Best Practices and Applications of TLS/SSL
|
|
|
- Ashlie Sherman
- 10 years ago
- Views:
Transcription
1 Best Practices and Applications of TLS/SSL By Larry Seltzer Security Analyst and Writer
2 The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity in numerous applications throughout the enterprise. By Larry Seltzer, Security Analyst and Writer Executive Summary Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing web browser sessions, but it has widespread application to other tasks. TLS/SSL can be used to provide strong authentication of both parties in a communication session, strong encryption of data in transit between them, and verification of the integrity of that data in transit. TLS/SSL can be used to secure a broad range of critical business functions such as web browsing, server-to-server communications, client-to-server communications, software updating, database access, virtual private networking and others. However, when used improperly, TLS can give the illusion of security where the communications have been compromised. It is important to keep certificates up to date and check rigorously for error conditions. In many, but not all applications of TLS, the integrity of the process is enhanced by using a certificate issued by an outside trusted certificate authority. This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing. Table of contents Executive Summary 1 Introduction 2 What is TLS/SSL? 2 - Digital Certificates 2 - Authentication and Verification 2 Key Security 3 - Encryption 3 - Where TLS Works In the Stack 3 TLS vs. SSL 4 Networks Are Insecure By Default 4 - Authentication 4 - Privacy and Integrity 4 - Solutions 4 Trusted Certificate Authorities 5 - Trusted Roots 5 - Self-Signed Certificates 5 - Authentication Does Not Prove Trust 5 Extended Validation (EV) SSL 5 Not Just For Web Browsers 6 Client Security with TLS/SSL 6 - Wireless 7 - SSL VPN 7 Server-to-Server Security with TLS 8 Web and Intranet Servers 8 - Common TLS Mistakes 9 Hosted Service Security with TLS 9 Certificate Expiration 9 Certificate Revocation 9 Self-Signed Certificates 10 Certificate Management 10 Conclusions 11 Additional Reading 11 1
3 Introduction As the science of business computing, and of computing security in particular, has advanced, the trend has been to find security weaknesses everywhere. Where complexity and functionality grow, so do the opportunities for abuse of systems by malicious actors. The solutions to these problems are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer. TLS is best-known as the technology which secures web browser sessions for banking and other sensitive tasks, but it can be used for much more. Client-server communication with a variety of server types, in addition to web servers, benefits from use of TLS. Server-to-server communications also need to be secured and can be through TLS. Clients updating applications and other software on their PCs should only do so through a secure connection, which is why such update applications usually use TLS or SSL. This paper will explore these and other applications of TLS which can secure the enterprise in the myriad places in which it can be attacked. This paper will also discuss trusted certificate authorities ( CAs ) and their role in the public key infrastructure or PKI. Though trusted CAs aren t always necessary, in many cases they are beneficial and sometimes necessary for the protection to have any effect. What is TLS/SSL? TLS/SSL is a tunneling protocol that works at the transport layer. It provides encryption, authentication and integrity verification of data, and does so by means of digital certificates. - Digital Certificates A digital certificate is an electronic document which confirms the identity of an entity which could be a user, a server, a company, a program on a client, just about anything and associates that entity with a public key. The digital certificate is the entity s identification to the public key infrastructure. Each party to a TLS-secured communication can evaluate the contents of the certificate. The most examined field is the Common Name. Each then compares it to what they expect. It is also wise to check the issuer of the certificate. Is the issuer a trusted party? For more on these issuers see Trusted Certificate Authorities, page 5. Users can generate their own digital certificates, called self-signed certificates, with free tools 1. But such certificates are inherently untrustworthy and the real value of certificates comes when they are issued by a trusted CA. Users can create and run their own CA on their network and sometimes this makes sense, but in many cases it is necessary to use an outside trusted CA which outside parties can also trust. VeriSign Authentication Business Unit, now a part of Symantec is the largest of these. - Authentication and Verification TLS provides 3 basic benefits: It provides authentication of the communicating parties, either one-way or in both directions It encrypts the communication session on the wire It ensures the integrity of the data transferred Public key cryptography allows two parties to authenticate each other. Each party has two keys, which are large numeric values. A message exchanged between the parties is run through a hashing algorithm. A hash function takes a block of data and creates a value from it, known as a hash or digest. Make even a small change in the data and the hash changes 1 The OpenSSL Project - Microsoft s crypto tools ( are included in the Windows SDK ( 2
