Pelmorex NAADS Alert Message Security using digital signatures
|
|
|
- Jonathan Morris
- 10 years ago
- Views:
Transcription
1 Pelmorex NAADS Alert Message Security using digital signatures Issued March 17, 2010
2 NAADS Security Page 2 of 13 Table of Contents Introduction...3 Additional Message Security...3 End to End security provided by additional implementation...4 Solution Details...7 Sample Messages...9 Unsigned CAP Message...9 Signed CAP Message with NAADS signature...10 Signed CAP Message with issuer and NAADS signature...11 Table of Figures Figure 1 - Digital signature elements...4 Figure 2 - New security solution Additional security...6 Figure 3 - Overall data flow...8 Figure 4 Validating a signed message...8
3 NAADS Security Page 3 of 13 Introduction This document outlines the additional security mechanisms to the NAADS system to allow verification of the source of Alert Messages prior to on-air broadcasting by Last Mile Distributors (LMD). Feedback and suggestions for improvement are encouraged from interested parties and should be sent to: Attn: Paul Temple Pelmorex Communications Inc Bristol Circle Oakville, ON L6H 7W1 [email protected] Phone: ext Fax: The additional mechanisms are based on CAP, OASIS and XML standards and not tied to any vendor specific or custom solutions. Additional Message Security The additional message security will provide the following: 1. For any Alert issuer to stamp a specific Alert Message as a valid Message issued by their organization. 2. For any LMD to confirm (before processing any Message) that this is a valid Alert Message from NAADS system and also a valid Message from the issuing organization. The additional security being added to NAADS consists of adding up to two digital signatures when an Alert Message is issued. The first signature will be from the Alert issuer and the second signature from the NAADS system. When an Alert is received, the Last Mile Distributor has the option of checking either or both of the signatures to validate that the Alert did originate from NAADS system (i.e. not tampered in internet transmission after issuing) and also validate that the original Alert Message from the issuer is genuine and intact (no change has been made to the content that was provided by the issuer in any form Digital signatures are included in the CAP 1.2 specification and utilize the XML-Sig 1 standard. Digital signatures are used world-wide to secure access to documents and web transmissions. The XML-Sig standard identifies the various elements of the signature as below. 1 Refer for the XML-Sig standard
4 NAADS Security Page 4 of 13 Figure 1 - Digital signature elements For implementation of the digital signature, the OASIS Digital signing service standard 2 will be used both by NAADS and all participating Alert issuing organizations. OASIS-DSS defines a standard for a XML based service that can be maintained by any issuing organization/naads to apply digital signature to a submitted XML Message and to validate such a digitally signed Message. The LMD s that choose to validate the digital signatures will need to validate against the NAADS/Issuer DSS. The OASIS-DSS standard was derived by the OASIS technical committee and included collaboration with major IT security vendors such as Entrust, IONA, NIST, webmethods, TIBCO. The Universal Postal Union has implemented DSS within its Electrical Post Mark system. Commercial OASIS-DSS solutions are provided by companies like ARX, Ascertia and Thales. An open-source implementation is found in the Sirius open source implementation package. The XML-Sig standard also provides Signature ID property (that will be set by NAADS and issuers in their respective signatures) which can be used by XQuery/XSLT to include as well as exclude specific signatures. This allows for both independent verification of the signatures and for independent generation of two signatures. With this feature, the system provides the flexibility for Last Mile Distributors to ignore digital signatures, if they so choose. End to End security provided by additional implementation The end to end security for the whole NAADS system is provided by the above solution using the following industry standard security concepts: 1. Securing the communication channel using https. 2. Authentication/authorization provided through user name/password and infrastructure security. 3. Authenticity/Non-repudiation through digital signing of Alert Messages 2 Refer for the OASIS-DSS standard
5 NAADS Security Page 5 of 13 The first two security measures from the list above are already implemented. The third feature will add additional security to the Alert dissemination as can be seen from Figure-3 in the next page. The digital signature adds another layer of security to the authentication/authorization. Even if a hacker fraudulently gains access to NAADS Alert interface through a compromised username/password and HTTPS secure connection the additional step of signing the Alert will thwart their ability to issue any malicious Alert. Injection between NAADS issuing and NAADS dissemination Before dissemination, NAADS validates a signed Message with the Issuer certification system for signature. This will identify tampered Messages and reject them.
