PrivyLink Internet Application Security Environment *
|
|
|
- Buck Casey
- 9 years ago
- Views:
Transcription
1 WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense. Organisations can leverage on the Internet to access new clients, open new markets and provide a new cost-effective channel for service delivery and, partners and customers communications. Services like on-line banking, stock-broking, electronic commerce and marketplaces, telecommuting accesses and electronic mail, are prime examples of this potential. The foremost factor preventing many organisations from taking advantage of these business opportunities in this prevalent e-economy are customer concerns over the security risks and exposures in the Internet. Data transmitted over uncharted network, such as the Internet, is vulnerable to interception, electronic vandalism, theft and alteration. Security mechanisms are required to protect these high-value data from all malicious attempts across the open network and are imperative to ensure the Return-On-Investment of all Internet Pure-Plays or click-and-mortar businesses. SSL and Secure HTTP (SHTTP) are two widely adopted security measures used to protect the channel for data exchange, with SSL currently being the most prevalent. However, both have their respective shortcomings. SSL being an open protocol is often the subject of cryptanalyst and its weakness against active attacks as reported in the recent months has alarmed organizations using it for their application data security. In addition, SSL provides only session-based protection and has no data persistency, and its protection end-points are the browser and the web- * The information contained in this document represents the current view of PrivyLink International Ltd, and is correct as of the date of publication. This document is for information purposes only. PrivyLink International Ltd makes no warranties, express or implied, in this document. Information in this document is subject to change without notice, and does not represent a commitment on the part of PrivyLink International Ltd. PrivyLink International Ltd cannot guarantee the accuracy of any information presented after the date of publication. Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 1 of 9
2 server. However, most networks today are multi-tiered and the data endpoint is usually the application server or the host machine. Internal network security risk is not addressed. Thus, SSL no doubt is a valuable step towards practical communications security for Internet applications; it is insufficient to satisfy most organizations security requirement for their application data. Threats to SHTTP are similar to those against SSL 1 with the default operation mode of SHTTP being substantially more resistant than that of SSL. However, its limited use (supported only by Secure Mosaic from EIT) and weakness in key exchange render it inappropriate as the choice security mechanism. Purpose Internet applications are in wide spread use nowadays. Organisations will leverage on the Internet and provide more cost-effectively channels for data communications in terms of business world. Security becomes a significant concern to be considered for the decision making of the organisations. This paper describes the concept of the Internet Application Security Environment, its business and security benefits, and its deployment scenarios. We will first look at the security requirements of most organisations and the current security technologies being deployed. We will then examine the security inadequacies in these security technologies and demonstrate how the Internet Application Security Environment (IASE) overcomes them to deliver complete end-to-end application layer security to the application data. End-to-end Security Requirements for Internet Applications Focusing on most Internet application requirements, organisations need to at least satisfy the following application security requirements: 1. Identification and authentication to enable the application to establish the identity of a user over the Internet, and authenticate the claimed identity to ensure that it can be trusted to provide the requested access to information and resources within the organisation and potentially, its business alliances. 2. Data integrity protection to ensure that the contents of the application data have not been corrupted or tampered with during transit from the sender to the recipient through the network. 3. Data confidentiality protection to ensure that the contents of the application data (if it is sensitive in nature) are kept private or confidential throughout the process. 1 Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 2 of 9
3 Business Acceptance Criteria In addition to achieving the above security requirements, the desired solution needs to ensure that its implementation exhibits a number of important characteristics that will meet the business needs of the applications concerned. 1. Usability. As far as possible, the solution should not require intervention of the users or administrators at both ends of the system i.e. it must be transparent. 2. Affordability, so that the initial investment and ongoing operation cost relating to managing the security risk of Internet application services are justifiable from the business benefits perspective. 3. Low overhead and high throughput, which are important factors on the usability of the end products. The security mechanisms at both ends of the system should produce the desired output within reasonable time period acceptable in the Internet environment. The overheads and performance, if not managed, would result in undue delays, which will restrict the use of the solution, and end-user acceptability of the application system as a whole. SSL Security Issues TCP/IP protocol is the de-facto communication protocol for connecting millions of machine together, thereby creating the Internet. However, TCP/IP was not designed with security in mind; hence it is vulnerable to network eavesdropping. When confidential documents are transmitted from the Web server to the browser, or when the end-user sends private information back to the server inside a fill-out form, someone may be listening in. Thus, to overcome the lack of security in the original communication protocol, Secure Sockets Layer or SSL was developed. SSL is the Internet security protocol (over TCP/IP) for point-to-point connections. It provides protection against eavesdropping, tampering, and forgery. Clients and servers are able to establish a secure link across the Internet to protect the information being sent and received. Let us examine the issues in greater detail in the remaining section. SSL and OSI Layer Client Site Server Site Client App Server App HTTP, FTP, Telnet, etc SSL TCP/IP Internet HTTP, FTP, Telnet, etc SSL TCP/IP Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 3 of 9
