Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.
|
|
|
- Ralf Jerome Boyd
- 9 years ago
- Views:
Transcription
1 1 / 40
2 Crypto () Client security Server security 2 / 40
3 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on 3 / 40
4 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on Mostly covered last time Crypto is insufficient for Web security One issue: linkage between crypto layer and applications 4 / 40
5 Trusting Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on What does the server really know about the client? What does the client really know about the server? 5 / 40
6 The Server s Client Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on What has told the server? Unless client-side certificates are used, absolutely nothing provides a secure pipe. Someone is at the other end; you don t know whom No linkage to transactions 6 / 40
7 SET Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on In theory, we could have had digitally-signed purchase orders linked to credit card accounts Visa and Mastercard (and eventually Amex) tried, after the Web became popular They developed a protocol called SET (Secure Electronic Transactions) It provided client-side certificates linked to credit cards In theory, merchants wouldn t need to know (and store) credit card numbers Virtually no one used it The reasons were both technical and financial 7 / 40
8 The Failure of SET Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on It required client-side software Very few people install extra software Client-side certificates are hard to use what if you use several computers? There was too little financial incentive for merchants, so they couldn t give customers a discount for using SET It still permitted merchants to store credit card numbers; in fact, they were present, albeit encrypted, in the certificate Merchants use credit card numbers as customer tracking keys for databases Good crypto alone isn t sufficient! 8 / 40
9 Aside: The SET Root Certificate Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on Who should control the SET root certificate, used to sign the Visa, Mastercard, etc., top-level certificates? (SET certified Visa et al.; they certified banks, who in turn issued customer certificates) It would be catastrophic if the root s private key were compromised Visa didn t trust Mastercard, or vice-versa Solution: a sacrificial PC signed all of the second-level certificates, at which point it was physically smashed. Different organizations took home different pieces... 9 / 40
10 The Client s Server Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on The client receives the server s certificate. Does that help? A certificate means that someone has attested to the binding of some name to a public key. Who has done the certification? Is it the right name? 10 / 40
11 Who Issues Web Certificates? Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on Every browser has a list of built-in certificate authorities The latest version of Firefox has about 180 certificate authorities! Do you trust them all to be honest and competent? Do you even know them all? (One CA has a 512-bit RSA key.) (Baltimore Cybertrust is listed. It sold its PKI business in Are the new owners trustworthy?) 11 / 40
12 Mountain America Credit Union Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on In 2006, someone persuaded a reputable CA to issue them a certificate for Mountain America, a credit union The DNS name was It looks legitimate, but the real credit union site is at (There s also a Las Vegas travel site) Which site was intended by the user? 12 / 40
13 A Fake Certificate Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on 13 / 40
14 A Technical Attack Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on Usually, you shop via unencrypted pages You click Checkout (or Login on a bank web site) The next page downloaded without protection has the login link, which will use What if an attacker tampers with that page, and changes the link to something different? Will you notice? Note that some small sites outsource payment processing / 40
15 Conclusions on Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America Credit Union A Fake Certificate A Technical Attack Conclusions on The cryptography itself seems correct The human factors are dubious Most users don t know what a certificate is, or how to verify one Even when they do know, it s hard to know what it should say in any given situation There is no rational basis for deciding whether or not to trust a given CA 15 / 40
16 Client Host Name Hash Function Support 16 / 40
17 Client Host Name Hash Function Support Client host name Client CA list More standard PRFs; those are specified in the cipher suites Changes to cipher suites 17 / 40
18 Client Host Name Client Host Name Hash Function Support In hosting centers, many web sites (with different DNS names) sometimes share the same IP address Distinguished in HTTP by a Host: header But with (or ), the server sends its certificate before the Host: header is sent. Which certificate should be offered by the server? New extension: include the host name in the ClientHello message 18 / 40
19 Hash Function Support Client Host Name Hash Function Support uses hash functions for several things: certificates, MACs, PRFs What hash functions are supported? For the entire life of and, we ve had MD5 and SHA-1 but MD5 has been cracked and SHA-1 is falling Which functions are supported by the client? MACs are easy; that s part of the cipher suite New extension: ClientHello announces hash function support Should have been done originally but no protocol designer anticipated the hash function problem 19 / 40
20 Web Browser Security The Attackers Goals Buggy Code Why Are Browsers So Insecure? 20 / 40
21 Web Browser Security Web Browser Security The Attackers Goals Buggy Code Why Are Browsers So Insecure? User interface Buggy code Active content 21 / 40
22 The Attackers Goals Web Browser Security The Attackers Goals Buggy Code Why Are Browsers So Insecure? Steal personal information, especially financial site passwords Turn computers into bots Bots can be used for denial of service attacks, sending spam, hosting phishing web sites, etc. 22 / 40
23 Buggy Code Web Browser Security The Attackers Goals Buggy Code Why Are Browsers So Insecure? All browsers are vulnerable, and getting worse Browser bugs (Symantec): Brower 1H2005 2H2005 1H2006 IE Firefox Opera Safari Exposure period (Symantec): Browser 2H2005 1H2006 IE 25 9 Firefox -2 1 Safari 5 Opera / 40
24 Why Are Browsers So Insecure? Web Browser Security The Attackers Goals Buggy Code Why Are Browsers So Insecure? Their task is complex They are dealing with many untrusted sites By definition, browser inputs cross protection domains It is likely that no browser is signficantly better than any other in this regard they re all bad 24 / 40
25 JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? 25 / 40
26 JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? There s worse yet for web users: active content Typical active content: JavaScript, Java, Flash, ActiveX Web pages can contain more-or-less arbitrary programs or references to programs To view certain web pages, users are told please install this plug-in, i.e., a program Given a choice between dancing pigs and security, users will pick dancing pigs every time. (Ed Felten) 26 / 40
