Managing SSL Traffic: An examination of SSL and how to secure it
|
|
|
- Julianna Cain
- 9 years ago
- Views:
Transcription
1 Managing SSL Traffic: An examination of SSL and how to secure it
2 Much has been written about the SSL/TLS encryption protocol in the wake of events that include the Heartbleed vulnerability, Apple OS bug and others. The SSL/TLS protocols were created to increase Internet security, however vulnerabilities such as the Heatbleed bug and exploits like the Zeus botnet, which used SSL to upgrade after its initial infection, are undermining users confidence even as organizations struggle to secure their data in an increasingly treacherous Internet environment. The popularity and adoption of mobile devices in the workplace has added to the complexity introducing multiple platforms and applications that introduce compatibility challenges. After the Wikileaks incident, where highly sensitive NSA (National Security Agency) documents were leaked to the public, the use of SSL/ HTTPS encryption on the Web grew by 60%, according to one report. The wide availability of tools and kits that enable SSL communications made it easy for websites to embrace it. However, its growing use and the vulnerabilities within the software used to deploy it, have dramatically increased the number of cybercrime attempts to exploit SSL to steal data. This rise in SSL exploits is aided by a combination of factors, including the enduring impression among Internet users that SSL/HTTPS sites are safe, and the fact that many security solutions are unable to efficiently inspect SSL traffic, particularly when it communicates via UDP ports used to send streaming data. What is SSL/TLS? The Secure Socket Layer (SSL) protocol was created in 1994 to provide security for the increasing amounts of private and sensitive data being transferred over the Internet. It was designed originally to protect communications between applications and computers, by providing an encryption layer to run under HTTP Web traffic, expressed as HTTPS indicating its SSL status. In 1999, the Transport Layer Security (TLS) protocol was introduced to increase security across servers, networks and computers, and apart from some technical process variances, the two serve the same purpose. They both encrypt outgoing data that is then decrypted once it reaches its intended destination Client/ Browser Browser requests secure connection Server sends SSL certificate Private key is encrypted and sent with public key to server Server verifies encryption of future transmissions All transmissions now encrypted 5 How SSL Works Server
3 The SSL encryption process is insured by a public key that encrypts data at its point of origin and a corresponding private key, which is required to decrypt data once it reaches the recipient. In between this transfer there are a number of handshakes to assure that each side of the communication is who it claims to be. The authenticity of the public key is verified by a digital certificate issued by a certificate authority (CA), a third party that verifies that the holder of the public key is the named subject of the certificate. This enables others in the transfer process to rely on the validity of the private key that corresponds to the public key. There are many Certificate Authorities, responsible for verifying root certificates including VeriSign, DigiCert, Network Solutions and others. In 2005, the Certificate Authority Browser Association (CAB) created new guidelines with more stringent SSL requirements resulting in an Extended Validation (EV) SSL certificate. Achieving an EV SSL validation means that a website has undergone extensive human review and meticulous documentation checks confirming ownership and authenticity. Organizations that deal with highly sensitive or regulated data were quick to pursue this elevated level of validation, though it takes longer and costs more to acquire. SSL/TLS adoption is increasing Although there have been various campaigns to require all Web traffic to be encrypted, according to Gartner, For most organizations, SSL traffic is already a significant portion of their outbound Web traffic and is increasing. It represents on average 15% to 25% of the total Web traffic, with strong variations based on the vertical market. 1 In the same report, Gartner recommends that organizations, Quantify your current encrypted traffic mix, and anticipate a 10% to 20% yearly growth when evaluating future network security purchases. 1 One reason the use of SSL protocol will continue to grow is because of its ubiquitous adoption by large enterprises including SaaS platforms such as SalesForce and DropBox, social media applications like Facebook and Twitter, and popular public clouds such as Amazon.
