns, so we do not discuss them further here. 4.3 Secure Service for Multivalent Document Browser As an example of another possible use of the SEProxy architecture, we have modified the client available with the Multivalent Document (MVD) Browser 1 to speak the SEPprotocol. On the whole, these changes took only a few days to implement. The ease with which this was achieved demonstrates the flexibility of the proxy architecture. By redirecting the MVD client s pop address to our proxy server address, we have added security to this client almost for free. A demonstration of this can be found at As an expansion on this idea, it would also be possible to modify SEProxy to act as a trusted mail server for legacy clients that could not be modified. To accomplish this, the proxy would have to be trusted with permanent access to the user s private key, rather than requesting the PGP pass phrase from the client. The SEPprotocol would also have to be replaced by the protocol understood by the legacy client (such as POP or IMAP). Given these changes, however, security could easily be added to legacy clients. This arrangement might be reasonable as a part of a firewall mail proxy, since the firewall machine already must be heavily trusted. Additionally, since the network communication between the firewall and the client is safe from outside snooping, it is not necessary to otherwise secure the communication link between the two. 4.4 Communication The communication between the client and the proxy is handled with standard TCP/IP routines in JAVA and C. At present, we have not implemented any security for this communication link. Hence, for the purposes of our security analysis we simply assume that the link is secure. Fortunately, securing this link should not be difficult. Current work at UC Berkeley should provide a simple mechanism for creating secure connections between computationally weak clients and existing SSL services. This will allow us to easily add security to the PDA client communications. For SEProxy and the MVD client, the SSL implementation in the upcoming JAVA security package will provide the necessary secure communication support. 5 Evaluation - Security Analysis 5.1 Trusted Computing Base for SEProxy As mentioned in 2.2, the goal of SEProxy was to provide a secure environment for PDAs and other computationally weak clients that had security properties equivalent to those of current security systems. While our design does increase the trust boundary, we believe these increases are quite acceptable. Our design comes very close to this goal, as the trust a user would have to place in the SEProxy system is very similar to the trust that current users place in PGP. 1 The Multivalent Document Browser was developed as part of the Berkeley Digital Library project. MVD allows users to put an open-ended variety of annotations, such as executable copyeditor marks, Post-it style notes, or highlights, on other individuals plain text, HTML, or scanned image documents. The resulting composite documents can then be shared. The documents themselves may be accessed via different network services, including HTTP (i.e., the web) and . The MVD client sends an HTML wrapper which the client uses to invoke the sender s MVD document. The MVD client can also bring his/her into MVD window for annotation or copy-edit-marking with various MVD features.

8 With the design of SEProxy in mind, we revisit the potential failure points discussed earlier for PGP: 1. Attacks on individual messages or signatures. (reading a message after it is decrypted or modifying a message before it is signed) The only place where the plaintext of a message is intentionally stored unencrypted is on the PDA. However, it is also possible that the operating system on the proxy may temporarily store information to disk by writing it out to the swap file. Hence, this point of failure exists on both the proxy and the PDA. 2. Attacks on pre-installed software. (Installing bogus PGP or software) This also could effect both the PDA and the proxy, since either could divulge important information if they were running rogue software. 3. Attacks on running software. (Reading private data from program memory) These would be possible for both the PDA and the proxy. 4. Attacks on the PGP pass phrase. (Attempting to recover the user s private key by guessing the pass phrase.) The encrypted private key is stored only on the proxy server, so this attack is only possible if the attacker gains access to the proxy machine. The SEProxy architecture also makes the following attack possible: 5. Attacks on network communication. SEProxy introduces the need for the client to communicate securely with the proxy server. If an attacker can somehow subvert the encryption of this communication, they could read not only the contents of private messages but the PGP pass phrase itself. Alternatively, if the authentication step of the communication handshake could be subverted, the PDA user could be tricked into starting a session with a bogus proxy. Based on these attack models, we can now describe the trusted computing base for SEProxy: 1. Cryptography and software on the PDA. These must be trusted not to divulge the user s private key (or equivalently the user s pass phrase), as well as to sign only the messages requested by the user and to not divulge the contents of any decrypted messages. To trust this software means that the user feels reasonably confident that they know enough about the software to know that it should perform only appropriate actions and that it has not been tampered with - either before or after installation. 2. The PDA. The PDA must be trusted not to have other rogue software that attempts to read the memory of an active SEProxy session. 3. The proxy software. The proxy software must be trusted not to permanently store private information or to intentionally divulge it to some third party. 4. The proxy machine. The proxy machine must be trusted to prevent outsiders from accessing the user s account on the machine. 5. The network. The network communications protocol between the PDA and the proxy must be trusted to correctly protect private information sent between the proxy and the PDA. If the user were only interested in reading on the PDA and did not use the proxy server machine for reading mail, this would make the security situation worse than at present, since the user would be required to trust twice as many machines, twice as much software, and a network connection. In most cases, however, we expect the PDA client to be a supplement to the user s activity on their workstation. In this case, the user is already forced to trust the security of the workstation. Hence, it is reasonable that in order to use security on another machine, that machine must also be trusted. In this case, the only additional trust the user must place is in the network connection. Since secure network communications are relatively well understood, we feel that this addition is reasonable, given added convenience of reading secure from a very portable client such as a PDA. 5.2 Security Principles To justify the trust a user would have to place in the SEProxy system, we now analyze the system according to the security principles laid out in Jerome Saltzer and Michael Schroeder s paper The Protection of Information in Computer Systems. [SALTZER] Although many of these themes are mentioned in various places throughout this paper, we feel it is useful to make them explicit here, as they help to clarify the behavior of the SEProxy system.