4 What is TLS/SSL? (cont d) significantly. At the same time there is no way to recreate the data from the hash. The sending party to the communications uses their private key to encrypt the hash value. This encrypted value is called a digital signature. The message and signature are sent to the recipient party. The recipient party uses the sender s public key to decrypt the signature. They generate a hash of the message using the same algorithm as the sender and compare the values. If the values are the same then two things are certain: the data has not been tampered with and the sender is who they purport to be. This is because the private key corresponding to the public key in the certificate was used to sign the data, and the private key should only be accessible by the sender named in the certificate. Neither authentication nor integrity verification are mandatory in TLS. You can use it simply so that the bits on the wire are encrypted. But authentication is a core feature, important to most customers. Key Security There are some absolute rules which need to be followed in order for the public key infrastructure to work properly. Private keys must be private: The signer of a message needs to keep their private key absolutely confidential. Anyone who has it can effectively impersonate the sender. - Encryption Even when authentication is not used, TLS can use encryption keys and a cipher algorithm to encrypt/decrypt data for communication. The cipher is also used for encrypting the message digest. There are many different cipher algorithms for different circumstances. See the TLS vs. SSL section below for more on ciphers. - Where TLS Works In the Stack TLS/SSL sits between the application and transport layers. In the context of the Internet and most local networking, this means it sits above TCP or Transmission Control Protocol, the protocol which provides reliable, ordered data communications for applications. Applications that would normally work with TCP connections instead work with TLS connections for the purpose of establishing connections. Application TLS Handshake TLS Record TCP (reliable transport) IP Network Interface Wires (infrastructure) TLS requires a reliable transport, which means TCP. This means that UDP-only applications like DNS, SNMP, and VOIP, present a problem. See SSL VPNs for more on this problem. Public keys must be public: Well, not necessarily public, but they have to be accessible to anyone who might have a valid reason to read the message or encrypt a message to the entity named in the certificate. Hash algorithms must not collide: A collision is when the hash algorithm generates the same digest from two different data blocks. At some point this is inevitable, but the ability to generate collisions intentionally compromises all functions of public key cryptography. This is why new and better hash algorithms have been developed over time and put into public use. 3
5 TLS vs. SSL passwords controlled by rules which don t follow best practices. It s no surprise that things are this way; following best practices for passwords is difficult and unpleasant: you have to use passwords that are long and difficult to remember and you need to change them frequently. Even server-to-server connections are often authenticated with passwords which are hard-coded into programs or configuration files. TLS is the successor technology to SSL, which was developed by Netscape in The first public release was SSL version 2, and was quickly followed by version 3. The TLS specification was released in 1999 in RFC , and is only a minor modification of SSL 3. Changes have come at a much slower pace since then, with TLS and largely concerned with security improvements. TLS is still widely called SSL, especially in product names, even if the term is strictly inaccurate. Don t be surprised to see the terms used interchangeably. TLS versions are designed to interact with and roll back to earlier protocols such as SSL 3. In fact, in the protocol handshake, TLS 1.0, 1.1 and 1.2 use the version numbers 3.1, 3.2 and 3.3. One of the main differences you ll see between SSL and TLS versions are the cryptographic features, including the ciphers, hash algorithms and key exchange mechanisms they support. As time and versions advance, support for weaker features is dropped from the protocol and stronger ones added. Administrators on either end of the communication can set policies requiring or prohibiting particular protocols. It s reasonable to claim that the flexibility of TLS with respect to new developments in ciphers and other cryptographic features is one of the main reasons for its success. Networks Are Insecure By Default All of our important networking protocols were designed before security issues were properly appreciated. A great deal of research has gone into making communications secure, but in most cases it has to be added on. By default, our networks are insecure. HTTP, SMTP and FTP were all designed to communicate in clear text. All of them can be enhanced to support encryption and often the solution uses TLS. Only with HTTPS, however, which is HTTP over TLS/SSL, is such security ubiquitous. - Authentication Authentication