HTTP PAKE-based mutual HTTP authentication for preventing phishing attacks
|
|
- Olivia Chambers
- 7 years ago
- Views:
Transcription
1 All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript have been published without reviewing and editing as received from the authors: posting the manuscript to SCIS 2008 does not prevent future submissions to any journals or conferences with proceedings. SCIS 2008 The 2008 Symposium on Cryptography and Information Security Miyazaki, Japan, Jan , 2008 The Institute of Electronics, Information and Communication Engineers HTTP PAKE-based mutual HTTP authentication for preventing phishing attacks * Hirofumi Suzuki Yutaka Oiwa Hiromitsu Takagi Hajime Watanabe HTTP Mutual Web 1 HTTP Mutual Web Web * Yahoo, ,, Yahoo Japan Corp, Auction division, Roppongi Hills Mori Tower, Roppongi, Minato-ku, Tokyo , JAPAN (hirsuzuk@yahoo-corp.jp) , Research Center for Information Security, National Institute of Advanced Industrial Science and Technology, 1102 Akihabara Daibiru, Sotokanda, Chiyoda-ku, Tokyo JAPAN. 2 (0) (1). ID (2). [7] (3). (0) (1) (4). (0) (1) (0) (2) (1) (2) 1
2 (3) (4) [8] Extended Validation SSL (EV SSL ) [4] CA/Browser EV SSL SSL Microsoft Internet Explorer 7 EV SSL EV SSL CA/Browser 3.2 Microsoft Internet Explorer 7 Mozilla Firefox 2 URL Mozilla Microsoft 2006 [9] [10] 66% 81% Firefox petname tool [6] untrusted 3.5 PwdHash PwdHash [5] FQDN (1) (3) (4) (2) 2
3 NIST [12, Appendix A] TLS TLS (1) (3) (4) TLS (2) (2) 4 HTTP (a) (b) (c) (d) (e) (f) Web Web (1) (4) (0) 5 HTTP 5.1 PAKE Web ISO/IEC [1] PAKE (Password Authenticated Key Exchange) Key Agreement Mechanism 3 (KAM3) Web Internet Draft [3] 5.2 3
4 PAKE HTTP Web TLS PAKE HTTP PAKE PAKE (1) HTTP401 GET / HTTP/1.1 Host: HTTP/ Authentication required WWW-Authenticate: Mutual validation=host, realm="protected Contents", stale=0 Content-Type: text/html; charset="iso " Content-Length: xxx <html> (2) realm Hash PAKE weak secret ISO/IEO wa 2 v wb ID sid HTTP401 GET / HTTP/1.1 Host: Authorization: Mutual validation=host, user= foobar, wa=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx 4 HTTP/ Authentication required WWW-Authenticate: Mutual sid=yyyyyyyy, wb=zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz, nc-max=1024, nc-window=64, time=300, path= / Content-Length: 0 (3) wb oa3 oa ob ob HTTP200 ob GET / HTTP/1.1 Host: Authorization: Mutual validation=host, user= foobar, sid=yyyyyyyy, nc=0, oa=wwwwwwwwwwwwwwww HTTP/ OK Authentication-Info: Mutual sid=yyyyyyyy, ob=vvvvvvvvvvvvvvvv Content-Type: text/html; charset="iso " Content-Length: xxx <html> 5.4 Web Web HTTP [2] Web Basic Digest Form Basic Digest URL Web URL Form
5 Mutual Mutual HTTP 1 HTTP 200 Optional-WWW-Authenticate HTTP/ OK Optional-WWW-Authenticate: Mutual validation=host, realm="protected Contents", stale=0 Content-Type: text/html; charset="iso " Content-Length: xxx <html> Mutual Optional-WWW-Authenticate 5.5 Web Yahoo! JAPAN HTTP Mutual Mutual Mutual 1 2 Mutual Web Mutual Web Mutual Mutual 1: Form Cookie 5 2:
6 Yahoo Japan! HTTP 8.2 Firefox ) Apache) RFCIETF (Internet Engineering Task Force) Internet Draft [3] [1] International Organization for Standardization, "ISO/IEC :2006: Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets", [2] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and L. Stewart, "HTTP Authentication: Basic and Digest Access Authentication", RFC 2617, June [3] Oiwa, Y., Watanabe, H., Takagi, H., Suzuki, H., "Mutual Authentication Protocol for HTTP", November [4] CA/Browser Forum, "About EV SSL Certificates", [5] Ross,B., Jackson, C., Miyake, N., Boneh, D., C. Mitchell, J., Stronger Password Authentication Using Browser Extensions., Proceedings of the 14th Usenix Security Symposium, [6] Close, T. Petname Tool: Enabling web site recognition using the existing SSL infrastructure, W3C Workshop on Transparency and Usability of Web Authentication, 2006 [7], UFJ,, , 03/15/006.html [8] Brian Krebs, Citibank Phish Spoofs 2-Factor Authentication, , citibank_phish_spoofs_2factor_1.html [9] Mozilla Foundation, "Firefox 2 Phishing Protection Effectiveness Testing," November 14, 2006, [10] Tony Chor, "Anti-Phishing Accuracy Study," IEBlog, Microsoft Cooperation, September 28, /28/ aspx. National Institute of Standards and Technology, "Electronic Authentication Guideline," NIST Special Publication , April csrc.nist.gov/publications/nistpubs/800-63/ SP800-63V1_0_2.pdf. [12] Taylor, D., Wu, T., Mavrogiannopoulos, N., Perrin, T., "Using the Secure Remote Password (SRP) Protocol for TLS Authentication", RFC 5054, 2007.
