Some Special Fields of Data Security
|
|
|
- Reynard Ross
- 9 years ago
- Views:
Transcription
1 Some Special Fields of Data Security Keszthelyi András Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them. This is a permanent problem of enterprises and private persons as well. The technical prerequisites are given not only for eavesdropping the data of others but for securing our data as well. In this paper I show a possible and a low cost technical solution for a typical situation: how one can hide the digital footprints of his or her browsing the internet. SSH, portforward, privacy, data security 1 Information Age Our age, the present economic era is called Information Age. This name shows the global economy's movement in focus away from the production of physical goods (industrial age) toward the manipulation of information. This means somehow that information is the first-of-all basics of our everyday life. The words data and information are usually used as synonims. At this point it is not only interesting but very important as well do discuss what do these words mean: data, information, knowledge. Data can be any kind of statements which can be interpreted. It can appear in very different forms such as text, pictures, numbers, sequence of characters and/or numbers, etc. and can be stored in/on any kind of data holder, written on paper, painted on canvas, etc., or in most cases digitally in a data storage equipment of a computer. The information is none other than the result of the interpretation of some data, the meaning of the data for a given person. It is possible that different persons assign different meanings to the same data depending on their own knowledge and experiences they collected previously. The gathered information(s) may become knowledge. Data is quantitavie while information is qualitative. Data security has at least two meanings. The first one is ensuring that our data is stored safe from corruption. The second one is that access to it is controlled by the
2 owner. Both fields are huge enough even to recite the possible problems and solutions. Our data is an important part of our working or basic capital. According to the above it can be stated that we must protect our data first of all as we try to protect any part of our capital. Because we cannot control if anyone else extracts any information from our data after (s)he had got the data itself. We only can control the access to our data. Data can be classified into two main groups. Once we can speak about static data which means that the data is stored locally under strict physical supervision. It means that nobody can get neither locally nor remote (i.e. any) access to our data storage equipments without our permission. On the other hand we can speak about dynamic data or better to say data traffic between different computers via the internet. Below some special problems of controlling the access to our data traffic is discussed. Possible Threatens The internet and any parts of it should always be considered as an untrusted network. Data traffic can be eavesdropped at any router or gateway machine. This is possible because of all the traditional communication protocols (e.g. sending and receiving s, ftp, web-browsing) are plaintext-based ones. So the technical possibility is given. Who can be interested in eavesdropping against us? There are too many answers. We can be threatened by an individual spy or data phisher or cracker who is interested in getting explicitely our data. E.g. a released employer of us wants to make a revenge on us or a cracker decides that it is our webshop from where (s)he gets all the credit cards data or one of our business competitors tries some sniffing, etc. On the other hand our ISP is in the technical position to collect too many data about us, about our data traffic, e.g. about our whole or web browsing traffic which can be serious even if only the address and url data is collected. Other service providers can be interested in collecting and analysing (some parts of) our traffic data. Lets think of displaying personalized advertisements on the monitor of the users on the basis of their previously recorded searching keywords. Last but not least governments and government agencies should be mentioned here. E.g. it is known but rarely written or spoken about that the USA tries to eavesdrop the whole electronic data traffic of the whole world. Unless I am not very much mistaken I think that each government wants to know the most possible about the enterprises located in its country and the worse: about its own citizens.
