Securing Network Input via a Trusted Input Proxy
|
|
|
- Cecil Stevenson
- 10 years ago
- Views:
Transcription
1 Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash University of Michigan {kborders, aprakash}@umich.edu Abstract The increasing popularity of online transactions involving sensitive personal data, such as bank account and social security numbers, has created a huge security problem for today s computer users. Malicious software (malware) that steals passwords and other critical user input has led to countless cases of identity theft and financial fraud. Client computers remain susceptible to key logging attacks due to inadequate defense against drive-by malware installation. Trusted browsing virtual machines attempt to mitigate this problem, but fail to protect against many runtime and Trojan horse malware attacks. One option for securely acquiring sensitive input is TPM-verified trusted execution. While this method promises to provide the best security, it has serious usability limitations and would require extensive modifications to both the client and the server. We propose a new approach for securing network input that relies on a Trusted Input Proxy (TIP). The TIP runs as a module in a virtual machine architecture that proxies secure network connections. When a user wishes to enter sensitive data, he or she presses an escape sequence that triggers the TIP to display a secure input dialog. The TIP will automatically generate a placeholder value based on the input using regular expression approximation (e.g for a SSN). It will then send key presses for the placeholder to the application. Finally, the TIP will substitute actual data for placeholders as it relays network messages to the server. Although the Trusted Input Proxy approach relies on a slightly larger trusted code base, it requires no modifications to the server, very few to the client, and is far more usable than TPM-verified execution. In this paper, we present the initial design of a Trusted Input Proxy and compare its merits and shortcomings to those of other approaches. 1. Introduction and Related Work A growing number of people use the internet for sensitive financial transactions. Consequently, fraud and identify theft resulting from stolen credentials has skyrocketed over the past decade. Online credit card and bank account fraud now costs financial institutions billions of dollars every year. Much of this fraud occurs due to weaknesses in client-side security. As an example, a hacker can install malicious software that records keystrokes by getting a user to click on a link to a malicious website in an . Once recorded, keystrokes including data such the user s name, bank account password, address, social security number, are sent back to server and may be used for identity theft or other fraud. A number of efforts to improve client-side security, such as personal firewalls, anti-virus software, and automatic security updates, have helped to curb the volume of malware infection. However, these mechanisms do not protect against most drive-by download attacks, which might involve tricking a user into downloading malicious software or exploiting a bug in an application. Systems such as Sandboxie [6] and Greenborder [1] go further to protect client security by isolating the web browser. With this approach, a compromised browser will have limited access to the rest of the system. Unfortunately, a compromised browser will have access to sensitive keyboard input that it receives during a browsing session and can send that data out over the internet. Furthermore, the underlying system is still vulnerable to a Trojan horse attack where the user downloads and installs a seemingly benign program outside of the sandbox that contains malware. We first examine a better way of solving this problem based on new Trusted Platform Module (TPM) capabilities for executing a trusted code block to obtain human input. This method is very secure due to an extremely small trusted code base (TCB). We find, however, that this approach is not very portable and requires extensive client and server-side changes. It can be vulnerable to a human security problem similar to standard phishing. Our main contribution in this paper is the initial design of a Trusted Input Proxy (TIP) architecture that enables secure network input. The architecture consists of three components: keyboard input interception, placeholder generation, and a secure connection proxy. The user s operating system (OS) and applications run inside of a primary virtual machine (VM) and the TIP module runs in a TIP VM. The virtual machine monitor (VMM) sends keyboard and network I/O through the TIP, which mediates and forwards the device I/O to the
2 primary VM. The TIP and VMM are considered to be part of the TCB, and are isolated from attack by the guest OS. The TIP will intercept a secure input keyboard escape sequence and enter into secure input mode. After acquiring sensitive input, it will generate a placeholder and send it to the guest OS. Finally, the TIP substitutes real sensitive data for placeholders in outbound network requests before relaying them to their destination servers. The Trusted Input Proxy approach requires no serverside modifications or management overhead, and minimal client OS/application changes. Also, we argue that using an escape sequence for securing input is much more effective from a usability perspective than application-initiated secure input. The TIP solution is portable and backwards compatible (non-tip clients can still log in). One shortcoming of the TIP solution is that it requires the client s main operating system to run inside of a VM, which can be a limitation for users who have scarce hardware resources, run intensive graphical applications, or require compatibility with obscure devices. We expect that many of these limitations will disappear as hardware manufacturers increase virtualization support. Another