Probable Risks Concerning Security in Communication and a Protection Approach
|
|
|
- Jonas Shaw
- 10 years ago
- Views:
Transcription
1 БЪЛГАРСКА АКАДЕМИЯ НА НАУКИТЕ BULGARIAN ACADEMY OF SCIENCES ПРОБЛЕМИ НА ТЕХНИЧЕСКАТА КИБЕРНЕТИКА И РОБОТИКАТА, 64 PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 64 София 2011 Sofia Probable Risks Concerning Security in Communication and a Protection Approach Nikolay Dokev, Ivan Blagoev New Bulgarian University, 1618 Sofia s: [email protected] [email protected] Abstract: This paper describes the risks to privacy when using communication by electronic mail. Different ways are discussed that compromise the , as well as the approaches to avoid them and ensure the reliability of an . A method is proposed and a software product developed that combines the advantages of the most commonly used technologies. The areas of its applications are discussed. Keywords: communications, security, x509 certificates, S/MIME, encryption. 1. Introduction The development of global information network and the necessity for communication among people has lead to the constant need of electronic mail ( ) usage. Even users who do not often use Internet and whose business is not connected with this, make the most of the electronic mail as a communication tool. On the other hand, a majority of the users are completely dependent on this way of communicating. It is considered that the electronic mail is the basic reason for fax service fading. Internet has, of course, other ways of information exchange among users, but the electronic mail is still most widely spread. However, can we be certain in letters authenticity? 38
2 It is a fact that this technology is very popular because it is cheap and easily accessed by every user. Each company, no matter how small it is, could get its own server. Nevertheless, the low price, the small maintenance expenses, the efficiency and the wide distribution, do not mean that this communication method does not bring a lot of risks. Further on we shall discuss some possible threats that are often neglected by the users, while operating this service in its common form. 2. Ways of compromising One of the simplest, but also mostly neglected possibility, is the user s carelessness. Very often at places, where different people have access to a given computer, the user might forget their computer unlocked and the profile logged in, while being away at this very moment. Thus any person, having access to the computer system, might take advantage and send a false letter on behalf of the account owner. This probability is so actual and frequently met that even the security audits of some standards, like ISO, require obligatory locking of the computers during the time when the users are not in front of them. Some hardware manufacturers have even designed devices that lock the computer when the user walks away. In order to be sure in the s received, some users trace their origin, checking their headers which server the letter comes from and whether the IP address corresponds to the actual one. Anyway, for this type of a fraud, such checks are not always efficient. Another way is when the hacker re-directs the connection of a user and mediates between the user (client) and the server. This means that the haker controls the communication with the client and responds in the way the server would when the client wants access. At the same time he is communicating with the server as if being the actual client. This gives a possibility to the hacker to modify the content coming from the client, to derive information from it and to send false answers, as if generated by the actual server. This type of hacker s attack is one of the most dangerous and called man-in-the-middle. In this case the correspondence may be easily counterfeited. Unlike the previous fraud described, this attack requires considerable knowledge in information technologies aspect. The hacker has to be patient and stubborn in order to succeed. However, this fact must not make us calm and neglecting this thread. In addition, once the attack becomes successful, it remains invisible for the users affected, because in most of the cases the electronic messages pass through the computer networks entirely unprotected as a clear text and nothing counteract it. The use of an Open Relay unprotected mail server enables sending of a false letter on behalf of any of the users. The Internet hackers often use such servers to distribute spam or fraud that may be with a longer and more serious purpose. The fraud result is not always immediately revealed. In many cases the hacker is able to derive important information which is the clue for other greater aims he wishes to achieve. Thus, besides the correspondence, it might appear that the damages are much more serious (Fig. 1). 39