9 Economy of mechanism Wherever possible, the code design of both the proxy server and the PDA client has been kept small and modular. At present our server software (including copious comments) is only a few thousand lines of Java code. The proxy architecture also contributes significantly to economy of mechanism. Because the proxy implementation is completely orthogonal to the rest of the system, we needn t worry about the safety of other parts of the system causing problems with the proxy service. Fail-safe defaults The proxy server never has the capability to decode messages on its own - it is completely reliant on the client to provide it with enough information to decode private messages. Additionally, if any error is detected in any part of the proxy s functionality, it exits immediately and closes the connection to the client. This prevents any unexpected inputs from tripping up the proxy software, and reducing security. Complete mediation Complete mediation for SEProxy would mean that every access to the user s private key is checked, to make sure the requestor is a valid user. Because complete mediation would require the user to re-enter her pass phrase for every message downloaded from the server, this would quickly become cumbersome. Instead, we chose to compromise, and require each session to be authenticated. Hence, when the user first connects to the proxy, she will be asked for her PGP pass phrase. After this, the Proxy server software stores the pass phrase until the end of the session. Open design Our source code is readily available to all who would like to peruse it. Moreover, the security-critical portions are small, which should make them easier to scrutinize. Separation of privilege SEProxy does not provide separation of privilege, since only one key is required to perform security-critical tasks. We do not consider this a deficiency in our design, however, since the purpose of current secure systems is to allow an individual user to control the privacy of her communications. Hence, separation of privilege is not a meaningful metric in this case, since by definition all privilege should rest with the end user. Least privilege All processes in our system operate at user level, on behalf of only one user. Hence, there is never a chance of privilege leaking from one part of the system to another. Least common mechanism Because the proxy server is intended to be run on behalf of one user, it does not create the risk that a subverted proxy could betray the security of more than one user. This would be much more difficult to assure with a centralized mail proxy service. 6 Advantages of the Proxy Approach for Secure Systems 6.1 Why Choose the Proxy Design? In our original work on this project, we considered augmenting an existing IMAP server to process PGP-based messages on behalf of the PDA. After looking more carefully at the IMAP implementation, however, we realized that implementing a modified IMAP server would be a tremendous amount of work, and would also require large changes to existing infrastructure. Instead, we decided to construct a proxy that could be used without modifying existing infrastructure. While this decision was originally motivated by a desire to reduce the time required to prototype our design, we soon realized that there were a number of other significant advantages to the proxy design. 6.2 Orthogonality One of the key issues is that the proxy server is completely orthogonal to the existing infrastructure. As long as the existing infrastructure includes a POP or IMAP server, our current proxy will be able to fetch from it without difficulty. Furthermore, the proxy design allows the simple addition of new types of servers without requiring changes to the client software. Alternatively, the proxy approach makes it relatively simple to add new

10 types of clients. The MVD client is an excellent example of this, as it was added as an example for the system in only a few days, with very little complicated coding. This flexibility makes it relatively simple to add secure capabilities to existing software. The separation of functionality afforded by the proxy design also means that no security-critical functionality is trusted to the main server. Since servers tend to be large and complex, separating out the securitycritical aspects makes them much easier to verify and understand. 6.3 Flexibility in Changing Trusted Computing Base The proxy architecture also provides an interesting opportunity to flexibly change the trusted computing base to gain additional functionality. For example, by trusting the proxy server with the user s private key (rather than requiring the user to explicitly send the pass phrase to the proxy), the proxy could proactively download and decrypt messages while the user was away. This would reduce the latency when the user actually connected to the proxy to download her messages. Alternatively, with this same addition of trust in the proxy, you could easily have the proxy speak POP to existing mail clients. Such a scheme might make sense on a firewall, where you already assume the firewall machine must be trusted. The advantage of such a system would be that you could set up an organization-wide security policy for outgoing messages as well as correctly read encrypted incoming messages. All of this could be done without requiring the client software to be aware of the security system at all. 6.4 Easy Customization The current SEProxy implementation is simple and easy to understand. This can allow users to easily modify it to suit any peculiarities in their operating environment. For example, some users might want to filter out junk mail before sending it to the PDA. Alternatively, others might want to compose the mail proxy with a more sophisticated mail protocol such as IMAP, to allow PDA clients to selectively download only parts of the messages. Finally, the proxy architecture makes it easy to modify the communication between client and server to accommodate structural features such as available bandwidth or to truncate messages as they are downloaded. 7 Conclusion SEProxy plays an important roll in providing secure services to computationally weak clients. By placing a trusted proxy server between the client and the server, we can perform cryptographic operations on behalf of the user in a safe environment. Significantly, this additional functionality can be achieved with reasonable extensions to the user s trusted computing base. We feel that understanding the trust implications of relying on an outside server for cryptographic functionality is particularly important, since it is possible that small devices may never perform sufficiently large public key operations quickly. As an added benefit, the proxy architecture allows a good deal of unexpected flexibility. Among other things, this could allow users fine-grained control over where they place their trust, and how they choose to trade additional trust for additional functionality in the infrastructure. Following this approach, SEProxy could be easily expanded to provide secure not only to PDAs, but to legacy systems as well. 8 References [1] [UKERNA96] Report of the UKERNA Secure Project, May1996, [2] [MITPGP] MIT distribution site for PGP, [3] [PGPNEWS] News articles about PGP, [4] [BSCHNEIER] Bruce Schneier, Applied Cryptology (second edition), John Wiley & Sons, Inc, [5] [SALTZER] Saltzer and Schroeder, The protection of information in computer systems, [6] [JAVAG] J. Gosling, H. McGilton, The Java language environment: A white paper, 1995, [7] [JAVAMAIL] JavaMail API Design Specification, 1998 [8] [RSA1] [9] [RSA2]