6 NAADS Security Page 6 of 13 Figure 2 - New security solution Additional security
7 NAADS Security Page 7 of 13 At the LMD end, the system protects against hackers spoofing to be NAADS and delivering Messages. This is no longer a risk as LMDs can check the second, i.e. NAADS signature to verify if it is from the NAADS system and reject it if otherwise. This can protect the LMD against any one injecting at the input of their own facility/system (even redistribution if they want to check the signature downstream in their operation). In addition, we encourage LMDs to also check the Issuer signature where it is included as a means to ensure the message itself is genuine and intact In this way the LMD can verify the issuer signature to double confirm if the original Alert Message has been modified/tampered at any point in the overall system. Solution Details The data flow for the overall solution is as follows (Refer to Figure 4 in next page) 1. Issuer creates Alert Message through the NAADS user interface (1 in drawing) 2. Issuer submits Alert Message for signing through the NAADS user interface to the DSS of their organization. The Message is signed and the issuer then submits it to NAADS central processing through the NAADS user interface (2 & 3) 3. NAADS central processing receives the Message. (4) 4. NAADS validates the signature by verifying against the issuer DSS (5 & 6). This guarantees no tampering in transmission. If the signature is not validated the Alert Message will be rejected and the issuer notified. 5. NAADS central processing adds its own signature using NAADS DSS (7 & 8) 6. Alert Message which has two signatures is delivered by various mechanisms to LMD (9&10). If issuer has no signing DSS, only NAADS signature will be appended to the Message. 7. LMD verifies the Message is sent by NAADS by validating NAADS digital signature against NAADS DSS. (11&12) This verifies that Message is not tampered in transmission from NAADS to LMD. If this is valid, then LMD can further validate that original Alert is not modified or tampered in any way from the original issuing source by validating the issuer s signature against the issuing organization DSS. (13 &14). For both these validations, the LMDs will need to form XML based http requests (following the OASIS-DSS standard) to the NAADS/Issuer DSS to get the signatures validated. 8. Once both validations are successful, the LMD can process the actual Alert Message. If the Message was signed only by NAADS, LMD will validate against NAADS DSS only. 9. LMD s that prefer to not process signatures can filter out both signatures using XQuery/XSLT. The data flows for the validation part of the OASIS-DSS standard which mandates a service 3 that can validate signatures is shown in Figure 5. 3 Refer for implementation of web service for digital signatures.
8 NAADS Security Page 8 of 13 Figure 3 - Overall data flow Figure 4 Validating a signed message
9 NAADS Security Page 9 of 13 Sample Messages This section shows three sample CAP-CP Alert Messages. One unsigned Message as a reference Same Message with Issuer signature Same Message with Issuer + NAADS signature Unsigned CAP Message <?xml version="1.0" encoding="utf-8"?> <Alert xmlns="urn:oasis:names:tc:emergency:cap:1.2" xmlns:xsi=" xsi:schemalocation="urn:oasis:names:tc:emergency:cap:1.2 <identifier>3bedc4ee50e642e395be690f38cb5123</identifier> <sender>[email protected]</sender> <sent> t16:09:00-00:00</sent> <status>actual</status> <msgtype>alert</msgtype> <source>ptinaadsfeedsocketsvc, NAADSFeed-dev01</source> <scope>public</scope> <code>profile:cap-cp:0.3</code> <info> <language>en-ca</language> <category>met</category> <event>thunderstorm</event> <responsetype>shelter</responsetype> <urgency>immediate</urgency> <severity>extreme</severity> <certainty>observed</certainty> <eventcode> <valuename>profile:cap-cp:event:0.3</valuename> <value>thunderstorm</value> </eventcode> <effective> t16:09:00-00:00</effective> <expires> t16:09:00-00:00</expires> <sendername>pelmorex</sendername> <description>thunderstorm Alert for Halton Region. This Message is a sample and is not a real Alert.</description> <area> <areadesc>halton Regional Municipality</areaDesc> <geocode> <valuename>profile:cap-cp:location:0.3</valuename> <value>3524</value> </geocode> </area> </info> </Alert>