3 One of the approaches, protecting against this type of counterfeited mail, is to maintain and constantly update the so called black lists with unprotected functioning mail servers. Thus, if a mail server receives a letter and the IP address of the sender is in this black list, this letter will not be re-sent, but blocked. Another way is by reverse Domain Name Server (DNS). When the mail server receives a letter, the server checks whether the IP address of the sender corresponds to the domain, generating the letter. In case it does not correspond, this letter is blocked. Anyway, both ways have some shortcomings and do not guarantee complete protection. In the case of supporting black lists with IP addresses of mail servers, the delay from the detection up to publishing in the list an unprotected mail server, might be fatal and the false mail already received by the victim. As for the reverse DNS, it is almost inapplicable, because it turns out that a large part of the mail servers in Internet, though real, do not possess correct corresponding reverse DNS. 40 Fig. 1 The client programs for operation with electronic mail usually use POP3 protocol for letters reception. This protocol, as well as SMTP, is a protocol of high level, their commands and the information they transmit are in clear text. Their content could be read by listening in on the TCP/IP protocol in the global or local computer network. The user s name and password that might become visible to the hacker through this attack, may serve for access to the mail box of their owner, as well as for the authentication required by the mail server, while delivering false letters. Fig. 2 shows an example of this type of attack. In order to connect the example from Fig. 2 with practice and to give clearer explanations, we propose the following test experiment. For this purpose we have selected an arbitrary provider of free electronic mail in Internet that provides
4 services which are not at all protected to his clients. We have registered a mail account with the name userforest and password unsecure. The tool used in the experiment is a program for listening in on to the network traffic. No matter what operation system is used, there are always certain methods to trace the passing through or going into the computer TCP/IP traffic. In this example a 64-bits Windows operation system is used. Under Windows, as well as under other operation systems, there is a large variety of software, that may be used to listen in on TCP/IP traffic and a great part of these products possess quite flexible and developed interface for the aim set. Fig. 2 Microsoft Network Monitor is used in the example, which may be free downloaded from the official Microsoft site. This is a very good product, designed with the purpose to aid software developers in detecting errors when creating network software, or in removing communication problems. After the installation of Microsoft Network Monitor, a network interface must be defined, and then traced. In this case the following filter is applied: IPv4.Address ==XXX.XXX.XXX.XXX and IPv4.Tcp.Port ==110. The IP address of the server, towards which the client will turn to (POP3 Mail Server IP Address) is placed at XXX.XXX.XXX.XXX. The port is 110, since this is the standard port for this service. In random cases it can also be changed by the administrator of the mail server considered. But this is not difficult to be discovered and not a reason to stop and protect the process of listening in on users names and passwords. The filter is necessary because a large quantity of packets pass through the network, so that if all are caught and stored, this would considerably hamper the processing and deriving of the information needed. After configuration, the Apply button is pressed, and then Start. Then the hacker has only to wait for the moment when the users check their mail. In order to show the example in details, we shall indicate what commands would send a mail client, using the built 41
5 in Windows Telnet client. This makes possible to see the communication between the client and the server in POP3 protocol (Fig. 3). 42 Fig. 3 After completing the communication, we shall check the content of the logs in an apriori prepared for the purpose Microsoft Network Monitor. The information stored in the log is more than the necessary amount, including a 16-bit presentation of the packets content, that is why we shall display just the relevant part of it: POP3 response: +OK stormaster1 POP3 Cluster v2.3.9 Webmail server ready < @stormaster1> POP3 command: user userfortest POP3 response: +OK Name is a valid mailbox POP3 command: pass unsecure POP3 response: +OK Mailbox locked and ready POP3 command: stat POP3 response: +OK POP3 command: quit POP3 response: +OK From this example it becomes clear that using the service in this form, besides the risk to reveal the user s name and password, enables the hacker to read our whole correspondence, even without using our name and password. And all this is possible only by listening in on the router, where our traffic passes, because he can take the content of POP3 protocol exactly in the form, in which it is accepted and sent between the mail server and mail client. The fact that the users do not usually realize up to what extent they are unsecured and what risks their is subjected to, is quite alarming. Thus, trusting a service which they do not know in details and accepting the idea that the password is familiar just to them, they can easily become fraud victims. An approach to protect against this way of listening in on attack is through SSL encrypting of the communication between the client and the mail server. Nevertheless, practice shows that most of the functioning mail servers are not defended in this way. Even if we assume that there are some