27 JavaScript JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? No relationship to Java originally called LiveScript (EvilScript?) Source of most recent security holes, in Firefox and IE No clear security model Crucial link in cross-site scripting attacks 27 / 40
28 AJAX JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? AJAX Asynchronous JavaScript and XHTML Permits highly interactive web pages, i.e., Google Maps Security implications for client and server are still quite unclear (but are likely to be bad... ) 28 / 40
29 ActiveX JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? The biggest active content design error Over 1,000 ActiveX controls on a typical new, out-of-the box, machine Translation: over 1,000 different pieces of code that can be run by almost any web page But wait, there s more! 29 / 40
30 Downloading ActiveX Controls JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? Any web page can download other controls Translation: any web page can download an arbitrary piece of code to run on a user s machine The only protection is a digital signature on the downloaded code But at best that identifies the author see the previous discussion of certificates! There is no restriction on what the code can do 30 / 40
31 Why ActiveX? JavaScript AJAX ActiveX Downloading ActiveX Controls Why ActiveX? It can be used for some very beneficial things, such as Windows Update It can be used to enhance the user s web experience, i.e., provide dancing pigs Business reasons? Tie web sites to Windows and IE? Only IE has ActiveX. This is the single biggest security difference between IE and Firefox 31 / 40
32 HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP 32 / 40
33 HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP Three options: client-side certificates, HTTP authentication, site-specific Client-side certificate uses Storing and protecting the private key is hard Where does the key live? How is it moved from machine to machine? Site-specific a login screen is by far the most common 33 / 40
34 HTTP HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP Transaction between the web browser and the web server Two types, Basic and Digest Generally used together with Often seen as unaesthetic 34 / 40
35 How They Work HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP Client sends an HTTP request Server replies with a WWW-Authenticate: challenge Client prompts user for credentials Client retries request with Authorization: header included Can be used to authenticate to proxies, but that s rare 35 / 40
36 Basic HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP Server send a challenge with a realm Realm is displayed to the user (but not tied to a certificate) Client replies with base-64 encoded (but not encrypted) password For userid Aladdin and password open sesame, client sends Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ== which is Aladdin:open sesame in base / 40
37 User Prompt HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP 37 / 40
38 Digest HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP Uses challenge/response authentication Server sends a nonce in the WWW-Authenticate: message Client reply includes MD5 hash of username, password, nonce, HTTP method, and requested URL Can t replay, because the nonce will be different each time Password not sent in the clear (Actually somewhat more complex than this) 38 / 40
39 Password Storage HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP With Basic authentication, Unix-style hashed passwords can be stored Digest (and most forms of challenge/response) require plaintext passwords That file can be stolen and people often reuse their passwords for other web sites Note that this applies to web page-based authentication, too; it s not a limitation of HTTP authentication 39 / 40
40 Limitations of HTTP HTTP How They Work Basic User Prompt Digest Password Storage Limitations of HTTP No fancy login screen No Forgot your password? link No easy recovery from authentication failure; just a 401 error Generally used only by low-end web sites Not very friendly for token-based authentication (though Digest is better) 40 / 40
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Breaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Frequently Asked Questions
Frequently Asked Questions Verified By Visa Frequently Asked Questions This section offers additional information and details about Verified By Visa. General questions Registration During Shopping Shopping
Web and Email Security 1 / 40
Web and 1 / 40 Untrusted Clients Repeat: Untrusted Clients Server-Side Storage Cryptographic Sealing Hidden Values Cookies Protecting Data Sidebar: Cookies and JavaScript Cross-Site Scripting (XSS) Why
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
Web Server-Side Security
Protecting the Server Standard Defenses Server-Side Scripts Injection Attacks Example: Webmail Server Filtering Webmail Requests File Permissions Scrubbing Your Site Users 1 / 47 Protecting the Server
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Linux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper
Sponsored by IT and Business Professionals Say Website Attacks are Persistent and Varied EXECUTIVE BRIEF In this Paper Thirty percent of IT and business professionals say their organization was attacked
Steve Gibson Revolutionizing Website Login and Authentication with SQRL SQRL
SQRL A simple & straightforward, open, intellectual property unencumbered, easily explained, provably secure, pseudonymous, 2-party, web domain based, authenticated identity solution for the Internet.
a. StarToken controls the loss due to you losing your Internet banking username and password.
1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Certified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
SSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
SSL Certificates 101
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
vrealize Air Compliance OVA Installation and Deployment Guide
vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
HTTPS is Fast and Hassle-free with CloudFlare
HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE [email protected] www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
An Introduction to CODE SIGNING
An Introduction to CODE SIGNING CONTENTS. 1 What is Code Signing. 03 2 Code Signing Certificates 101...05 3 Why & When to Digitally Sign Code.09 4 Self Signing vs. Publicly Trusted...12 5 Code Signing
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
WIRELESS LAN SECURITY FUNDAMENTALS
WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Configuring Secure Socket Layer (SSL)
7 Configuring Secure Socket Layer (SSL) Contents Overview...................................................... 7-2 Terminology................................................... 7-3 Prerequisite for Using
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
Sample Report. Security Test Plan. Prepared by Security Innovation
Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...
MasterCard SecureCode FAQs
MasterCard SecureCode FAQs GENERAL INFORMATION What is MasterCard SecureCode? MasterCard SecureCode is a service from MasterCard International Inc. and brought to you by Rogers Bank that provides you with
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure SSL Certificates
Network Solutions Secure Services Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure s The Federal Trade Commission (FTC) estimates that 3.2 million US citizens every
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