HTTP Mutual authentication and Web security
HTTP Mutual authentication and Web security Yutaka OIWA SAAG, IETF 80 Prague Web security Its importance no need to say Transaction security (credit card, PayPal etc.) User data privacy Most online consumer
More informationProposal for Application-friendly HTTP Authentication Extension. Yutaka OIWA RCIS, AIST September 9, 2010 IIW East Coast I
Proposal for Application-friendly HTTP Authentication Extension Yutaka OIWA RCIS, AIST September 9, 2010 IIW East Coast I HTTP Auth and Web apps. Many people consider that HTTP Auth is not very useful
More informationReparing HTTP authentication for Web security
Reparing HTTP authentication for Web security Yutaka OIWA 1 Overview This position paper proposes improvement efforts for HTTP authentication/authorization mechanisms, to solve various current problems
More informationHTTP Authentication. RFC 2617 obsoletes RFC 2069
HTTP Authentication RFC 2617 obsoletes RFC 2069 Agenda Positioning Basic Access Authentication Digest Access Authentication Proxy-Authentication and Proxy- Authorization Security Considerations Internet
More informationTools to Protect Against Identity Theft
Tools to Protect Against Identity Theft Mario A. Garcia Texas A&M University-Corpus Christi SNIDJ 2/8/2007 1 Identity Theft - Definition Identity theft, Web spoofing, identity fraud are terms used to refer
More informationKerberos and Single Sign On with HTTP
Kerberos and Single Sign On with HTTP Joe Orton Senior Software Engineer, Red Hat Overview Introduction The Problem Current Solutions Future Solutions Conclusion Introduction WebDAV: common complaint of
More informationPhish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In Human Interactive Proofs: Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141 Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
More informationGain a New Level of Trust with Extended Validation SSL Certificates
Gain a New Level of Trust with Extended Validation SSL Certificates Higher Standard for SSL Certificates Malicious Internet activities such as phishing and pharming have victimized millions of people.
More informationA PAKE SRP6 BROWSER EXTENSION
A PAKE SRP6 BROWSER EXTENSION Alexandru Gavril Bardas 1 ABSTRACT The username/password paradigm is a well-known authentication mechanism. Probably the most common version in use is the password authentication
More informationKerberos and Single Sign-On with HTTP
Kerberos and Single Sign-On with HTTP Joe Orton Red Hat Introduction The Problem Current Solutions Future Solutions Conclusion Overview Introduction WebDAV: common complaint of poor support for authentication
More informationSingle Password, Multiple Accounts
Single Password, Multiple Accounts Mohamed G. Gouda Alex X. Liu 1 Lok M. Leung 2 Mohamed A. Alam 2 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {gouda,
More informationHTTP Authentifizierung
HTTP Authentifizierung Valentin Lein Matr. Nr. 0526536 15.12.2010 Computer Technology /21 Inhalt HTTP Basic Authentication Alternative Authentifizierungsmöglichkeiten HTTP Hypertext Transfer Protocol Computer
More informationMANAGED SECURITY TESTING
MANAGED SECURITY TESTING SERVICE LEVEL COMPARISON External Network Testing (EVS) Scanning Basic Threats Penetration Testing Network Vulnerability Scan Unauthenticated Web App Scanning Validation Of Scan
More informationreference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
More informationCleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More informationJPX-LEI User Guide 2014/8/1. Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved.