6 exceptions, we cannot be certain that all our correspondents are protected against this or other types of attacks. The usage of free and common Web mail services in Internet has also its risks. The convenience to have a suitable and similarly displayed mail client wherever we go is very attractive. But it brings the risk of account compromising by some programs, such as Key Logger. The use of different computer networks, that are not checked and not secure, exposes us to such threads. The programs of this type are invisible for the users, they are apriori introduced and like network traffic listening in on, they also save information, but in this case the object is the user s keyboard. The entire input by the user is caught and stored in a secret log that is read by the hacker responsible for the attack. Let us assume that the computers we use are not an object of hacker s counterfeit. The users quite often do not know the fact that not every server, suggesting free in Web, is protected against listening in on the network traffic. HTTP is a text-based protocol of high level, which can also become vulnerable to listening in on (Fig. 4). When entering the user s name and password for access to Web mail box, it is possible to read them, as evident in the following example. Fig. 4 For this example we register in an arbitrary and free Web mail, using the already mentioned name userforest and password secure. The transmission of the user s name and password is done by sending the format from the browser in a Web page for user s authentication. For the example we shall again use the already familiar Microsoft Network Monitor. The setup is similar to the previous example, with the only difference that for filtration will be used the packets, passing through port 80. It is necessary to limit the tracing only to packets going towards the IP of the server providing the . This will decrease considerably the volume of the collected information and will make the log easier for investigation. After everything is prepared, we shall log in the Web mail, as the user (victim) would do in his Internet browser. The next step is to review the log, 43
7 collected by Microsoft Network Monitor. Since the log from HTTP protocol is much larger than the log of POP3 protocol, we shall again show the shortened content only, which reveals the name and the password for access: POST HTTP/1.0 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/xshockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, application/vnd.ms-excel, application/msword, */* Referer: Accept-Language: bg Content-Type: application/x-www-form-urlencoded Proxy-Connection: Keep-Alive User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR ;.NET CLR ;.NET CLR ;.NET CLR ) Host: httpmailservername Content-Length: 179 Pragma: no-cache Cookie: OAID=ab0effc4d04e3234e3ac6f43ad5e0d6a; t=m_a.-70_s.f; utma= ; utmb= ; utmz= utmcsr=(direct) utmccn=(direct) utmcmd=(no ne); OACBLOCK= _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ; OACCAP=2576.2_204.13_25.29_2564.3_2560.8_2534.3_1733.2_2276.2_1743.2_ _2614.1_350.4_1866.4_2374.2_2588.1_1735.1_2584.1_971.1_1747.2_ ; OABLOCK= _ ; OACAP=5662.3_5442.1; session=480664e2edfffe90e08518e8fc0edcdb; imp_key=480664e2edfffe90e08518e8fc0edcdb; auth_key=480664e2edfffe90e08518e8fc0edcdb; _OACCAP[25]=1; _OACCAP[204]=1; utmc= ; _OACCAP[2560]=1 session=480664e2edfffe90e08518e8fc0edcdb&actionid=&bui=&url=&load_f rameset=1&autologin=0&ie_version=6%2c0%2c2900%2c5512&server_key=cyr The user s name and password obtained from HTTP traffic are transmitted in the log as clear text. The values of the variables imapuser for user s name and pass for the password are underlined herein. 44
8 After the experiments accomplished we could conclude that we cannot be entirely sure in the reliability of our correspondence. In addition, even in case a person considers that their system is well defended, they cannot be sure in all electronic letters received. However, the information exchanged is not always so important and confidential and this is a prerequisite not to bother too much about the fact that a malicious user might falsify it. That is why most of the time we are using our , we do not become victims of such a fraud. Our idea is to pay attention to the cases when we must be absolutely certain in the information received through . And particularly in these cases it will be nice to have a solution, which will decrease to minimum the risk of counterfeits. It is also possible to integrate such a solution in an information system, re-sending information that is significant for the users. For example, storing contracts, bank accounts, credit card numbers, etc., that requires also notification about certain events. 3. Technologies of protection We propose and describe some technologies that may be combined and applied to be a solution of the problem. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol developed by RSA Data Security Inc. to avoid counterfeiting of messages. It is created on the basis of the existing MIME protocol that makes it easily integrated with the existing software products. S/MIME is developed on the widely spread existing standard which has enabled its rapid deployment among different clients and different operation systems. This, on its hand, made sending and receiving among users with different operation systems possible. Thus a Windows user possessing Outlook Express may send an to a Unix user, applying Netscape client. At that, it is not necessary to install additional programs or software for this purpose. S/MIME takes care to provide the following cryptographic services in messages application: authentication message integrity and non-repudiation of origin (using digital signatures), and privacy and data security (using encryption). X509 Certificate is a digital certificate of X509 type that can assist in protection, because: it connects with a pair of a private and a public key and an individual Distinguished Name and address of the for owner s identification. That is why in order to connect an encrypted and/or signed with a certain digital certificate, it is necessary the of its author to coincide with the published one in the digital certificate. X509 certificates are built as a hierarchical model, on its top a Root certificate is placed, and each lower one is signed by the above located. That is why the official providers of digital certificates publish them in a certificate chain, where the certificates are ranked according to their hierarchy. Other methods of protection concern the certificate expiry date. It is assumed that if a person attempts to discover the private key of a given certificate by guessing, the certificate expiry date will come. Another approach is CRL (Certificate Revocation List) a list with certificates that are invalidated due to fears for loss or 45