disadvantage of a TIP compared to TPM execution is a significantly larger trusted code base. However, the TCB is still much smaller than in a standard OS, and we feel that its larger size is more than justified by the increase in deployment practicality and usability provided by the TIP architecture. Ross et al. describe a method for protecting passwords against server-side theft (i.e. phishing) in [5]. Their solution does not help against a completely compromised client. Jackson et al. mention obtaining secure input for web forms [2], but do not discuss how to run a proxy that inserts sensitive data. Jammalamadaka et al. propose a novel method for secure web input on an untrusted client machine using a trusted proxy and trusted mobile device (e.g. cell phone) to send sensitive input to the server [3]. Theoretically, this is very similar to the TIP architecture, with the trusted proxy on the VMM and it acquiring input directly from the keyboard instead of from a cell phone. The TIP solution, however, is much more usable and easy to deploy, requiring the user to have one computing device to send secure input to a server instead of three. 2. TPM-Verified Input Acquisition One method of protecting against key-logger type attacks is to move input acquisition into a trusted system component. McCune et al. outline a method for executing security-sensitive code in an environment that is completely isolated from the rest of the system by utilizing TPM capabilities [4]. The TPM verifies a small block of trusted code, suspends the rest of the system, allows the code to run, and then restores the system. During this process, the TPM signs a digest of the trusted code, its inputs, and its outputs so that the result can be verified by an external entity. In the case of secure input, the trusted code could obtain the user s password or other sensitive data, ask the TPM to sign it, encrypt it with the server s public key, and then hand it off to the operating system so that it can be sent to the server without the operating system being able to read the data or compromise its integrity. The TPM-verified execution approach does offer a high level of security due to the very small size of the trusted code base (TCB), which would just include a keyboard driver, a simple graphics driver, a TPM driver, and some setup code. However, it also has some serious limitations. First, if the server is going to verify the code execution and resulting value, it needs to have a public signing key, along with some certification that the key is legitimate, for every client. On the plus side, this would add another authentication factor, making the process more secure. Verifying all these certificates, however, would require a potentially expensive public key infrastructure (PKI). Furthermore, one would only be able to log in from a machine that has been certified by the server, which constrains accessibility. Another problem with TPM-verified execution is that the operating system, which is not trusted, is responsible for invoking the TPM functionality. Not only does this require changes to the OS, it also allows an attacker to modify the OS so that it does not call the secure input module. Instead, the OS could display some sort of error and allow the user to proceed with divulging sensitive data even though the data is not being sent to the server. This is not only a denial of service, but a denial of secure service, which has shown to be a very effective way of getting users to behave insecurely [7].
3 Primary VM Network Application Operating System TIP VM Trusted Input Proxy (TIP) VMM Physical Device Drivers Hardware Figure 1. Trusted Input Proxy architecture. The TIP mediates keyboard input and network I/O. A different way of using a TPM for secure input that does not require a PKI is to have the trusted code access a secret value using TPM sealed storage and display the secret to the user. (The secret could be text or a picture.) This would assure the user that keyboard input is going to the trusted code and is safe from eavesdropping. Next, the trusted code could hash the input (with an optional salt value), or verify the server s certificate and encrypt the input so that it cannot be read by the OS. With this approach, server modification would still be necessary to decrypt or verify individual form fields. Displaying a secret for integrity verification could also enhance the security of the TIP, described next, against malicious VMM modifications. 3. Trusted Input Proxy Design The Trusted Input Proxy (TIP) is a module that runs in its own virtual machine and mediates some I/O between the physical device drivers and the guest operating system. An illustration of this architecture can be seen in Figure 1. In our design, the TIP module acts as a proxy for secure network connections. It also receives all keyboard input, and can choose whether or not to forward key presses to the guest OS. The size of the trusted input proxy is significant, as it must contain code to do basic protocol processing for at least SSL and HTTP. However, it is still far smaller than the primary virtual machine, which runs all of the user s applications. 