in most networks is weak, usually relying on - Privacy and Integrity When communications are not secured properly you can t be certain that the data has not been monitored or tampered with in-transit. Attacks known as man in the middle (MITM) attacks, where the attacker sits on the network monitoring communications between one party and another, are not uncommon. Such attacks can, for example, steal usernames and other unsecured data on the connection. When combined with spoofing techniques, the MITM may even modify the data, such as change destination URLs so that you click on a link which directs you to an attack server. - Solutions Many products are now designed better than they were in the past to provide secure configuration out of the box. Microsoft in particular has made significant progress in this regard in 2 Mozilla.org SSL 0.2 PROTOCOL SPECIFICATION - This version was widely known as version 2. 3 RFC The TLS Protocol Version RFC The Transport Layer Security (TLS) Protocol Version RFC The Transport Layer Security (TLS) Protocol Version
6 Networks Are Insecure By Default (cont d) recent years. But at the level of network communications and authentication, security is still the responsibility of the network administrator. In many of these cases TLS can help. It can provide authentication where none exists by default. TLS can provide strong encryption where data would normally flow in clear text. And it can ensure that data was not modified in-transit. Trusted Certificate Authorities If you are using TLS purely for communication over your own networks it may be adequate to use an internal certificate authority and set your systems to trust it. However, the hassle and cost of setting up an internal CA often drives businesses to do otherwise. Also, if data is sent over the Internet, where you don t control all points of transit, the only way all parties can trust the certificate is if it was issued by a trusted third party certificate authority. - Trusted Roots Because it s unwise to rely completely on Internet communications to prove the issuer of a certificate, many software products come with a list of trusted root certificates. These certificates are inherently trusted and other certificates signed by those trusted roots are also trusted. Microsoft Windows includes a list of trusted root certificates which they update periodically through Windows Update and their other updating mechanisms. Many other operating systems have similar lists. Application software may use the operating system trusted root list or include their own. Some web browsers on Windows use the Windows list, but Firefox uses its own list. One more characteristic of certificate trust is that root certificate authorities often have affiliate programs. This allows other companies to sell certificates on behalf of the trusted root CAs. In fact the affiliates can have their own affiliates. The parent CA signs the affiliate CA s certificate so software can prove that they are a valid affiliate. The TLS client software walks up this hierarchy of CAs, checking the validity of the signatures at each step, until they reach one which is a trusted root. This establishes the trust of the whole hierarchy. - Self-Signed Certificates Digital certificates need not be signed by a trusted CA. Such certificates, when generated by tools separately, are called self-signed certificates. Such certificates can be used to provide encryption of data, but no authentication. See the section on self-signed certificates for more on this subject. - Authentication Does Not Prove Trust There are many unfortunate cases of users and organizations being attacked successfully for trusting a communication simply because it was signed. But a signature, even one issued by a certificate authority, is not proof that the party is trustworthy. Authentication gives you definitive information as to the identity of the other party which you can use to make an informed trust decision. You can look at the identifying fields in the certificate, such as the Common Name, to see if it matches the entity you expected. You can also look at the Issuer field, which identifies the certificate authority which issued the certificate, and make decisions as to its trustworthiness. As we will see below, different certificates have different amounts of information on them about the identified entity and about the issuer. Extended Validation (EV) SSL The workings of digital certificates themselves have been wellestablished for many years, but the rules for their issuance by trusted CAs has not. The standards of many CAs for issuing certificates reached such a point several years ago that many CAs and vendors of TLS software formed the CA/Browser 5