10 NAADS Security Page 10 of 13 Signed CAP Message with NAADS signature <?xml version="1.0" encoding="utf-8"?> <Alert xmlns="urn:oasis:names:tc:emergency:cap:1.2" xmlns:xsi=" xsi:schemalocation="urn:oasis:names:tc:emergency:cap:1.2 <identifier>3bedc4ee50e642e395be690f38cb5123</identifier> <sent> t16:09:00-00:00</sent> <status>actual</status> <msgtype>alert</msgtype> <source>ptinaadsfeedsocketsvc, NAADSFeed-dev01</source> <scope>public</scope> <code>profile:cap-cp:0.3</code> <info> <language>en-ca</language> <category>met</category> <event>thunderstorm</event> <responsetype>shelter</responsetype> <urgency>immediate</urgency> <severity>extreme</severity> <certainty>observed</certainty> <eventcode> <valuename>profile:cap-cp:event:0.3</valuename> <value>thunderstorm</value> </eventcode> <effective> t16:09:00-00:00</effective> <expires> t16:09:00-00:00</expires> <sendername>pelmorex</sendername> <description>thunderstorm Alert for Halton Region. This Message is a sample and is not a real Alert.</description> <area> <areadesc>halton Regional Municipality</areaDesc> <geocode> <valuename>profile:cap-cp:location:0.3</valuename> <value>3524</value> </geocode> </area> </info> <Signature xmlns= ID= NAADSSignature > <SignedInfo> <CanonicalizationMethod Algorithm=" #WithComments"/> <SignatureMethod Algorithm=" xmldsig#dsa-sha1"/> NAADS Signature LMD to validate against NAADS DSS
11 NAADS Security Page 11 of 13 <Reference URI=""> <Transforms> <Transform Algorithm=" xmldsig#enveloped-signature"/> </Transforms> <DigestMethod Algorithm=" xmldsig#sha1"/> <DigestValue>uooqbWYa5VCqcJCbuymBKqm17vY=</DigestValue> </Reference> </SignedInfo> <SignatureValue> KedJuTob5gtvYx9qM3k3gm7kbLBwVbEQRl26S2tmXjqNND7MRGtoew== </SignatureValue> <KeyInfo> <KeyValue> <DSAKeyValue> <P> /KaCzo4Syrom78z3EQ5SbbB4sF7ey80etKII864WF64B81uRpH5t9jQTxe Eu0ImbzRMqzVDZkVG9xD7nN1kuFw== </P> <Q>li7dzDacuo67Jg7mtqEm2TRuOMU=</Q> <G>Z4Rxsnqc9E7pGknFFH2xqaryRPBaQ01khpMdLRQnG541Awtx/ XPaF5Bpsy4pNWMOHCBiNU0NogpsQW5QvnlMpA== </G> <Y>qV38IqrWJG0V/ mzqvrvi1ohw9zj84ndc4jo8p0axi1gb6d+475yhmjsc/ BrIVC58W3ydbkK+Ri4OKbaRZlYeRA== </Y> </DSAKeyValue> </KeyValue> </KeyInfo> </Signature> </Alert> Signed CAP Message with issuer and NAADS signature <?xml version="1.0" encoding="utf-8"?> <Alert xmlns="urn:oasis:names:tc:emergency:cap:1.2" xmlns:xsi=" xsi:schemalocation="urn:oasis:names:tc:emergency:cap:1.2 <identifier>3bedc4ee50e642e395be690f38cb5123</identifier> <sent> t16:09:00-00:00</sent> <status>actual</status> <msgtype>alert</msgtype> <source>ptinaadsfeedsocketsvc, NAADSFeed-dev01</source> <scope>public</scope> <code>profile:cap-cp:0.3</code> <info>
12 NAADS Security Page 12 of 13 <language>en-ca</language> <category>met</category> <event>thunderstorm</event> <responsetype>shelter</responsetype> <urgency>immediate</urgency> <severity>extreme</severity> <certainty>observed</certainty> <eventcode> <valuename>profile:cap-cp:event:0.3</valuename> <value>thunderstorm</value> </eventcode> <effective> t16:09:00-00:00</effective> <expires> t16:09:00-00:00</expires> <sendername>pelmorex</sendername> <description>thunderstorm Alert for Halton Region. This Message is a sample and is not a real Alert.</description> <area> <areadesc>halton Regional Municipality</areaDesc> <geocode> <valuename>profile:cap-cp:location:0.3</valuename> <value>3524</value> </geocode> </area> </info> <Signature xmlns= ID= IssuerSignature > <SignedInfo> <CanonicalizationMethod Algorithm=" #WithComments"/> <SignatureMethod Algorithm=" xmldsig#dsa-sha1"/> <Reference URI=""> <Transforms> <Transform Algorithm=" xmldsig#enveloped-signature"/> </Transforms> <DigestMethod Algorithm=" xmldsig#sha1"/> <DigestValue>uooqbWYa5VCqcJCbuymBKqm17vY=</DigestValue> </Reference> </SignedInfo> <SignatureValue> KedJuTob5gtvYx9qM3k3gm7kbLBwVbEQRl26S2tmXjqNND7MRGtoew== </SignatureValue> <KeyInfo> <KeyValue> <DSAKeyValue> <P> /KaCzo4Syrom78z3EQ5SbbB4sF7ey80etKII864WF64B81uRpH5t9jQTxe Eu0ImbzRMqzVDZkVG9xD7nN1kuFw== </P> Issuer Signature LMD to validate against Issuer DSS