9 compromising. Last, but not least in importance, come the hardware cryptoprocessors, which must protect the private key of the certificate against malicious hackers software, incorrect application or other compromising methods. CSP (Cryptographic Service Provider) is a software library, which contains powerful implemented cryptographic algorithms. It is to be combined with a digital certificate, which possesses a private and a public key. An additional convenience is that it also contains implemented interfaces for control of the hardware cryptographic modules and crypto-processors (smart cards). This guarantees that the private key, belonging to the digital certificate is protected to a high security degree and any fraud with it becomes almost impossible. The principle of hardware protection with the help of a smart card is that either it or a similar hardware tool contains the private key of the user. When there is a need to apply the private key to any cryptographic operation, it does not leave the device and cannot be read by a malicious user through the computer system. CSP contains interfaces which allow the encrypting, sending and processing of the data from the crypto-processor on the smart card, but not in the memory of the computer system. Thus the private key is applied but at the same time it remains protected. After the description of the operation principle here, there remains the uncertainty that it is possible to send any information by a malicious program that will use the program interfaces of the corresponding CSP. Thus data will be signed that will make a hole in all security precautions up to the moment. But in fact, when sending the data that must be encrypted with the help of the private key, which means also turning to the crypto-processor, the operation will be blocked until the operator enters his PIN code. Thus the access to the device is controlled and the system cares about notification of the user about the start of a process which wants to use the smart card, and after that the user decides whether the operation will continue. When encrypting an electronic letter with the help of the technologies above mentioned, an encrypted electronic letter with S/MIME format is generated. The public key of every of the letter users is taken out of their certificates and they are identified by the name of the publisher of their digital certificate and serial number. When a message is delivered to a recipient, the electronic mail software detects the content of the message by its defined content type. After that the digital certificate, used to encrypt the content is applied, in order to decrypt it with the help of the private key. The security level in this method is quite high and could give us some certainty that our electronic mail is inaccessible. Anyway, security has different aspects. Let us assume that the digital certificate is lost or re-issued with a new pair of a private and a public key and it does not keep the previous pair of keys. This would cause impossibility to open and read your own correspondence, encrypted with the use of the previous pair of keys. Even the letter author, after encrypting it with the help of the encrypting algorithms, would not be able to access it. While reviewing the folder of sent items in your client s mail, if there are some encrypted ones, you will notice the letters as available in the list of sent items, but unable to be downloaded. This fact has another advantage as well. In case a malicious person 46
10 reviews secretly the sent mail, he would not be able to access the letters encrypted. Moreover, wherever such a letter passes, through different routers and servers, it will be unreadable. And the recipient may hide its content again by excluding the cryptographic module or the SIM card with the digital certificate on their computer. It is necessary to know that it is not obligatory to be an owner of a digital signature for encrypting and signing, and have obligatorily an additional external cryptographic device, as above described. You could have a completely functioning digital certificate, entirely stored in the operation system. But in this case the security degree would not be so high. The reason for this is that the private key, which is the most important security element, will be stored and accessible in the memory of the computer system at moments, when it must be applied. This particular moment causes the greatest thread and a risk exists that at this time it might be copied from memory. During the remaining time it will be encrypted and saved by the operation system. However, we cannot mention the cases when there is no necessity for such serious precautions, because the information transferred does not require it, and we also consider our computer system sufficiently protected. Hence, the compromise of