JPX-LEI User Guide 2014/8/1 Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved. 1 Contents Outline General User JPX-LEI Search File Download
More informationTransport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
More informationImpostor: A Single Sign-On System for Use from Untrusted Devices.
Impostor: A Single Sign-On System for Use from Untrusted Devices. Andreas Pashalidis and Chris J. Mitchell Information Security Group Royal Holloway, University of London Email: {A.Pashalidis,C.Mitchell}@rhul.ac.uk
More informationAuthentication in OpenStack
Draft Draft entication in OpenStack Jorge L Williams Khaled Hussein Ziad N Sawalha Abstract The purpose of this
More informationThe Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
More informationChapter 27 Hypertext Transfer Protocol
Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI
More informationCTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
More informationCryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
More informationAn Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
More informationHTTP Protocol. Bartosz Walter <Bartek.Walter@man.poznan.pl>
HTTP Protocol Bartosz Walter Agenda Basics Methods Headers Response Codes Cookies Authentication Advanced Features of HTTP 1.1 Internationalization HTTP Basics defined in
More informationBy Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
More informationThe Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:
The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent
More informationProtecting Users Against Phishing Attacks
c The Author 2005. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oupjournals.org doi:10.1093/comjnl/bxh000
More informationWeb applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
More informationUser authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationHypertext for Hyper Techs
Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently
More informationPreventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
More informationWeb Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
More informationWeb Security: SSL/TLS
CSE 484 / CSE M 584: Computer Security and Privacy Web Security: SSL/TLS Spring 2015 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno,
More informationThe Hyper-Text Transfer Protocol (HTTP)
The Hyper-Text Transfer Protocol (HTTP) Antonio Carzaniga Faculty of Informatics University of Lugano October 4, 2011 2005 2007 Antonio Carzaniga 1 HTTP message formats Outline HTTP methods Status codes
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationWeb Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
More informationApplication layer Web 2.0
Information Network I Application layer Web 2.0 Youki Kadobayashi NAIST They re revolving around the web, after all Name any Internet-related buzz: Cloud computing Smartphone Social media... You ll end
More informationWeb Application Security
Web Engineering Web Application Security Copyright 2013 Srdjan Komazec and Davide Cerri 1 Overview Motivation Technical Solution Basic Techniques Channel Security Web Application Authentication Methods
More informationIntroduction Les failles les plus courantes Les injections SQL. Failles Web. Maxime Arthaud. net7. Jeudi 03 avril 2014.
Maxime Arthaud net7 Jeudi 03 avril 2014 Syllabus Introduction Exemple de Requête Transmission de données 1 Introduction Exemple de Requête Transmission de données 2 3 Exemple de Requête Transmission de
More informationCyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
More informationJuniper Networks SSL VPN Implementation Guide
Juniper Networks SSL VPN Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationBreaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
More informationInternet Technologies Internet Protocols and Services
QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department aadamov@qu.edu.az http://ce.qu.edu.az/~aadamov
More informationCS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015
CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail
More informationTable of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
More informationIBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
More informationA Multifactor Hash Digest Challenge-Response
A Multifactor Hash Digest Challenge-Response Authentication for Session Initiation Protocol S. Santhosh Baboo Reader in Computer Science, D.G. Vaishnav College Arumbakkam, Chennai-600 106, Tamilnadu. India.
More informationUsage of Evaluate Client Certificate with SSL support in Mediator and CentraSite
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting
More informationextended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES EXTENDED VALIDATION SSL CERTIFICATES: A STANDARD FOR TRUST...1 Who Do You Trust?...1 The
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationCOMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
More informationSecuring Network Input via a Trusted Input Proxy
Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash University of Michigan {kborders, aprakash}@umich.edu Abstract The increasing popularity of online transactions involving sensitive
More informationOutline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013
Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe
More informationSECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
More informationSWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
More informationFostering content relevant Information Security Awareness through Browser Extensions
Fostering content relevant Information Security Awareness through Browser Extensions Marius Potgieter, Craig Marais, and Mariana Gerber School of Information and Communication Technology, Nelson Mandela
More information1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
More informationsessionx Desarrollo de Aplicaciones en Red Web Applications History (1) Content History (2) History (3)
sessionx Desarrollo de Aplicaciones en Red José Rafael Rojano Cáceres http://www.uv.mx/rrojano Web Applications 1 2 Content History (1) History Http CGI Web Tiers ARPANet Email, Ftp, IRC, news Explosive
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationReading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More informationA Federated Model for Secure Web-Based Videoconferencing
A Federated Model for Secure Web-Based Videoconferencing Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, and Mudassir Fajandar Interdisciplinary Telecommunications Dept. and Dept. of Computer Science
More informationSecurity Secure Sockets Layer (SSL)
System i Security Secure Sockets Layer (SSL) Version 5 Release 4 System i Security Secure Sockets Layer (SSL) Version 5 Release 4 Note Before using this information and the product it supports, read the
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationAPWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
More informationUser Guide. The AMF's File Transfer Service (FTS)
User Guide The AMF's File Transfer Service (FTS) TABLE OF CONTENTS 1 INTENDED USERS... 3 2 SCOPE OF GUIDE... 3 3 BACKGROUND... 3 4 REQUIRED CONFIGURATION... 3 5 CONTACT INFORMATION FOR SUPPORT... 4 6 SECURITY...
