E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES
|
|
|
- Cameron Gregory
- 10 years ago
- Views:
Transcription
1 154 Proceedings of the Second International Conference on Informatics and Information Technology E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES Lj. Antovski, M. Gušev Institute of Informatics, Faculty of Natural Sciences and Mathematics, Sts. Cyril and Methodius University, Arhimedova bb, PO BOX 162, Skopje, Macedonia {anto, Abstract: Internet forces are affecting the banking sector transition more than any other financial provider group. E-Bank solution should deliver three key requirements: High Availability, Scalability and Security. End-to-end security consideration includes network security, data integrity and identity authentication security. Framework architecture for multichannel B2C solution enforced by reliable Network and N-Tier architecture is proposed. The architecture is designed to fulfill the key requirements. Keywords: e-bank, scalability, security, availability PKI, B2C, N-Tier, networking 1. Introduction The advent of E-Business, technological innovations and globalization are increasingly driving businesses to change their traditional modes of operation. The Internet offers many opportunities to financial services providers. The financial institutions are starting to use the Internet for interaction with users, in addition to traditional transaction banking. The electronic banking environment must be built with the same attention to detail and architectural sophistication as the physical space in which people use the financial services. The users exhibit an extreme form of electronic channel usage, leaving the designers only a precious seconds to present and sell their content. Banks are financial institution, which are not designed to sustain the shift to electronic dealing in a fast and secure manner. The raising trend in the world is the outsourcing of electronic services to IT companies which have technical and human resources to maintain QoS (quality of service) of the multi-channel architecture.
2 2 nd Int. Conf. CiiT, Molika, Dec E-bank Service Requirements A successful E-Bank architecture requires a merged approach combining expertise from both the network and application development camps. Experience has proven that keeping network operations and application development as separate disciplines does not work. In order to deploy a successful E-Bank implementation, one must address three key characteristics of the service: high availability, scalability, and security. A solid E-Bank solution will only be achieved through an architecture that meets these requirements across the network, the service channels, the database, and the server's operating system. High availability is the ability to provide continuous access to E-Bank services for the clients. To deliver these E-Bank services successfully, high availability must be maximized across all layers of an infrastructure. SERVICES DATABASE O.S. AVAILABILITY SECURITY SCALABILITY NETWORK Figure 1: E-Bank Service Requirements The right network design ensures there is no failure that will impact the high availability of the overall system. Designing for high availability includes the elimination of any single point of failure by providing redundant network devices and network paths. High availability can also be achieved at the operating system, system services and application code layers through a mixture of server redundancy, rescue and failover scenarios. Scalability is associated with performance enhancements, such as increased CPU speed, increased network bandwidth, etc. Consideration must also be made for supporting a large number of simultaneous user sessions and financial transactions. Scalability must be addressed across all facets of an E-Bank infrastructure.
3 156 Proceedings of the Second International Conference on Informatics and Information Technology Scaling an E-Bank site can be achieved by either scaling-up (bigger servers) and/or scaling-out (more servers). The choice is on what one would like to achieve because scaling-up takes advantage of increased hardware capability while the multiple servers in a scale-out solution provide redundancy, which means higher availability. Channels should engineer for the virtually limitless capabilities of scaling-out while maximizing the benefits of scaling-up. This results in smaller initial software and hardware investments, which can be expanded as the business grows. Security is a major consideration for the E-Bank infrastructure. As the nature of an E-Bank network is to conduct financial transactions, it becomes a likely target for malicious activity originating from the Internet community at large. Strong security consideration should include the following steps: Network Security Data integrity and privacy Identity security Security monitoring 3. Security Consideration Security is a major aspect of an E-Bank solution. The effect of any sort of security leak in the E-Bank service will be a substantial loss of business. However balance should be achieved between security and usability of the services offered by the e-bank center. The design is in such a way to implement a sufficient security solution, good performance and ability to extend additional security if required. The best security solution implements measures that branch out from network to service components layer 3.1 Network Security Network security is a leading link in the security chain. The three main networks components of an E-Bank security solution include: Extended Access Control Lists (ACL) on routers IOS Firewall Feature Set (FFS) Secure Stateful Firewalls Routers provide in initial line of defense against extraneous traffic entering the E- Bank network. Tight Extended ACLs are applied to the inbound interfaces to the routers. These ACLs need only to allow traffic that is relevant to the E-Bank center. Although several TCP/UDP ports may need to be permitted using ACLs, other traffic such as PING, Telnet, and FTP are not required and should be de-