7 Extended Validation (EV) SSL (cont d) Forum ( to establish standards. The resulting standard is EV SSL, where EV stands for Extended Validation. Users generally know EV SSL as the thing that turns their web browser bar green. More fundamentally it is a new class of TLS certificate issued when the applicant meets certain strict standards for proving its identity established by the CA/Browser Forum. There are also differences in the way browsers behave when interacting with EV SSL certificates, particularly the green browser bar indicator and a clear display of the organization name. The rules for the entities are rather strict: they must be a legallyrecognized entity, either incorporated or a governmental body or some registered non-profit. You cannot get a personal EV SSL certificate. The CA has to verify the legal existence as well as the physical existence and operational existence of the applying entity. The CA must confirm that the entity has the right to use the domain and that the person applying is authorized to do so. 6 other less-standardized approaches.) Outlook to Exchange Outlook to Exchange over RPC over TLS is becoming popular as a secure external access method, but there are reasons to use it internally as well. In this case you replace the default self-signed certificate in the Exchange server with a real TLS certificate from a trusted certificate authority. This is standard operating procedure now with Exchange hosting services. Windows Update Before Windows Vista, Windows Update was simply a web site in Internet Explorer which used HTTPS. In more recent versions of Windows it is a custom app secured by TLS. Many other online software update programs, such as the getplus program used by Adobe, use TLS connections for security. Client Security with TLS/SSL Client side certificates can be used with TLS to prove the identity of the client to the server, and vice-versa. This is called two-way TLS and requires the client and server both provide certificates to each other. The end result of these standards is that it would be extremely difficult, and likely expensive, to obtain a false EV SSL certificate. As a result of all the work needed to meet the standards, EV SSL certificates are much more expensive than conventional TLS certificates. There are standards-based systems for administering TLS in this role. Active Directory in Windows manages them 8 and uses certificates stored either in the client or using smart cards or other strong authentication devices. 9 OpenLDAP is an open source directory service which accomplishes much the same. 10 Not Just For Web Browsers TLS and SSL are best-known for securing web browser communications, but they are by no means limited to HTTP. Many other applications and protocols use TLS for security, generally as an option. Some examples follow: FTPS A secure version of the ubiquitous file transfer protocol secured with TLS. Conventional FTP transmissions are in clear text. FTPS has been an official RFC since and an unofficial one for 10 years before that. It has widespread support in FTP software. (Not to be confused In spite of the greatly improved security from using strong authentication mechanisms like TLS certificates, it has not been a typical configuration. In exchange for the security you get a fair amount of complexity and administrative work, plus clients can only log in when they have their client certificate. But recent versions of Windows Server have made it much easier to have certificate and other credential data independent of the user profile, allowing users to move to different computers and still authenticate. Still, this is a higher-cost setup than the use of passwords and most organizations would consider it only for high-value or vulnerable connections. with SFTP, which is FTP through an SSH session, or many 6 CA/Browser Forum EV SSL Certificate Guidelines RFC Active Directory Certificate Services Smart card and other certificate authentication OpenLDAP, Using TLS -
8 Client Security with TLS/SSL (cont d) The default for the LDAP protocol itself is unencrypted by default. Under LDAP version 2 it was common to use a nonstandard setup called LDAPS which tunneled LDAP through a TLS tunnel on port LDAP version 3 added a standard extension for TLS Wireless A secure wireless network requires stronger authentication than the shared secret password used on your home router. Through the WPA and WPA2 security standards, all wireless networks support Extensible Authentication Protocol (EAP), a framework for authentication methods for access to the network. Dozens of such methods have been implemented SSL VPN Virtual private networking is a must for secure communications over the Internet. There are two popular methods: IPSec and SSL VPN. IPSec 15 is an end-to-end protocol for authenticating each packet in a TCP/IP network. It operates at the Internet layer of the network, i.e. below the transport layer. This is significant for its application. SSL VPNs create a tunnel above the transport layer. All application network communications goes through the tunnel. IPSec is a widely-implemented and deployed Internet standard. SSL VPN is not a standard as such, but widely implemented and deployed. The main point of EAP in a wireless access point or router is to allow it to hook into an enterprise authentication system such as your LAN or WAN. In this scenario, you should demand the highest level of authentication on the access point itself and very high levels from clients connecting to it. TLS is a good choice. EAP-TLS 14 is one of the methods widely, if not universally, supported in the wireless industry and one of the strongest, if carefully implemented. It uses normal PKI methods to secure connections to a RADIUS server. EAP-TLS is supported out of the box in all major operating systems, including the open source ones. The main difficulty with EAP-TLS is that clients need to have individual certificates, and they need careful management. In this sense it