3.1 Keystroke Interception The trusted input proxy receives all physical key press notifications from the keyboard driver in the VMM. It can decide whether or not to forward each keystroke to the guest operating system, and can change, replace, or delete keystrokes. When the user activates an escape sequence on the keyboard, the TIP will drop the key event, go into secure input mode, and display a dialog box on the screen. The escape sequence should be something that generates a single key event, which means any of the ctrl, alt, and shift keys combined with one standard key. It should be something rarely used by default, like ctrl+alt+f12, but should also be easily configurable by the user. The machine will remain in trusted input mode until the user exits out of the dialog by hitting enter (OK) or escape (Cancel). Optionally, it may be desirable in the future to allow mouse input for the dialog box. In this case, clicking on OK or Cancel would also exit secure input mode. While the user is in secure input mode, all keyboard input goes to the TIP, which does not forward it to the guest OS. Depending on the user s preference, the trusted input proxy can either display a dialog with the masked sensitive input (* s for characters), the unmasked sensitive input (to avoid typos), or nothing at all. Having different escape sequences for each option is recommended. If the user chooses for the TIP to display a dialog box, it should appear on top of anything else in the display, be unreadable to the guest OS, and also contain the current automaticallygenerated placeholder value, which is discussed more in the next section. The user should also be able to override the default placeholder value here by modifying it in the dialog box. When the user is finished entering secure input, the TIP will generate keystrokes for the placeholder value and send them to the guest operating system. 3.2 Automatic Placeholder Generation When the user enters some sensitive input, such as a social security number, the application may reasonably expect that the input passes some simple checks. For example, it may expect a number in the format XXX- XX-XXXX where the X s are digits. If the TIP generates a placeholder that does not pass these checks, then the verification will fail and the user will have to manually come up with a placeholder, which may impede usability. There may be some situations where
4 Table 1. Examples of some regular expressions for placeholder generation. (Perl format) Regular Expression Meaning Examples Replace With ([0-9]+[-)( ]*){1,} One or more digits, optionally followed by - ( ) or, repeated n times where n > , (555) , 1123 Randomly replace each digit with another digit (leave other characters) Upper or Lower case dictionary word Any word in a password cracking dictionary include names and common strings like asdf input validity depends on checksum verification, such as for credit card numbers. These checks are usually performed at the server, but could be done on the client. We plan to investigate this issue in the future, and create replacement algorithms that also match checksums or disable client-side checks. Some websites also have Javascript which will give you a hint about the strength of the password you are choosing. If the user enters a six-letter dictionary word for a password, and the placeholder is a random ten-digit alphanumeric, then the user may get a false sense of security from the client-side checks. To deal with this problem, the TIP uses a regular expression matching and generation list that generates an equivalent placeholder for given sensitive input. It tries to match the input against an ordered list of regular expressions, with less restrictive regular expressions at the end. Table 1 lists some sample regular expressions, in approximate order from most to least restrictive, and what they should be replaced with to maximize equivalency without compromising private information. In the case where the TIP is unable to come up with an acceptable replacement or the user wants the replacement to be something easy and memorable, he or she can manually specify the placeholder. The goal of placeholders is to make the input proxy process as simple as possible and avoid changes in user behavior. 3.3 Secure Network Connection Proxy In order to proxy secure network connections, the TIP module needs to effectively act as a man-in-the-middle without compromising security. For SSL connections, our solution is to add a certificate for the TIP to the list of root certification authorities in the VM s browser. This way, the trusted input proxy can copy the contents of the server s certificate (after verifying its secret, password, asdf, John [a-z]+ or [A-Z]+ All-upper or all-lower case xbwfel, HJERGI string [a-za-z0-9]+ Alpha-numeric string AbC456, gowe23jikn45p, oioj3249 Random word of same case and length Random string with same length and case Random string with same length and at least one character from each set present in string (i.e. upper, lower, or digit) authenticity) into a new one, replacing the server s public key with its own. This way, any errors or warnings that may appear as a result of an out-of-date certificate or a certificate that does not match the hostname will still appear, and the trusted input proxy can effectively intercept and modify SSL traffic. Similar approaches can be taken for other secure network protocols. With protocols like SSH that rely on manual key fingerprint verification, the TIP will need a way of displaying the actual key fingerprint to the user. Support for additional protocols would increase the size of the TCB and require writing extensions to the TIP. However, most people only use SSL and possibly one other popular protocol for secure communication, limiting the size of the TCB. Once the TIP has established a secure connection with both the virtual machine and the remote server, it inspects every message that it gets from the client to search for placeholder strings. The TIP will be more effective if it has some knowledge of the protocol, such as HTTP, so that does not have to rely on a blind search. This is important for protocols where the client sends a lot of random data that has the potential to match a random placeholder. Also, it is necessary for protocols where the placeholders are encoded before being sent over the wire. An example is HTTP authorization, which uses base-64 encoding. With HTTP over SSL, the TIP decodes the authorization field to look for placeholders, and also looks for them in parameters of GET and POST requests according to the specification. When it finds a known placeholder, the TIP then replaces it, rebuilds the request, and forwards it to the server.