4 Websites that use SSL are easy to spot as they have a padlock icon and green color in the URL address bar. Typically, seeing the SSL icon has given users confidence that they can pay their bills, file taxes, purchase items, view their health records, renew their car registrations and perform countless other tasks, without worrying that their private information will be exposed. Unfortunately, a wave of new data breaches threaten to undermine that confidence. SSL exploits are also are the rise While the growth of SSL use may bring some peace of mind to Internet users, the percentage of cybercriminal attacks using SSL is growing even faster than its adoption by organizations. According to Gartner, in 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls, up from less than 5% today 1. Zeus P2P botnet using SSL Streaming data that s transferred via UDP data channels using SSL are one way exploits can occur, leveraging the users confidence and directing them to fake sites with authentic-looking SSL certificates. The Zeus botnet, which made its debut in 2007, was designed to steal banking information and it 1 Gartner, Inc. Report. Jeremy D Hoinne, Adam Hils. Security Leaders Must Address Threats From Rising SSL Traffic. December 2013 initially infected networks using phishing techniques, dropping recipients who clicked on the imbedded link to infected websites. Once in the network, the Zeus Trojan deposited a bot designed to communicate with command and control (C&C) outside via TCP ports. Since then, Zeus has stayed active and changed its tactics to take advantage of less secure and hidden UDP ports, using peer-topeer applications to communicate outside. This powerful Trojan was recently able to upgrade itself using a UDP peer-to-peer SSL data channel, injecting a critical update package that many standard security solutions missed. Apple OS SSL vulnerability In addition to exploits that rely on port-evasive techniques, flaws within SSL are equally dangerous. The Apple ios bug was first revealed in February 2014 when a fix for it was released. It affects ios versions prior to and Mac OS X (it has been confirmed on OS X ). Though it did not receive extensive publicity at the time, it is actually a very serious vulnerability that allows a hacker to create a website mimicking a legitimate SSL site, similar to the Zeus Trojan tactics. Users who respond to a legitimate looking link embedded in an would arrive at a site and see the trusted CA icon verifying the root certificate, and think they are on a known, legitimate site. The hacker who created the bogus site can now easily obtain login credentials and the rest is data loss history. Most analysis of the issue indicated that the vulnerability was only of concern on untrusted networks in public places like hotels, coffee shops or public WiFi. This was because a hacker would have to get elevated network privileges in order to redirect users from the real site to the fake one without their knowledge, and getting those privileges would only be possible on untrusted networks. However, though elevated network privileges may be required if the goal is to spoof an existing secure website, if the hacker creates an entirely new website that appears to have been validated by a trusted CA, elevated privileges aren t necessary. Another side of SSL threats Heartbleed The situation of user trust was complicated even further by the Heartbleed bug, which revealed a different side of SSL vulnerability. Unlike the Apple ios flaw, this bug was found in a popular core software library, OpenSSL, which is used by a large number of websites to implement SSL encryption. Unlike the Apple flaw, the Heartbleed bug has nothing to do with serving up fraudulent Web pages, because it s in the software used to handle the encryption itself. This means if a web server is using the library, it can make anything on that server vulnerable.
5 As the name implies, the bug affects a portion of the OpenSSL library that involves the heartbeat, which is part of the SSL handshake process. Heartbleed is a fundamental flaw that could expose private data, stored in memory, during SSL communications. This bug is particularly dangerous because even the precious private key used to decrypt data could have been exposed within routine SSL traffic. In addition, usernames, credit card numbers and other sensitive data could have been leaked during this process. And organizations would have no way to determine what data might have been lost, since the memory space where unintended data could be hiding, is recycled within short time frames. One of the reasons Heartbleed received so much global attention is that it went unnoticed for eighteen months, and no one knows what data may have been lost during that period. How Heartbleed Works Client/ Browser Send me this 4 letter word: Fish Fish. Server Malicious user Send me this 500 letter word: Fish Fish. Public Key is User Dan Brown s Mastercard Man-in-the-middle attacks Another aspect of the Heartbleed bug is that security holes may have been opened inviting man-in-the-middle attacks (MiTM). The way MiTIM attacks work is that a third party hijacks a data transfer and pretends to be each side of the communication. In the case of Heartbleed, the sender s private keys may have been exposed during the years the flaw went unreported and anyone who obtained the key can now launch a MiTM attack.