4 2 nd Int. Conf. CiiT, Molika, Dec nied. No login ability to router from the 'outside' network should be allowed and one should use security technologies like SSL/Kerberos and others to secure and account for access to the router consoles. Firewalls provide a high level of stateful aware security between the front-end servers and the back-end database and application servers. Specific policies are installed to only allow communication between the front-end servers and the back-end database and application servers. Using address translation (NAT), the addresses of the back-end servers are hidden from the outside world. Only trusted stations known by the stateful firewall and authorized through a rule set to access the firewall's console. 3.2 Data Integrity and Privacy The data integrity ensures an exchange of financial and other sensitive data between the bank and the customer in authorized and protected manner. Depending on the choice of the channel for data exchange, different levels of security are to be implemented. For instance, the Web channel is mostly exposed and the highest level of protection should be applied. The employed security models in E-Bank solution are: Secure Socket Layer (SSL) Public Key Infrastructure (PKI) Identity Authentication The current mainstay for securing web transactions is the Secure Socket Layer, or SSL. Secure Web Servers use the SSL protocol to create an encrypted communications channel between the client and server on the transport layer. SSL is a generic "pipeline" that secures data. It allows the client and the server, to negotiate cryptographic algorithms to use, provides a protocol for them to do the negotiation ("SSL handshake") and then exchanges data using the algorithms. Additionally, the server is authenticated to the client during the handshake. The main steps in the SSL handshake are To determine the set of algorithms to use for the new connection; Authenticate the server to the client and to exchange random data to be used later for symmetric cipher keys, using the asymmetric cipher that was negotiated in previous step; Start sending data encrypted in the symmetric cipher. The asymmetric keys are usually 1024 B long, while the session key is with length of 128 B. It promotes this protocol to be unbreakable in a lifetime period. Though the SSL communication is secure, it suffers from certain drawbacks. The major concern is that it does not provide non-repundation on the information sent
5 158 Proceedings of the Second International Conference on Informatics and Information Technology because it is based on a random session key generated at the clients end. There is a need of implementing a whole structure in the case of financial transactions, where non-repundation is a key factor. On the application layer the Public Key Infrastructure (PKI) is introduced. PKI comprehensively satisfies the security requirements of e-bank: Authentication The customer requests the Registration Authority (RA) for a certificate. The Registration Authority validates the customer s credentials. After valid credentials are ensured, the RA passes the certificate request to the Certification Authority (CA). Confidentiality The customer generates a random session key at his end. The session key is sent to the bank, encrypting it with the bank s public key. The bank decrypts the encrypted session key with its private key. The session key is employed for further transactions. Integrity The message is passed through a suitable hashing algorithm to obtain a message digest or hash The hash, encrypted with the sender s private key is appended to the message. The receiver on receiving the message passes it through the same hashing algorithm. The digest he obtains is compared with the received digest. If the digests are same, it implies that the data has not been tampered with, in transit. Non-Repudiation The hash is encrypted with the sender s private key to yield the sender s digital signature. Since the hash is encrypted with the sender s private key (which is accessible only to him), it provides an indisputable means of non-repudiation. PKI, being a universally accepted standards compliant security model provides an establishment of a Trust chain, valuable in financial transactions. Last major role in application security is Identity Authentication. The identity validation is established through various methods of identity check, depending on the channel one uses. The methods implemented are:
6 2 nd Int. Conf. CiiT, Molika, Dec User name and password validated on client's side with the use of the login media which encapsulates encrypted user information Cookies Digital Certificates stored on login media (smart cards or mini CD-s) 4. Network Framework Architecture The e-bank network is consisted of following building blocks: Edge Routers Access Server Multilayer Switch Stateful Firewalls Servers Edge Routers are located at the perimeter of the e-bank network and provide connection to Internet, Dial In services for the WAP (Wireless Application Protocol) and IVRS (Interactive Voice Response System) channel. It also provides Dial Out services for the Fax Channel. The Edge Router is the Access Server to and from the e-bank network. The first line of security is implemented at the Edge Router. Security services are provided with the use of packet filtering extended Access Control Lists (ACLs) and dynamic Firewall Feature Set (FFS). The Multilayer Switch provides core network switching of an e-bank network. It needs to deliver multilayer switching while meeting the requirements for security, scalability and high availability. Stateful Firewalls are used to secure connections from front-end to back-end servers. They only allow restricted services from restricted servers to exchange data over the firewall. Only the Web and WAP server could push/pull data to the servers in the back-end network. In the framework, there are different types of servers implemented. They meet the requirements for scalability, especially for scale-out or scale-in. The WEB and WAP servers are equipped with additional set of memory, processors. These servers sustain the largest amount of users load. The other servers in the network, the dispatcher's servers and adapter server are with modest characteristics. The Data Store Server houses the data for the e-bank center. To ensure scalability, this server is often scaled-up and implements failover clustering for high availability.