5 4. Benefits and Limitations of a Trusted Input Proxy The Trusted Input Proxy architecture requires no changes to the user s standard operation system and applications other than adding the TIP as a certification authority and migrating the OS into a virtual machine, which can be done efficiently and transparently. The TIP architecture is also transparent to the server, which requires no modification. In terms of practical security, a trusted input proxy is likely to be accepted and used correctly by people who care about their privacy. Entering a two or three-key simultaneous escape sequence then hitting enter afterwards is a minimal perturbation to a user s standard workflow, and users already have a good idea of what data is sensitive and requires secure input (passwords, SSN, account numbers, etc.). Furthermore, the user will become accustomed to entering sensitive data through the TIP, making it hard for malware on the guest OS to trick a user into typing sensitive input without using the escape sequence. (The escape sequence will guarantee confidentiality as long as the TIP is installed.) The Trusted Input Proxy architecture relies on a trusted code base of moderate size, including network I/O, keyboard drivers, and placeholder generation code. If code base size is a concern, SSL interception and certificate proxying can be done by a network service so that it is not part of the TCB. The TCB is still much smaller than that of a standard operation system, and its size compared to TPM-verified code is justified by its hugely improved usability and reduced deployment requirements. The TIP is also currently limited by its reliance on virtual machine technology. Some users may not want to run their main operating system inside of a VM for performance reasons. Virtual machines require more system resources (especially memory) and can be slightly slower for I/O intensive applications. However, virtual machine performance is usually very good compared to native execution, and it continues to get better as processor manufacturers add features to optimize virtualization. 5. References [1] Green Border Technologies. GreenBorder s Virtual Session Architecture. architecture.php, [2] C. Jackson, D. Boneh, and J. Mitchell. Spyware Resistant Web Authentication using Virtual Machines [3] R. Jammalamadaka, T. Van Der Horst, S. Mehrotra, K. Seamons, and N. Venkasubramanian. Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. In Proc. of the 22nd Annual Computer Security Applications Conference (ACSAC '06), [4] J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. Minimal TCB Code Execution (Extended abstract). In Proc. of the 2007 IEEE Symposium on Security and Privacy (SP 07), [5] B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proc. of the 14th Usenix Security Symposium, [6] Sandboxie Transient Storage [7] S. Schechter, R. Dhamija, A. Ozment and I. Fischer. The Emperor's New Security Indicators: An Evaluation of Website Authentication and the Effect of Role Playing on Usability Studies. In Proc. of the 2007 IEEE Symposium on Security and Privacy (SP 07), 2007.
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks Whitepaper W H I T E P A P E R OVERVIEW Arcot s unmatched authentication expertise and unique technology give organizations
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
FileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Frequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
FileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Payment Fraud and Risk Management
Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Protecting Users Against Phishing Attacks
c The Author 2005. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: [email protected] doi:10.1093/comjnl/bxh000
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT Namzak Labs White Paper, 2002-02 Version 1 September 30, 2002 Overview As deployment of computer applications over the Internet becomes more prevalent, companies
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006
Multi-Factor Authentication (FMA) A new security feature for Home Banking Frequently Asked Questions 8/17/2006 1. Why is MFA being added? We take our obligation to protect our members seriously. To make
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE
HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE Level 1, 61 Davey St Hobart, TAS 7000 T (03) 6165 1555 www.getbusi.com Table of Contents ABOUT THIS MANUAL! 1 SYSTEM REQUIREMENTS! 2 Hardware
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