is the same as client certificates on the LAN: a straight trade-off of security for ease of administration. Several other EAP methods use TLS in different ways, generally in order to avoid the need for client-side certificates and the administrative burden. They necessarily trade off security for this ease of administration, as credentials can be lost relatively Because IPSec operates at one of the lower levels of the Internet protocol stack, it can transport almost anything you need and with minimal overhead. SSL VPNs operate above the transport layer and require a reliable transport; this means that applications which use UDP for transport cannot be supported in a straightforward way through an SSL VPN. Either they have to run outside the tunnel or the UDP packets have to be reencapsulated in TCP before transport. Whether encapsulation of UDP is a problem for the application depends on a number of factors: The quality of the SSL implementation, the speed of the connection and perhaps most importantly the tolerance of the application for lossy transport. Applications which use UDP do so for performance reasons, but need to expect some level of packet loss, if only because UDP doesn t guarantee delivery. The most important UDP application is probably VOIP, and some implementations tolerate encapsulation fairly well. Other real-time UDP applications, such as streaming video and some multi-player games don t fare as well. Some VPN/firewall products support both TLS and IPSec for users who need both. 16 easily and their loss may be difficult to detect. 11 Microsoft Knowledge Base, How to enable LDAP over SSL with a third-party certification authority RFC 2830, Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security Wikipedia, Extensible Application Protocol The EAP-TLS Authentication Protocol An Illustrated Guide to IPsec Thanks to Gary Tomlinson and John Gmuender of Sonicwall ( for their help in understanding the problem of UDP on SSL VPNs.
9 Client Security with TLS/SSL (cont d) So why not just use IPSec for all VPNs? Because they are comparatively difficult to administer and use. When you re setting up individual users or small groups remotely, an SSL VPN will be much easier to support, especially if the application needs are simple. Site-to-site VPNs, where whole networks are connected over the Internet, need the power and flexibility of IPSec. Many application-focused remote access methods are TLS-based, and some are SSL VPNs repackaged as remote access for the product. The Citrix Secure Gateway is such a product. 17 Server-to-Server Security with TLS Many server-to-server connections offer TLS as an option and it s an excellent one, especially when the connection is run over the public Internet. A full VPN in such cases is inadvisable, as the application needs are narrow and certificates can be used to provide strong authentication of the servers to each other. When interacting across the Internet, certificates from a trusted certificate authority are highly recommended. Each party should make as few assumptions about the security of the other as possible. Beyond that, there are good reasons in such cases for using EV SSL certificates. Research has shown that weaknesses in the certificate authority validation procedures for many conventional SSL certificates leave them vulnerable to man-in-the-middle attacks. 18 Briefly, the problem comes with the very inexpensive domainvalidated certificates. These certificates validate a domain name, not an organization, and the domain name is the only identifying data in the certificate. Part of the reason they are so inexpensive is that the application and validation procedures are completely automated in many cases. A confirmation request is sent in to the administrative contact for the domain. Whoever controls that account can authorize the certificate. Combined with software vulnerabilities in some TLS software, this process can be abused to allow spoofing of a domain certificate and perhaps a man-in-the-middle attack. The advantage of EV SSL in this case is that the EV SSL specification guarantees that an organization name and other data will be in the certificate and will be verified by the CA. For a high-value connection it s worth having this assurance. EV SSL support in such cases may require custom programming. Web and Intranet Servers Perhaps it s too obvious to point out, but TLS can be used to secure a browser-web server connection. It is worth thinking about the extent of your TLS usage for both internal and Connections such as these are almost always high-value. Consider web servers talking to database servers or mail servers synchronizing with each other. The data in the connection is a treasure trove for an attacker. Products such as Microsoft s Exchange Server and Oracle Application Server support TLS with certificates out of the box. external sites. HTTP is a profoundly insecure protocol without TLS. It is plain-text, easily sniffable, and easily manipulated. Even on an internal network you should use TLS/HTTPS for all sufficiently valuable business connections Spoofing Server-Server Communication: How You Can Prevent It - 8