7 160 Proceedings of the Second International Conference on Informatics and Information Technology back end Channel Dispechers PIX Si Wap Gateway M.Switch Data Store Adapter Core-Bank IS front end WEB/WAP Server ISP Router,Dial- In,Out AS WAP,FAX,IVR Base Station Internet SMS Server User User User Figure 2: Network Framework Architecture As Fig.2 shows, the network architecture is a single site implementation of an e- bank multichannel solution. It is consisted of a front-end and a back-end network. The network is virtually divided by the Stateful Firewall. The front-end network consists of WEB server and WAP server. These servers are responsible for generating presentation services for the WEB and WAP channel. The front-end network is connected via Internet to the SMS server of the Mobile Phone Company. The users connect to the e-bank network through the Edge Router. The back-end network is protected from intruder's attacks with the Stateful Firewall. It implements the Dispatcher Servers for different channels of services. For instance the Dispatchers Servers offer services for the , Fax and Sms channel. The back-end network also implements a WAP gateway. This gateway is essential in a situation where the e-bank center is WAP service provider at the same time. With configured Access Server for WAP Dial-In, WAP gateway and WAP server, this framework offers a complete Mobile Internet Site Solution.
8 2 nd Int. Conf. CiiT, Molika, Dec The Adapter Server is used for integration with the existing Core-Bank IS and its functionality will be discussed later in this paper. 5. N-Tier Architecture To fulfill the above requirements for availability, security and scalability, an N- Tier architecture is proposed. This architecture is suitable for software development because it meets the request for project development with the following components: Open architecture Rapid deployment Workflow capabilities Separated content/presentation The N-Tier application architecture is characterized by the functional decomposition of applications, service components and their distributed deployment. As shown on Fig.3, The N-Tier architecture consists of: Data Tier Data Access Tier Business Tier Presentation Logic Tier Presentation User Interface Presentation User Interface Presentation Logic Tier Business Tier Data Access Tier Data Tier Figure 3: N-Tier e-bank architecture The Data Tier is the essential part of the architecture is. It is the Database Management System (DBMS) consisted of complex and comprehensive high-end
9 162 Proceedings of the Second International Conference on Informatics and Information Technology Database products. The required optimization is achieved through query optimization, indexing and precompiled stored procedures. No business logic is placed in this tier. The Data Access Tier includes Interfaces with the databases. It includes objects that are to be used by the Business Tier, which encapsulate generic methods for connection and commands. All the elements of business logic, business rules and data manipulation are placed in the Business Layer. It encapsulates common business logic for all the channels of the e-bank architecture. The services for authorization, authentication, notification, rules, transactions and schedule define the common business logic used by the Presentation Logic Tier and different channels of communication. The Presentation Logic Layer provides an interface to the end user into the services offered by the e-bank. The data received from the Business Layer is transformed into usable and readable form for the user. The transformation differs for different channels. This Layer could also encapsulate a Proxy Tier, which enables applications from different platforms to communicate with the e-bank services through standard protocols for accessing remote objects, like SOAP (Simple Object Access Protocol). This is the Layer where the code for the WEB and WAP servers is placed, also including the services for Fax, and Sms. The Presentation User Interface is physically on the client's side and it implements Web Browsers, Phones, Faxes, Mobile Phones etc. Additional transformation using scripts is accomplished at this layer. This stands for smart devices as Browsers, PDAs and Mobile Phones that allow scripting. For this type