4 SSL Version 3.0 was first published by Netscape Communications Corporation (TLS version 1.0, defined in RFC 2246, was based on SSL Version 3.0). It is a low-level encryption scheme used to encrypt network data transmitted in higher-level protocols such as HTTP, NNTP and FTP. The SSL protocol includes provisions for server authentication (verifying the server's identity to the client), encryption of data streams in transit, optional client authentication (verifying the client's identity to the server) and message integrity checking via MACing. SSL Approach and Issues Businesses today are putting more applications onto the web environment and due to high transaction volume; web services are no longer deployed on a singe machine. In fact, most web services are now enabled with web and application servers, with web servers acting as delivery channels and application servers for processing application requests. Figure 1 illustrates such a system set up. As shown in Figure 1, such an implementation leaves us with security gaps, which are potential issues in implementation. An organization s use of the Secure Socket Layer (SSL) version 3.0 protocol protects the Internet channel, but does not secure the end-to-end application channel. Client Browser Internet Web Server Application System SSL Clear-Text Figure 1: SSL-based Web Deployment SSL performs information encryption on a standard browser-to-server transaction. It only secures the connection to the web server, thus securing transactions partially. Unfortunately, securing the network borders is not enough. Data flowing across the web server remains vulnerable to internal risks or third-party risks in case of an outsourced web service. The use of SSL alone without application layer security therefore creates a false sense of security and does not address the true application security requirements. Security Inadequacies of SSL for end-to-end security An obvious concern in SSL is that it only secures the session, it does not secure any actual transaction. This means if someone does steal another s credit card number and use it online, it is almost impossible to prove that it was not actually that person who issued the order. SSL does allow for the Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 4 of 9
5 client to authenticate to the server, however very few people have digital certificates compatible with this and most certificate vendor do not completely verify the identity of the certificate applicant. In addition, such client-to-server authentication only authenticates the communicating entity and not user at the application level. There are newer protocols and systems that allow for two parties to safely conduct transactions with all these features. Thus, SSL alone is inadequate to secure Internet based transaction systems. IASE The IASE is designed to address the security requirements of web-based applications. The deployment of IASE will enable organisations to secure their valuable data end-to-end and allow secure user authentication over the Internet. The following section illustrates how the Internet Application Security Environment solution can be used for identifying and authenticating user over the Internet and how the IASE Security Applet ensures the confidentiality and integrity of user information by encryption. User Authentication As users are authenticated over open networks, most available authentication protocols are not suitable for deployment. The IASE deploys a unique challenge-response authentication method to ensure that derivation of user passwords obtained during data transmission is virtually impossible. The one-time challenge feature prevents intruders from performing replay attack on the system. IASE makes use of strong cryptographic techniques incorporating128-bit DES and 1024-bit RSA encryption algorithms. Hence, with IASE, users can be assured that their passwords will not land in the wrong hands. The screen capture below shows that the encrypted string obtained for the engine_name is different when encrypted on the server side and the browser side. However both are able to decrypt the string to obtain the original engine_name. Applets encryption of engine_name Server encryption of engine_name Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 5 of 9
6 Below shows a sample code segment, which downloads the IASE security applet to the browser. <applet name="trustfieldextapp" codebase="./demo" code="trustfieldextapp.class" width="1" height="1" VIEWASTEXT> <param name="challenge" value="abc "> <param name="sid" value="sq z"> </applet> Data Encryption Data confidentiality is one of the most important aspects of security. Authentication may have conclusively identified the participants in a transaction, but does not ensure the confidentiality of the sensitive data that is being transmitted. To ensure the confidentiality of the information, the data must be encrypted. Encryption and decryption is the process of protecting information from being tampered from unauthorised parties. IASE provides a two-way encryption data security applet using Java technology. The applet delivers a secure way for exchanging sensitive information between clients and the organisation over Internet. It uses sophisticated Java technologies to encrypt and transmit client information securely over WWW. IASE and Cryptographic Key Server PrivyLink's Cryptographic Key Server is used to manage IASE system keys and user passwords to provide maximum security. It is a hardwarebased key management server that provides security functionality to Internet, Intranet, Extranet, and enterprise infrastructure applications. It safeguards sensitive private key information with strong physical and logical security, and offloads computationally intensive public key operations from the server. A combination of these products, applied to your application, eliminates the significant bottlenecks and risks associated with software security processing. IASE SDK Another component of IASE is the software development kit (SDK). The IASE SDK provides the server end of the security functionality required for supporting end-to-end security for the Internet application. It includes:! Secure session establishment with IASE client applet;! Secure user authentication;! Secure data encryption/decryption; and! Secure integration with IASE Cryptographic Key Server (CKS) for secure key management. Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 6 of 9