6 Defending against SSL Threats is Challenging The growth of SSL traffic has meant security providers must deal with a growing number of SSL flaws and exploits, and many are promoting their ability to scan SSL traffic for malware and threats. However, some of their approaches either create additional security holes, or impede network performance. Many standard approaches incur problems with SSL security because they lack visibility over the entire Web stream, including hidden UDP data channels, which increasingly carry SSL traffic and are becoming a popular way for cyber criminals to launch attacks. The data streams that use UDP data channels are more difficult to secure because many solutions can t stop data transfers mid-stream. SSL threats piggybacking on TCP traffic through port 443, are easier to detect and block, which is why cyber criminals have switched their focus from TCP to UDP ports carrying SSL traffic. Also, as with the Zeus Trojan, many peer-to-peer programs such as BitTorrent and others, are using SSL traffic to circumvent security solutions, enable anonymous browsing and deliver damaging malware. Mobile devices and SSL Another challenge to SSL security is the expansion of mobile devices in the workplace and elsewhere, including popular bring-your-owndevice (BYOD) programs. Because mobile devices run on many different platforms and browsers, root certificate incompatibility becomes another hurdle. Also, organizations using a security solution that decrypts all SSL traffic as part of its approach, may be in jeopardy of encroaching on the privacy rights of BYOD users on personally-owned mobile devices. There are different approaches to securing SSL traffic Traditional Web security solutions offer different ways to deal with SSL traffic, but some of them leave security holes or create latency. Here are summaries of approaches to SSL security: Approach #1 Ignore SSL Traffic and let it pass by: This approach may have worked when the SSL was new and its security was more reliable, but as recent vulnerabilities and exploits illustrate, organizations can no longer assume that SSL/HTTPS traffic is secure from exploitation. Some traditional security solutions are unable to inspect SSL traffic and consequently it all passes by, opening the door for a variety of threats and potential data loss. Approach #2 Block SSL Traffic: This isn t practical as SSL is increasingly used by organizations in every industry to secure both their inbound and outbound traffic. Its widespread use in industries such as finance, healthcare, government and others, means that blocking it completely creates productivity problems and could interfere with mission-critical processes. In addition, many solutions that block SSL completely do so via proxy settings, which leave organizations vulnerable to port-evasive exploits using SSL on non-standard UDP data channels. Approach #3 Inspect and decrypt all SSL traffic: There are major problems with this approach. The first is that decrypting, inspecting and re-encrypting every data transfer puts excessive strain on network resources. In regulated industries such as finance and healthcare, network availability is critical. Tying up resources for thousands of decrypt, re-encrypt processes throughout the day can create network logjams that negatively impact productivity, regulatory compliance and user satisfaction. This approach can also leave organizations open to man-in-middle attacks. There are disadvantages to each of the approaches above that can expose your network to threats or slow performance. On the next page read how approach #4 protects against SSL threats without jeopardizing network availability.
7 Approach #4: iboss Selective Decryption at the Gateway Ideally, don t decrypt if you don t have to. Unfortunately, legacy Web security solutions and UTMs don t give you a choice. Only iboss provides granular management of SSL traffic by directory workgroup user, without decrypting or presenting warning messages, which can slow the network and hurt productivity. To do this, iboss leverages patented and patent-pending technologies which extend granular SSL traffic management across the network without decryption, and also gives you the ability to decrypt in situations where inspection or control inside SSL traffic is desired. The iboss approach is your best choice: This approach offers more protection and better network performance than the three extreme approaches being used by legacy Web security solutions, UTMs and NGFWs, namely: Decrypting all SSL, blocking all SSL, ignoring all SSL. Selective decryption enables content-aware SSL management in these critical situations: Across BYOD users where decrypting SSL traffic violates privacy laws. In countries where decrypting SSL is illegal. In highly regulated industries where decrypting SSL is a serious violation. Solutions that scan and decrypt all SSL by pushing certificates may allow exceptions for BYOD or regulated traffic, but users will get a warning message in the browser that they may not understand. If admin solves this problem by disabling SSL inspection, security holes are created. Content-aware granularity ensures that SSL decryption can be restricted for parts of a website or for workgroups, individuals or domains, in accordance with your organization s precise requirements.