10 Web and Intranet Servers (cont d) - Common TLS Mistakes Don t make the mistake of assuming that a TLS implementation secures your web site and that s it. There are many common site design mistakes which defeat the security of TLS. Keep sensitive data out of URLs When you use HTTP GET methods with parameters that have critical data in them you expose that data to the whole world. Envision a URL like this one: There are many reasons why this is a bad idea. But first, the TLS connection will encrypt the URL, so at least users sniffing the network won t see the URL and the parameters. On the other hand, the URL will be stored in the web server log, in the client browser history, and in referrer headers. This last point means that if there is a link, particularly a non-tls link, out of the page linked to just above, the full URL will be included in the headers sent to that server. Use Secure Cookie Flag - The secure flag will tell the server to send cookies only over a TLS connection. There are numerous attacks to hijack cookies, and cookies often contain the most sensitive of data. Cookies can be stolen through simple packet sniffing, session hijacking, cross-site scripting, or crosssite request forgery. It s still not uncommon to find significant web sites that use insecure cookies in HTTPS sessions. Do Not Mix TLS/SSL and Non-TLS/SSL Content - Just because your page has an HTTPS link doesn t mean all the content will. If there s a frame or an image or some other element that is called with an HTTP link, it will not be TLS-protected. Most browsers won t warn users about the inconsistency. Do Not Perform Redirects from Non-TLS/SSL Page to TLS/ SSL Login Page - Even today there are major banks which use http on their login pages and redirect to https from there. This is an invitation for phishing pages and other sorts of abuse. Unfortunately, users usually get to https pages from http pages, but the better way would be from a browser bookmark known to be secure or to enter the URL manually. Hosted Service Security with TLS Outsourced services through the web are increasingly popular for good reason. Web-based services can work at least as well and save on staff, infrastructure and capital costs. Any respectable service offered in this way will use a protected connection, probably TLS. A common reason why companies move to outsourced servers, mostly Microsoft Exchange, is to get easier support for mobile devices like Blackberries. It s important, if this is one of your needs, to buy TLS certificates that are natively supported by ActiveSync or whatever service you will be using for your devices. Hosting services report that getting TLS connections working properly is typically the biggest ramp-up problem they have. Certificate Expiration Digital Certificates come with an expiration date, and for good reason. By issuing a certificate the CA is vouching for the applicant, and it s possible for such information to get stale. Even with internal certificates there s reason to have and check expiration dates. In fact it s more reasonable for internal certificates to have short expiration dates, since it s easier to distribute them, and the issuing authority in IT is probably the same group who administer the certificates in the user directory. Some argue that expired certificates are just as trustworthy, or almost as trustworthy, as a live one. But an expired certificate is, at the very least, a sign of administrators who don t pay close attention to their servers. Certificate Revocation Revocation is an essential feature of the public key infrastructure, one which can t be taken too seriously. For a number of reasons a certificate authority may revoke the certificate of a customer. It could be for violating the terms of service, for instance by serving malware from the site, or it could be because the customer informed the CA that the private key had been compromised. When a certificate is revoked you have to assume that the holder is not trustworthy; it s a lot worse than a site not having a certificate at all. 9
11 How do you check? You don t usually check it yourself. Your TLS software (usually a browser) does it by one of two methods: CRL, which stands for certificate revocation lists, is the old method. The certificate itself may contain the address of a revocation list for the CA, and this list is basically a list of certificate serial numbers. If the certificate you are checking is in the list then it s revoked. Don t trust it. Users browsing the site (in Internet Explorer) will see a message like this: ensure its integrity in transit, but it provides no authentication. You can t make any assumptions about the other party. Note that self-signed certificates are not the same as creating an internal certificate authority. A company can create their own CA, put the name/address of that CA in the browser or system s list of trusted root CAs and then it becomes as trusted as any from a real CA company. Self-signed certificates are not vouched for by anyone. CRLs are simple, but there s a problem with them: over time they can get big, especially for a large CA. They can be cached, but then the CRL check may be out of date. So a protocol named OCSP (online certificate status protocol) was developed to let programs check certificates one at a time. OCSP is the preferred method now. Not all CAs support OCSP. As with CRL, the certificate will contain a field with the address of the OCSP server if the CA supports OCSP. Self-Signed Certificates It s not uncommon to find self-signed certificates