of architecture asynchronous communication among the layers is essential. It would allow different layers to request data from another layer and continue working while the data is processed. The most suitable solution is the implementation of message queuing. Because this environment is highly distributed, asynchronous way of communication through message queuing is essential to maintain quality of service. This service should guarantee extremely fast interapplication communication, message delivery guarantees, sophisticated message and queue security mechanisms and queue location independence. All the tiers communicate with the use of message queuing. The information is separated from the presentation and exchanged with the use of restructured XML messages. 6. Integration with existing Core-Bank IS The integration of the e-bank architecture and the Core-bank IS of the bank is achieved with the use of adapters. The adapters offer services for connection
10 2 nd Int. Conf. CiiT, Molika, Dec with the Core-Bank Database, system for transaction's processing and triggers that generate events in the system. These adapters support asynchronous processing suitable for huge number of simultaneous users. 7. Conclusion The banks are now in a mature position and are being forced to change rapidly as a result of competition, customer demand and technological innovations. The power of Internet forces affects the banks now more than ever. To lower the costs and accept more demanding user the banks have to offer new electronic financial services. The banks could not sustain the swift change in electronic services. The perfect solution is the outsourcing of the electronic services to well known IT companies that have resources to rapidly build new services. These services require highest levels of security, scalability and availability. The security requirement is fulfilled only with comprehensive security implementation from network to application services. Framework network architecture is proposed, which is secure, scalable and highly available. The N-Tier Software Architecture allows RAD (Rapid Application Development) and deployment with high availability, scalability through phase layer upgrades and PKI security implemented on Application Layer. The framework architecture proposes a model of future proof solution for building an e-bank center. 8. References 1. Gušev, M. (2001), "Tools for digital age", Proc. of SEE Conference on Digital Economy, Skopje, Jun Gušev, M. (2000), "E-Commerce, a big step towards E-Business", Proc. of 2nd SEETI Conf. on Trade Initiative and Commerce, Skopje, Macedonia, 8 Nov Edward, T. (2001), Transactional COM+- Building Scalable Applications, Addison-Wesley, London. 4. Elison, C. and Schneier, B. (2000), "Ten Risks of PKI: What You Are Not Being Told About Public Key Infrastructure", Computer Security Journal, Vol.16, N.1, pp Freier, A., Karlton, P. (1996), "The SSL 3.0 Protocol", Specification, Netscape Comm. Corp. 6. Howard, M. (2000), Designing Secure Web-Based Applications for Windows 2000, Microsoft Press, Washington.
11 164 Proceedings of the Second International Conference on Informatics and Information Technology 7. Microsoft and Cisco (2001), "E-Commerce Framework Architecture Document", White Paper. 8. Milosevic, A. (2000), "Multi-Channel Bank Information System-Bases, Architecture, Integration in Existing IS", Proc.of New Banking Vision Conf., Ohrid, Feb.2001.ed. Mircetic M., Pexim, Skopje, pp Milosevic, A. (2000), "Multi-Channel Bank IS", Proc.of Bankinfo Conf., Belgrade, Sep Milosevic, A. (2001), "Path to successful E-Banking Solution", Proc.of Infotech Conf., Belgrade, Jul Rivest, R., Shamir, A., Adleman, L. (1978), "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, Feb.1978 Vol.21, pp Sun Microsystems (2001), "Scaling the N-Tier Architecture", white paper in Solaris Infrastructure Products and Architecture, Sun, Palo Salto. 13. Terplan, K. (2001), OSS Essentials-Support System Solutions for Service Providers, Wiley, Canada. 14. Unnithan C.R. and Swatman P.M.C. (2001), "ebanking Adaptation and dot.com Viability ", to appear in the Proc.of BIT' th Annual Business I.T. Conf., Oct.30-31, Manchester.
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Axway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