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationMultiSite Manager. Using HTTPS and SSL Certificates
MultiSite Manager Using HTTPS and SSL Certificates Contents 1. Using HTTPS... 2 What is HTTPS... 2 Where to implement HTTPS... 2 MultiSite Manager HTTPS (TSL/SSL) options... 2 2. How to enable HTTPS in
More informationSecurity-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com
More informationBreaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
More informationCDN Operation Manual
NTT Communications Cloudⁿ CDN Operation Manual Ver.1.1 Please refrain from secondary use such as distributing, reproducing, and transferring this document. 1 Version Number Edited on Revisions Ver.1.0
More informationGateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
More informationCS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
More informationA Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
More informationMassey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
More informationA Hybrid Approach to Detect Zero Day Phishing Websites
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1761-1770 International Research Publications House http://www. irphouse.com A Hybrid Approach
More informationModule 45 (More Web Hacking)
(More Web Hacking) In this Module, you'll lear how to use netcat to perform cursory server reconnaissance. You'll lear what a web proxy is and how it functions. You'll know how to enable your browser to
More informationVoucher Web Metering Using Identity Management Systems
Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher
More informationRTC-Web Security Considerations
RTC-Web Security Considerations IETF 80 Eric Rescorla ekr@rtfm.com IETF 80 RTC-Web Security Issues 1 The Browser Threat Model Core Web Security Guarantee: users can safely visit arbitrary web sites and
More informationBy Bardia, Patit, and Rozheh
HTTP By Bardia, Patit, and Rozheh HTTP - Introduction - Hyper Text Transfer Protocol -uses the TCP/IP technology -has had the most impact on the World Wide Web (WWW) - specs in RFC 2616 (RFC2616) HTTP
More informationWeb Programming. Robert M. Dondero, Ph.D. Princeton University
Web Programming Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn: The fundamentals of web programming... The hypertext markup language (HTML) Uniform resource locators (URLs) The
More informationAuthentication. TI1506: Web and Database Technology Claudia Hauff ti1506-ewi@tudelft.nl! Lecture 2 [Web], 2014/15
Authentication TI1506: Web and Database Technology Claudia Hauff ti1506-ewi@tudelft.nl!! Lecture 2 [Web], 2014/15 1 Authentication So far: HTTP as anonymous, stateless request/response protocol. The same
More informationWhat is Web Security? Motivation
brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
More informationInstructor: Betty O Neil
Introduction to Web Application Development, for CS437/637 Instructor: Betty O Neil 1 Introduction: Internet vs. World Wide Web Internet is an interconnected network of thousands of networks and millions
More informationWavecrest Certificate
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationCreating smarter fish by customizing the pond What application developers can do to stop phishing
Creating smarter fish by customizing the pond What application developers can do to stop phishing 12 July, 2006 Ron Ritchey Chief Scientist IATAC 703/377.6704 Ritchey_ronald@bah.com 0 Agenda Introduction
More informationUsing SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
More informationAPACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
More informationSecure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More informationBasics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
More informationSpyware Resistant Web Authentication Using Virtual Machines
Spyware Resistant Web Authentication Using Virtual Machines ABSTRACT Password collection by keyloggers and related malware is increasing at an alarming rate. We investigate client-only defenses and methods
More informationAlternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure Web Ben Wilson Digicert, Inc. - CA/Browser Forum Eran Messeri Google Session Classification: Intermediate Current Web PKI System OS / Browsers have Managed
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationBug Report. Date: March 19, 2011 Reporter: Chris Jarabek (cjjarabe@ucalgary.ca)
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek (cjjarabe@ucalgary.ca) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
More information