8 Other iboss SSL features include: Exclusive Visibility: iboss technology provides visibility across all 131,070 data channels on your network in cluding hidden streaming UDP ports where SSL threats may hide. Circumvention defense: iboss technology combines scanning inside SSL with application layer scanning across all Web streams, using signatures and heuristics, to block circumvention attempts. Data Loss Protection: iboss content-aware SSL inspection detects threats immediately and restricts access to suspicious SSL traffic. Granular social media controls: iboss content-aware scanning of SSL traffic allows you to create group policies that manage access per page content, so your organization can use social media productively. Google Application Control: iboss accurately identifies each Google appli cation and allows access based on group membership and only to parts of Google Services, for granular, policy-based control. Forensic-Level Reporting: iboss incorporates industry-leading, forensic-style reporting through the iboss Threat and Event Console Reporter, which provides unrivalled insight into the blind spots in SSL traffic. EdgeScan Unique feature for Windows OS: iboss provides advanced SSL scanning at the individual workstation, rather than at the net work gateway to mitigate the risk of MiTM attacks. About iboss Cybersecurity WP/SSL-06/15 iboss Cybersecurity defends today s borderless networks against malware, advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere Advanced APT defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced cybersecurity approach with equal emphasis on prevention, detection and containment to reduce damaging loss from data breaches. Backed by patented, next-generation technology and unparalleled visibility across all inbound/outbound data channels, iboss Smart Defense provides better security weapons to reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users. Visit iboss, Inc. (P) [email protected] U.S. HQ 9950 Summers Ridge Rd., Bldg. 160 San Diego, CA All rights reserved. iboss, Inc. All other trademarks are the property of their respective owners.
FireSphere Advanced APT Defense Web and Application Security Mobile Security
FireSphere Advanced APT Defense Web and Application Security Mobile Security Comprehensive Security Solutions Built for Today s Networks The mobile revolution has connected organizations and their employees
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud
Comprehensive Security Solutions Built for Today s Networks iboss provides solutions that protect thousands of enterprises, service providers and government networks against a new era of cyber threats.
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS
SECURING NETWEAVER DEPLOYMENTS A RSACCESS WHITE PAPER SECURING NETWEAVER DEPLOYMENTS 1 Introduction 2 NetWeaver Deployments 3 Safe-T RSAccess Overview 4 Securing NetWeaver Deployments with Safe-T RSAccess
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
Web Presence Security
Web Presence Security Web Presence Security 2 Getting your business online is about reaching out and connecting with millions of potential customers, buyers, and partners. Building a website is the most
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
White paper. How to choose a Certificate Authority for safer web security
White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
AccessEnforcer. HTTPS web filter overview
AccessEnforcer HTTPS web filter overview A web filter is essential to keeping hazards and distractions away from businesses. To stay safe, productive, and compliant, every organization must block certain
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
SSL Certificates 101
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
WHY YOU NEED AN SSL CERTIFICATE
Go Daddy Technical Brief ecommerce Security WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management
A Websense Brief By Patrick Murray, Senior Director of Product Management Advanced Persistent Threats: From FUD to Facts With Websense, you can stay a step ahead of the threats. From our roots in web filtering,
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper
Sponsored by IT and Business Professionals Say Website Attacks are Persistent and Varied EXECUTIVE BRIEF In this Paper Thirty percent of IT and business professionals say their organization was attacked
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot
Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot Since the mid-90 s, users transacting on the internet have been assured of security by the lock icon displayed on their browser and
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