not using cryptographic hardware is excusable. Such a letter, similarly to the generated by the cryptographic hardware, will pass unread through many Internet machines, until reaching the recipient. That is why, the risk degree and the expenses for its avoiding must be determined according to our necessities. A new approach is suggested, combining the technologies, above discussed, that avoids the risks described in the paper. This is achieved, taking advantage of the good aspects of each one of the technologies selected. SMIME format is used to transmit an encrypted or signed letter by . We encrypt the letter by a symmetric encrypting algorithm. But in order to be sure that the symmetric approach will not be compromised, we shall combine it with the security of the digital certificate and its protected private key. Thus it is possible to apply an asymmetric algorithm to the key encoding that we have used in the symmetric algorithm. Adding a hardware crypto-processor, that we have chosen to defend the digital certificate and its private key, we shall obtain as a result a complex, but secure combination of cryptographic techniques to protect our message. 4. Programming code The code is developed in Microsoft Visual Studio 2010, the technology is.net Framework and the programming language is C#. class Program const int SelectCertByPosition = 0; // is first certificate in store static void Main() 47
11 string strplain = "Clear text message..."; byte[] bytecert = null; // Get Certificate bytes from Personal Certificate Store GetCertificateFromStore(SelectCertByPosition, ref bytecert); if (bytecert == null) return; X509Certificate2 cert = new X509Certificate2(byteCert); // Encrypt message in SMIME format 1 CmsRecipient recipient = new CmsRecipient(cert); ContentInfo contentinfo = new ContentInfo(Encoding.UTF8.GetBytes(strPlain)); EnvelopedCms envencrcms = new EnvelopedCms(contentInfo); envencrcms.encrypt(recipient); byte[] encrresult = envencrcms.encode(); strplain); // Show unencrypted message Console.WriteLine("Message for encrypt: " + // Show encrypted message encodet in BASE64 and SMIME format Console.WriteLine("Encrypted result:"); Console.WriteLine("========================================== ==========="); Console.WriteLine(Convert.ToBase64String(encrResult)); Console.WriteLine("========================================== ==========="); // Decrypt message 2 EnvelopedCms encryptedmessage = new EnvelopedCms(); encryptedmessage.decode(encrresult); // If your private is keeped on a smart card you must enter PIN code encryptedmessage.decrypt(); byte[] result = encryptedmessage.encode(); // Show decrypted message Console.WriteLine("Decrypted message: " + Encoding.UTF8.GetString(result)); 48
12 public static void GetCertificateFromStore(int certpositioninstore, ref byte[] x509certrawdata) // Choice certificate store X509Store storemy = new X509Store(StoreName.My, StoreLocation.CurrentUser); ; int icount = 0; try storemy.open(openflags.readonly); // Read certificates foreach (X509Certificate2 foundcert in storemy.certificates) if (certpositioninstore == icount) x509certrawdata = foundcert.getrawcertdata(); break; icount++; catch (Exception ex) Console.WriteLine(ex.Message); x509certrawdata = null; finally storemy.close(); storemy = null; return; 5. Code description The program code described in the paper is ready for application. The purpose is to encrypt a text message in S/MIME format, applying a private key of a digital certificate, which after that will be decrypted and displayed on the screen. For the purposes of the program example Microsoft.NET Framework technology is used, where the needed cryptographic algorithms are implemented and the support for the 49
13 corresponding interfaces. The programming language is C#. The code is divided in two basic blocks that are of key importance for the purpose set. Here is their description: 1. The message encrypting is implemented in this part of the program. But it is not necessary to define the sender, who is also an owner of the digital certificate, whose keys will be used in encrypting. The certificate is defined in the object by the name recipient. In the variable contentinfo the letter content is downloaded, encoded to the corresponding code table. We have selected here UTF8, and envencrcms is the class, with the help of which the content encrypting is done. This process is realized in three stages: the data for encrypting are downloaded with the help of an instructor at class initialization; the recipient is downloaded, more precisely his digital certificate; at the last line of the block the message is derived encrypted, coded in the appropriate format. In order to encrypt a message, it is not necessary to enter a PIN code, because a public key is used. This is an operation, which is accomplished by the letter s author. The recipient is the person who decodes the message encrypted in order to read it. This process is executed in the second block, described below. 