3 In Hungary according to EU rules it is controled by the law what types of data the different service providers (ISPs, cellphone providers, etc.) should log and store in case of a later investigation against a customer of them. I think it is very interesting that there are some cases in which it has become known that the service providers logged and stored user data against the law. 1 I described some aspects and methods of securing the data traffic flowing via the internet in a paper at the conference of MEB Those methods were possible solutions for the very basic communication situations between employees and their enterprise(s). At this point we should face with more serious situatoins which affect even the privacy of each of us because everybody leave too many footprints in the internet and those footprints can be saved easily and retrieved in the worst moment. I think that from this point of view there is not much difference between the situation of a person and an enterprise. Technical Background Each computer which is connected to the internet must have a unique identification number. This is the so-called IP-address. It can be permanent or dynamically assigned. In the case of home computers and ADSL-like connections the latter is the usual. The IP-address identifies the computer in both cases as long as the dynamic IP-address assignements are logged for further use. Data traffic between two different computers needs their IP-addresses so. One of the two computers is called client the other is called server. Client computers send "questions" and server computers sends "answers" backwards. These IPaddrresses can be monitored and logged at any gateway or router computer of the six or sixteen ones between the client and the server. E.g. the client machine (IP-address: on Oct 17, 2007 midday.) of the user sends the http request "GET index.php HTTP/1.0" to the server named (IP-address: ). As an answer the server machine sends and html file to the client machine on which the running web browser displays the initial page of In the present case the route was the following: vivanet.hu ( ); vivanet.hu 1 The so called Zsanett case in which the cell data of the cellphones of the accused policemen were available even after some weeks when cell data should only be logged in case of starting a call. The known blogger Tomcat was cleard up from an accusation on the basis of the cell data of the critical period even if he had not started any calls. In the case of a policeman accused by murder the court asks seven year old cell data. It is also known at least at some cases when Google and Yahoo collaborated with the Chinese government to identify chinese citizens. See e.g. the link below:
4 ( ); GE-1-5.core0.iszee.hu ( ); ( ); ( ); sparta.freedom.hu ( ). So at least six computers could have logged (or logged) the fact that on Oct. 17 somebody from the IP-address red the initial page of Tomcat's blog. Among these six computers the first one is always the same: the gateway of the ISP the others may vary. Of course theoretically it cannot be proved who was sitting in front of the computer at the given moment nor that the page was red nor even the page was displayed. Of course if all the http access log data of a one year long period is analysed it will be clear that the given computer (mine) asked for bombagyar.hu only once for the above example or regularly. How to Secure Our Privacy The most important and frequent activities in the internet are sending and receiving s and web browsing. Both ing and browsing provides very sensitive personal data if it can be logged. If one sends and receives only encrypted s even in this case deductions can be made of his/her activities and preferences or at least his or her personal connections can be traced because only the body can be encrypted the fields of the sender and of the addressee cannot. Based on the log of one's visited url-s and searched keywords a more complete personal profile can be described, including very sensitive information about one's political opinions, possible diseases, sexual interest, human relations, etc. So what we needed is some kind of anonymity for web browsing. One may think that (s)he would like to hide his or her IP-address. It cannot be altered on the client machine by the user because if you do so your computer will not fit into the network and the client-server dialogue will not be able to be established. This conflict can be solved by using an http proxy server which acts as an interpreter between the original client and the original server. The connection between the client machine and the proxy server can, or better to say: must be encrypted. Of course the proxy server should be a trusted computer. In this case the ISP (or the other intermediate computers) can only log the fact of the encrypted data transfer between the client and the proxy machine. In order to know more one should have both the ISP's logs and the logs of the outgoing data traffic of the proxy. It can be very hard if the proxy server is placed abroad or at least has a big data traffic on other demands or more than one proxy is used. The basic rules are the following:
5 the proxy must be trusted, i.e. the user can be sure that no unwanted logs are made or at least the possible logs are not in the reach of unwanted entities; the proxy must not be in the reach of the ISP of the user or in the reach of any entity which can get access to the ISP's logs. Additional rules can be given: fake data traffic can be generated to different directions from the proxy server while fake data traffic is generated between the proxy and the user's computer; more than one user might use the proxy in order to make harder to any possible traffic matching experiments. Technical Solution An http proxy software must be installed on the proxy computer, e.g. Ffproxy. This software is responsible for the redirection of the http traffic of the browsing of the web. Ffproxy is a filtering HTTP/HTTPS proxy server. It is able to filter by host, URL, and header. Custom header entries can be filtered and added. Using another auxiliary proxy server is also supported. OpenSSH is also required. It is a genuine software tool for improving the security of data transfer between computers. It identifies not only the communicating computers but the users as well. SSH gives us three very important security services: Authentication based on two different methods which can be combined. Public key and password can be used. A public key is something which the user must have, a password is a phrase he or she must know to prove his or her identity digitally. Encryption. SSH ciphers the whole data stream by industry standard cryptographic algorithms such as Blowfish or AES (or some others). Data integrity. SSH guarantees the integrity of the data transferred over the insecure network by signing it digitally. SSH makes it possible for users to: log in to a remote computer to run programs; transfer files between the local and remote computers in a secure way (scp);
6 access remote network services in a secure way as if a VPN service were used (port forwarding). The client configuration rules are the following. Web browser(s) must be configured to use a proxy server which the browser can connect to at a given local port, e.g. port In order to have the remote proxy at the local port SSH port forwarding is needed. SSH can redirect the data traffic between two computers. A command like the following SSH -f -N -L 8888:proxy.server.valahol:8080 proxy.server.valahol connects the local port 8888 with port 8080 of the proxy server. This connection is encoded by an algorythm which is considered strong. In the above example it is supposed that the usernames and user keys are correctly set on both machines. Proxy server must be configured to listen to local (i.e. local to the proxy server itself) port Additional proxy configuration settings might be set in order to change some http request header elements, e.g. Security Level It is an important thing to know that a level of 100,00% of security can be reached in no circumstances. The security level of 100% can only be drawn nearer and nearer. The very first thing is to make a risk analyses. One must face the danger, one must determine the possible threatens as accurate as possible. The other important thing to know is that the cost-securitylevel funcion is like in the figure below:
7 So an optimum is needed which depends on the special circumstances of the given person, of his/her position, and, of course, which depends on the (possible) interests of the other side. And what about ing? The simplest method is to use a free er from abroad via our http proxy, in addition we can use PGP or GPG to encrypt the bodies if it is considered to be necessary. The most important two things to know are the following: a) security level 100% cannot be reached; b) if a national security agency or if a mafia decides to get the knowlede of our browsing and ing activities it will be able to get it in some way. References [1] Dwivedi, Hirmanshu: SSH a gyakorlatban. Módszerek biztonságos hálózati kapcsolatok kialakítására. Kiskapu, [2] Gagné, Marcel: Linux-rendszerfelügyelet. Kiskapu, [3] Flickenger, Rob: Linux Server Hacks. O'Reilly & Associates, Inc., [4] Hagen, Bill von Jones, Brian K.: Linux Server Hacks, Volume Two. O'Reilly Media, Inc., [5] [6] Nagy-Britannia: Átlátnának a járókelık ruháin. Minden emberrıl adatbank készül?