7 The IASE SDK enables developers to build and integrate IASE-compliant applications with minimal efforts. Developers simply need to identify the information required to be secured and apply the relevant security application application interfaces (API) available. PrivyLink s IASE provides developers with an expert product that includes everything needed for delivering a TRUE end-to-end security application. This means corporations can make their deadlines without having to become cryptographic experts. Deployment Scenarios This section illustrates the scenario where the IASE can be deployed to secure an Internet Application Environment. IASE deployment is really simple. Following are the steps that may be taken. 1. Minor modification to main web page. 2. Replacement of authentication method with IASE authentication API. 3. Identification of sensitive parameters and applying the relevant security APIs. Together with the deployment of the Cryptographic Key Server (CKS), IASE is ready to protect the sensitive information exchanged between the Client and the Application System. The IASE can co-exist with SSL seamlessly. Figure 2 illustrates how IASE is being deployed. Client Browser IASE Applet Internet Web Server Application System IASE SDK CKS IASE Secure Connection Figure 2: IASE-based Web Deployment Benefits Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 7 of 9
8 Convenience Organisations need not explicitly distribute encryption software to clients; hence the service can be deployed without having to invest in establishing security infrastructure to support the operations. Standard Compliance The IASE uses standard based 3DES for symmetric encryption and RSA for asymmetric encryption and supports full strength key length at 128 bit and 1024 bit respectively. Flexible The IASE modular design allows the change of underlying cryptographic algorithms transparently on a regular basis and also for organization to respond efficiently to changes in systems security technology development. Thus ensuring their returns on investment in IASE. Operating Environment! The IASE Server module is currently supported on SUN Solaris and Windows 9x/NT operating systems.! IASE supports CGI/C, ASP scripting and Java Servlets, and support application server such as iplanet Application Server.! IASE Client module supports both Microsoft Internet Explorer version 3.x and above, and Netscape Navigator 4.x and above.! The Cryptographic Key Server supports the IASE natively for better server-side security. Optional Features According to the organization s need, IASE can be deployed with optional features:! ActiveX component for Windows CE platform! Dynamic Pin Pad for enhanced PIN security management! PKI Integration! Stress Test Module for server web application benchmarking Please direct all enquiries for information on the above options to the respective sales contacts provided below. Conclusion In conclusion, IASE does not only address organization s end-to-end security needs for their application data, it also afford a strong challengeresponse based authentication mechanism for user identification and Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 8 of 9
9 authentication. With its native support for server-side cryptographic key server, such as the CKS, the IASE is truly the end-to-end security solution for all Internet applications. About PrivyLink Founded in 1997, PrivyLink is a response to strong industrial demands for high assurance delivery channel for electronic transactions, especially in the government and financial sectors. PrivyLink offers a comprehensive suite of software and hardware solutions to address end-to-end e-security of today and tomorrow s businesses in the e-commerce, e-business, and e- Marketplace arenas. Copyright PrivyLink International Ltd. All Rights Reserved. Copyright 2003, PrivyLink International Ltd. All Rights Reserved. 9 of 9
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Transport Layer Security (TLS) About TLS
Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
cipher: the algorithm or function used for encryption and decryption
! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Data Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
An Overview of the Secure Sockets Layer (SSL)
Chapter 9: SSL and Certificate Services Page 1 of 9 Chapter 9: SSL and Certificate Services The most widespread concern with the Internet is not the limited amount of bandwidth or the occasional objectionable
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
Managing SSL Security in Multi-Server Environments
Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America
Version Highlights SSL Accelerator Version 2.11 New hardware and software version North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Safeguarding the Corporate Portal: A Review of Portal Security
Safeguarding the Corporate Portal: A Review of Portal Security by Colin J. White DataBase Associates Version 1, January 2001 Sponsored by Viador Inc. DataBase Associates TABLE OF CONTENTS PORTAL SECURITY:
Why self-signed certificates are much costlier and riskier than working with a trusted security vendor
The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier and riskier than working with a trusted security vendor Introduction Even when business is booming, smart
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Coalfire Systems Inc.
Security Review Web with Page-Integrated Encryption (PIE) Technology Prepared for HP Security Voltage by: Coalfire Systems Inc. March 2, 2012 Table of contents 3 Executive Summary 4 Detailed Project Overview