13 NAADS Security Page 13 of 13 <Q>li7dzDacuo67Jg7mtqEm2TRuOMU=</Q> <G>Z4Rxsnqc9E7pGknFFH2xqaryRPBaQ01khpMdLRQnG541Awtx/ XPaF5Bpsy4pNWMOHCBiNU0NogpsQW5QvnlMpA== </G> <Y>qV38IqrWJG0V/ mzqvrvi1ohw9zj84ndc4jo8p0axi1gb6d+475yhmjsc/ BrIVC58W3ydbkK+Ri4OKbaRZlYeRA== </Y> </DSAKeyValue> </KeyValue> </KeyInfo> </Signature> <Signature xmlns= ID= NAADSSignature > <SignedInfo> <CanonicalizationMethod Algorithm=" #WithComments"/> <SignatureMethod Algorithm=" xmldsig#dsa-sha1"/> <Reference URI=""> <Transforms> <Transform Algorithm=" xmldsig#enveloped-signature"/> </Transforms> <DigestMethod Algorithm=" xmldsig#sha1"/> <DigestValue>uooqbWYa5VCqcJCbuymBKqm17vY=</DigestValue> </Reference> </SignedInfo> <SignatureValue> KedJuTob5gtvYx9qM3k3gm7kbLBwVbEQRl26S2tmXjqNND7MRGtoew== </SignatureValue> <KeyInfo> <KeyValue> <DSAKeyValue> <P> /KaCzo4Syrom78z3EQ5SbbB4sF7ey80etKII864WF64B81uRpH5t9jQTxe Eu0ImbzRMqzVDZkVG9xD7nN1kuFw== </P> <Q>li7dzDacuo67Jg7mtqEm2TRuOMU=</Q> <G>Z4Rxsnqc9E7pGknFFH2xqaryRPBaQ01khpMdLRQnG541Awtx/ XPaF5Bpsy4pNWMOHCBiNU0NogpsQW5QvnlMpA== </G> <Y>qV38IqrWJG0V/mZQvRVi1OHw9Zj84nDC4jO8P0axi1gb6d+475yhMjSc/BrIVC58W3ydbkK+Ri4OKba RZlYeRA== </Y> </DSAKeyValue> </KeyValue> </KeyInfo> </Signature></Alert> **** End of Document **** NAADS Signature LMD to validate against NAADS DSS
National Public Alerting System
Federal / Provincial / Territorial Public Alerting Working Group of Senior Officials Responsible for Emergency Management National Public Alerting System Common Look and Feel Guidance 1.0 4/24/2013 1.
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
New York State Federal/State Employment Tax (FSET) Handbook for Software Developers
Publication 120 (08/13) New York State Federal/State Employment Tax (FSET) Handbook for Software Developers The information presented is current as of this publication's print date. Visit our Web site
Payment authorization Payment capture Table 1.3 SET Transaction Types
Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
Guideline on Debit or Credit Cards Usage
CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius
Certify your Software Integrity with thawte Code Signing Certificates
Certify your Software Integrity with thawte Code Signing Certificates Sign your code and active content for secure online distribution... 1. Overview 2. Why a thawte Code Signing Certificate? 3. Who needs
Reclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
Visa Debit ecommerce merchant acceptance. Frequently asked questions and flowchart
Visa Debit ecommerce merchant acceptance Frequently asked questions and flowchart Table Of Contents Visa Debit. The convenience of debit. The security of Visa. 3 The value of Visa Debit for ecommerce:
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
Internet Security Seminar
Center for Technology in Government University at Albany, SUNY 1535 Western Avenue Albany, NY 12203 Phone: (518) 442-3892 Fax: (518) 442-3886 Email: [email protected] http://www.ctg.albany.edu 1996 Center
understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES contents UNDERSTANDING SSL CERTIFICATES...1 What Is SSL and What Are SSL Certificates?...1 Features of SSL...1 Encryption...1
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Information Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
Address Information. USPS Web Tools Application Programming Interface User s Guide. Document Version 4.0 (2/01/2015)
Address Information USPS Web Tools Application Programming Interface User s Guide Document Version 4.0 (2/01/2015) Table of Contents 1.0 Introduction To Web Tools... 2 Before you get started:... 2 Important
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX
Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES Understanding SSL Certificates 2 Secure Socket Layer (SSL) certificates are widely used to help secure and authenticate
A multi-layered approach to payment card security.