TELE 301 Network Management. Lecture 17: File Transfer & Web Caching
TELE 301 Network Management Lecture 17: File Transfer & Web Caching Haibo Zhang Computer Science, University of Otago TELE301 Lecture 17: File Transfer & Web Caching 1 Today s Focus FTP & Web Caching!
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Release Notes for Websense Web Endpoint (32- and 64-bit OS)
Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?
Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction
Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14
1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
Filtering remote users with Websense remote filtering software v7.6
Filtering remote users with Websense remote filtering software v7.6 Websense Support Webinar April 2012 Websense 2012 Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
DCB Ethernet Tunnel Family Configuration Guide
DCB Ethernet Tunnel Family Configuration Guide Introduction Thank you for your purchase of the DCB Ethernet Tunnel. This guide will step you through a typical installation as shown in the following diagram.
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
How To Protect Your Email From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo
The Case for Email Security secure, premium by Erik Kangas, President, Lux Scientiae Section 1: Introduction to Email Security You may already know that email is insecure; however, it may surprise you
What is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Enterprise Security Interests Require SSL with telnet server from outside the LAN
Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
ip.buffer with HTTP New features! Great for Managed Services!
ip.buffer with HTTP New features! Great for Managed Services! Legacy Out Firewall issues Server not easily scaled Non transactional Duplicate data on failure Legacy In Port forwarding VPN black holes Unfriendly
WebMail Forensics. Thomas Akin, CISSP. Director, Southeast Cybercrime Institute Kennesaw State University
WebMail Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University Overview Web Browser Forensics Internet Explorer Netscape WebMail Services Cookies, History, & Cache,
General Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
H3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
Chapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
University of Hawaii at Manoa Professor: Kazuo Sugihara
University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji ([email protected]) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
TeamViewer & DynGate Manual V 2.0
TeamViewer & DynGate Manual V 2.0 i Table Of Contents 1. OVERVIEW... 1 1.1. INTRODUCTION... 1 1.2. TEAMVIEWER RELATED DOWNLOADS... 2 1.3. ABOUT THIS MANUAL... 4 2. INSTALLATION... 5 2.1. CLIENT- AND HOST
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski [email protected]
Using a Malicious Proxy to Pilfer Data & Wreak Havoc Edward J. Zaborowski [email protected] Abstract...3 Malicious Web Proxy...3 Becoming the Proxy...3 ARP Spoofing...3 Static Configuration...3 Web Proxy
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks
Com.X Router/Firewall Module Use Cases White Paper Version 1.0, 21 May 2014 2014 Far South Networks Document History Version Date Description of Changes 1.0 2014/05/21 Preliminary 2014 Far South Networks
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
TELNET CLIENT 5.11 SSH SUPPORT
TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
Anonymity on the Internet Over Proxy Servers
Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues [email protected] Matej Bulić [email protected] Introduction user always leaves digital sign need for security and anonymity Proxy
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
An Overview of the Secure Shell (SSH)
White Paper An Overview of the Secure Shell (SSH) 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Overview of Secure Shell... 2 Introduction to Secure Shell... 2
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor
athenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
NAS 322 Connecting Your NAS to a VPN
NAS 322 Connecting Your NAS to a VPN Connect your ASUSTOR NAS to a VPN network A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
Synology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
visionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