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information

TFS ApplicationControl White Paper

TFS ApplicationControl White Paper White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Forward proxy server vs reverse proxy server

Forward proxy server vs reverse proxy server Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose

More information

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3 A Tumbleweed Whitepaper Secure Email Inside the Corporate Network: Providing Encryption at the Internal Desktop INDEX INDEX 1 INTRODUCTION 2 Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR

More information

The Case For Secure Email

The Case For Secure Email The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Ciphermail for Android Quick Start Guide

Ciphermail for Android Quick Start Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail for Android Quick Start Guide June 19, 2014, Rev: 5460 Copyright 2011-2014, ciphermail.com 3 CONFIGURATION WIZARD 1 Introduction This quick start guide helps you

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Implementing Transparent Security for Desktop Encryption Users

Implementing Transparent Security for Desktop Encryption Users Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...

More information

Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter

Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter Balamaruthu Mani Supervisor: Professor Barak A. Pearlmutter Plain email text Mail Server Mail Server Encrypted on transfer Encrypted on transfer Sender Email Communication Encryption over network Recipient

More information

Data Replication in Privileged Credential Vaults

Data Replication in Privileged Credential Vaults Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

A Pluggable Security Framework for Message Oriented Middleware

A Pluggable Security Framework for Message Oriented Middleware A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.

More information

Ciphire Mail. Abstract

Ciphire Mail. Abstract Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

The GlobalCerts TM SecureMail Gateway TM

The GlobalCerts TM SecureMail Gateway TM Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network

More information

Secure Remote Password (SRP) Authentication

Secure Remote Password (SRP) Authentication Secure Remote Password (SRP) Authentication Tom Wu Stanford University tjw@cs.stanford.edu Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

How To Secure An Emr-Link System Architecture

How To Secure An Emr-Link System Architecture EMR-Link Security Administration Guide Introduction This guide provides an overview of the security measures built into EMR-Link, and how your organization s security policies can be implemented with these

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Secured Mail through PGP Mail Gateway

Secured Mail through PGP Mail Gateway Secured Mail through PGP Mail Gateway L. S. Haturusinha, Y. Y. Landersz, A. U. H. Gamage, P. N. Pathiranage, G. T. D. Rodrigo, and M. P. A. W. Gamage Abstract PGP Mail Gateway is a backend server which

More information

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

Is your data safe out there? -A white Paper on Online Security

Is your data safe out there? -A white Paper on Online Security Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Webmail Using the Hush Encryption Engine

Webmail Using the Hush Encryption Engine Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5

More information

Evolution from FTP to Secure File Transfer

Evolution from FTP to Secure File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

cipher: the algorithm or function used for encryption and decryption

cipher: the algorithm or function used for encryption and decryption ! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

GPG installation and configuration

GPG installation and configuration Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

Efficient database auditing

Efficient database auditing Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se

More information

Host Access Management and Security Server

Host Access Management and Security Server Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.

More information

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444 Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten and J. D. Tygar Presentation by Jukka Valkonen jukka.valkonen@tkk.fi 25.10.2006 Outline 1. Background 2. Test methods and results

More information

Elements of Security

Elements of Security Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)

More information

TOP SECRETS OF CLOUD SECURITY

TOP SECRETS OF CLOUD SECURITY TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3

More information

HotZone. Theory of Operations Configuration Management

HotZone. Theory of Operations Configuration Management HotZone Theory of Operations Configuration Management What is HotZone? Free low-interaction honeypot Source code available (not Open Source but freely downloadable) Designed to be kitted up as a standalone

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5

More information

Risks with web programming technologies. Steve Branigan Lucent Technologies

Risks with web programming technologies. Steve Branigan Lucent Technologies Risks with web programming technologies Steve Branigan Lucent Technologies Risks with web programming technologies Abstract Java applets and their kind are bringing new life to the World Wide Web. Through

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Keep Hackers Guessing: Protecting Corporate Information While On The Go Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available

More information