2. Decrypting of the message received. The object, defined in the code under the name encryptedmessage is responsible for message decoding and decrypting. At the first line we initialize it, at the next line the message is decoded with the help of a Decode method. At this stage, if the message structure is violated and not compliant with the format, the operation will be interrupted by an error message. After successful decoding of the message format, the execution passes to the following line, the decrypting operation. When the Decrypt method is invoked, the PIN code will be asked, in order to allow access to the recipient s private key. After the PIN code is entered, the object will send the data to the crypto-processor through CSP interface. After successful decrypting of the message, it can be derived by the Encode method. For clearer display of the program code, the selection of a digital certificate is exposed in another method, under the name GetCertificateFromStore. The location of digital certificates storing in Windows operation system is called a Certificate Store. The deriving of the digital certificate chosen in this case is done, reading the certificate in the respective store by its serial number. That is why the input parameters are two, the first one with the name "certpositioninstore expects entry of the serial number, the second one x509certrawdata is of reference type and serves here to store back the result the digital certificate. The example suggested can be easily implemented in any information system, which would considerably increase its communication security. There are some systems that require automatic notification of the user, sending them the respective information, or vice versa, in automatic process of communication from the users towards the system. In both cases an automatic process of secured communication between the client and the server can be realized, as well as between two servers. 50
14 6. Advantages of the solution proposed The analysis and the experiments done show that the solution proposed would reduce to reasonable limits the risk of information frauds. The discussion of the problems and typical hackers attacks are exposed with the purpose to give better understanding of the risks, connected with this service over-trusting. In some cases, when the risk is evaluated, the use of a digital certificate, not protected by a smart card or any other type of specialized cryptographic module, may be accepted. The software example applied could function with or without any additional hardware modules. It also gives a clear idea of this solution. In some cases it might prove useful in the development and protection of information systems, where the electronic messages, automatically sent, carry confidential information, which might affect the security of its users. R e f e r e n c e s 1. B r a d l e y, T. Essential Computer Security: Everyone's Guide to , Internet, and Wireless Security H o u s l e y, R., T. P o l k. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure The Internet Society. RFC 3851 Secure/Multipurpose Internet Mail Extensions (S/MIME) S c h n e i e r, B. Digital Security in a Networked World M c N a b, C. Network Security Assessment: Know Your Network Возможные риски для надежности коммуникации и один подход защиты Николай Докев, Иван Благоев Нов болгарский университет, 1618 София s: [email protected] [email protected] (Р е з ю м е) В работе описаны риски для конфиденциальности информации при использовании коммуникации путем электронной почты. Дискутируются разные способы вредительства в электронной почте и подходы их избежания и обеспечения надежности электронной корреспонденции. Предложен метод и разработан софтуерный продукт, который обьединяет преимущества наиболее часто используемых технологий. Обсуждаются области его применения. 51
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Crowbar: New generation web application brute force attack tool
Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
How to Build an Effective Mail Server Defense
How to Build an Effective Mail Server Defense A multi-stage approach to securing your email communication August, 21 2006 Author: Alin Dobre, Head of Customer Support, AXIGEN GECAD Technologies 10A Dimitrie
SSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0
AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
PineApp TM Mail Encryption Solution TM
PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging
PrivaSphere Gateway Certificate Authority (GW CA)
PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging
Technical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
isecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Securing SharePoint Server with Windows Azure Multi- Factor Authentication
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6
The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents
Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6 Introduction Organizations use the Barracuda Load Balancer to distribute the load and increase the availability of
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
How To Protect Your Email From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo
The Case for Email Security secure, premium by Erik Kangas, President, Lux Scientiae Section 1: Introduction to Email Security You may already know that email is insecure; however, it may surprise you
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
Internet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
VPOP3 Your email post office Getting Started Guide
VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Secured Mail through PGP Mail Gateway
Secured Mail through PGP Mail Gateway L. S. Haturusinha, Y. Y. Landersz, A. U. H. Gamage, P. N. Pathiranage, G. T. D. Rodrigo, and M. P. A. W. Gamage Abstract PGP Mail Gateway is a backend server which
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
ONE-TOUCH MAIL V 2.3 MANUAL
ONE-TOUCH MAIL V 2.3 MANUAL The Email Solution for a Mobile World One-Touch Mail combines a number of state-of-the-art technologies in one small package to give you access to vital information and keep
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