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
How To Spot & Prevent Fraudulent Credit Card Activity
Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Business Mobile App User Guide
Business Mobile App User Guide Logging On to CNB Business Mobile Logging on to CNB Business Mobile involves the same layers of authentication as your Online For Business account does. 1. Launch the app
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
How To Protect Your Cardholder Data From Fraud
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
Signature policy for TUPAS Witnessed Signed Document
Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors
Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! TCP/IP Port Monitoring TCP/IP ports
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
544 Computer and Network Security
544 Computer and Network Security Section 1: Introduction Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Background Information Security requirements have changed in recent times
Registry of Service Providers
Registry of Service Providers Program Guide Contents 1 2 1.1 What is the Registry of Service Providers? 2 1.2 Who can register? 3 1.3 Why register with Visa? 3 1.4 Implications for Visa Clients 4 2 5 2.1
The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation
Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards
SmarterMeasure Inbound Single Sign On (SSO) Version 1.3 Copyright 2010 SmarterServices, LLC / SmarterServices.com PO Box 220111, Deatsville, AL 36022
SmarterMeasure Inbound Single Sign On (SSO) Version 1.3 Copyright 2010 SmarterServices, LLC / SmarterServices.com PO Box 220111, Deatsville, AL 36022 Contents 1. Revision History... 3 2. Overview... 3
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents
PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures
PCI Data Security Standard 3.0
SECURELY ENABLING BUSINESS PCI Data Security Standard 3.0 Training Strategies That Work Presented by Doug Hall May 20, 2014 AGENDA PCI DSS 3.0 Training Strategies That Work PCI DSS 3.0 Overview PCI Training
Financial Crime Report
Classification 484(g) PC 530.5 PC ALHAMBRA POLICE DEPARTMENT Financial Crime Report DR Number UCR INSTRUCTIONS 1. If the suspect is known, contact this Department by calling (626) 570-5151. 2. Please provide
LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software
Application Security Use Case: PCI Compliance Jaime D Anna Sr Dir of Product Strategy, TIBCO Software AGENDA PCI Overview App Security in Context Essential Steps to Compliance Q & A PCI Overview What is
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
An Introduction to CODE SIGNING
An Introduction to CODE SIGNING CONTENTS. 1 What is Code Signing. 03 2 Code Signing Certificates 101...05 3 Why & When to Digitally Sign Code.09 4 Self Signing vs. Publicly Trusted...12 5 Code Signing
Your security is our priority
Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Elavon Payment Gateway MCC 6012 Recipient Information User Guide
Elavon Payment Gateway MCC 6012 Recipient Information User Guide Version v1.1 Table of Contents 1 About This Guide.3 1.1 Purpose 3 1.2 Audience..3 1.3 Terminology 3 2 Overview of the MCC 6012 Mandate..4
PICKPOCKETING MWALLETS. A guide to looting mobile financial services
PICKPOCKETING MWALLETS A guide to looting mobile financial services THE GRUGQ Info Sec researcher since 1999 Experience Telcoms Info Sec Banking Info Sec Leads to Mobile Financial Security MOBILE FINANCIAL
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Introduction to Online Payment Processing and PayPal Payment Solutions
Introduction to Online Payment Processing and PayPal Payment Solutions PayPal Helps Bring You New Customers Drivers of Consumer Demand for PayPal Opportunities for Merchants PayPal is: Secure Simple Fast
whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance
Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance Table of Contents 3 10 Essential Steps 3 Understand the Requirements 4 Implement IT Controls that Affect your
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Regular Payments to your ISA
Stockbrokers Regular Payments to your ISA Application form Terms and Conditions Regular Payments 1. We will take the regular payment amount from your chosen account on the date that you have chosen or
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
DEA's New Proposed Regulations For E-Prescribing
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] DEA's New Proposed Regulations For E-Prescribing
CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com
CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page
Ease-E-Club Client Management Software by Computerease
Ease-E-Club Client Management Software by Computerease Bluefin Payment Setup and Processing The Bank Export, Point of Sale and Client file are integrated with Bluefin Payment Systems: http://bluefin.com/computerease.
Merchant Account Service
QuickBooks Online Edition Feature Guide Merchant Account Service C o n t e n t s Introduction............................. 2 What is a merchant account?.................. 2 What types of credit cards can
CREDIT CARD PROCESSING POLICY AND PROCEDURES
CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.
Visa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
OXY GEN GROUP. pay. payment solutions
OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