both on the Internet and internally in corporations. These are certificates which have not been issued by a certificate authority, either internal or external, but generated statically by any of a number of available free tools. Anyone can make them and their expiration date may be set decades in the future, so they may seem like a good deal. But, as with most things, you get what you pay for with digital certificates. Self-signed certificates don t prove a lot about the site they re protecting. A self-signed certificate will allow software to encrypt data and The vendors of all the major web browsers know that selfsigned certificates are trouble and they issue dire-looking warnings when one is encountered. Certificate Management Managing large numbers of certificates in different roles can be a difficult task, and if it s not done in an organized fashion it s an invitation to trouble. Without a system for certificate management you are likely to find individuals tracking certificates on their own using a spreadsheet or text file. This is how companies get surprised by expiring certificates, and if the employee managing the certificates leaves, the records could end up lost. Good certificate authorities have online management tools for their certificates, such as VeriSign Managed PKI for SSL. There are also third party management packages which track both externally-granted certificates and those from internal CAs. 10
12 Conclusions TLS, widely known as SSL, is the standard for secure application network communications both within the enterprise and across the Internet. TLS can help secure your applications by strengthening authentication, encrypting data communications, and ensuring integrity of data in transit. TLS is a flexible technology that adapts well to numerous situations from web server access to server-server communications to virtual private networking. Industry has picked up on this and implemented it widely. It s not always plug and play, but it s ubiquitous enough that expertise is fairly common. Finally, in many cases the capabilities of TLS are enhanced by certificates from a trusted certificate authority and in some, a trusted CA is necessary for TLS/SSL to make sense. Additional Reading Oppliger, Rolf. SSL and TLS: Theory and Practice (Information Security and Privacy (2009). Artech House Publishers, ISBN Rescorla, Eric SSL and TLS: Designing and Building Secure Systems (2000). Addison-Wesley Professional. ISBN VeriSign SSL Resources - Mozilla Developer Center - Introduction to Public-Key Cryptography - _Cryptography The IETF TLS Working Group - wg/tls/charter/ Microsoft - How to Set Up SSL on IIS7 - page.aspx/144/how-to-set-up-ssl-on-iis-7/ Microsoft - SSL Capacity Planning - TLS and SSL What s the Difference? - blog/ssl-versus-tls-whats-the-difference.html Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners. 11
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper
Sponsored by IT and Business Professionals Say Website Attacks are Persistent and Varied EXECUTIVE BRIEF In this Paper Thirty percent of IT and business professionals say their organization was attacked
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Wildcard and SAN: Understanding multi-use SSL Certificates
WHITE PAPER: WILDCARD AND SAN: UNDERSTANDING MULTI-USE SSL CERTIFICATES White paper Wildcard and SAN: Understanding multi-use SSL Certificates Leveraging multi-use digital certificates to simplify certificate
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
Secure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
Wildcard and SAN: Understanding Multi-Use SSL Certificates
Wildcard and SAN: Understanding Multi-Use SSL Certificates LEVERAGING MULTI-USE DIGITAL CERTIFICATES TO SIMPLIFY CERTIFICATE MANAGEMENT AND REDUCE COSTS Wildcard and SAN: Understanding Multi-Use SSL Certificates
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Security and Trust: The Backbone of Doing Business Over the Internet
WHITE PAPER: SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET White Paper Security and Trust: The Backbone of Doing Business Over the Internet Security and Trust: The Backbone of Doing
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Securing Microsoft Exchange 2010 with Symantec SSL Certificates
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH SYMANTEC SSL CERTIFICATES Symantec Business Guide Securing Microsoft Exchange 2010 with Symantec SSL Certificates Best Practices for Securing Your
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Sophos UTM. Remote Access via IPsec. Configuring UTM and Client
Sophos UTM Remote Access via IPsec Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Implementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
An Overview of the Secure Sockets Layer (SSL)
Chapter 9: SSL and Certificate Services Page 1 of 9 Chapter 9: SSL and Certificate Services The most widespread concern with the Internet is not the limited amount of bandwidth or the occasional objectionable
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Chapter 2 Editor s Note:
[Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]
Securing Microsoft Exchange 2010 With VeriSign Authentication Services
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for
Securing Microsoft Exchange 2010 WITH THAWTE SSL CERTIFICATES
Securing Microsoft Exchange 2010 WITH THAWTE SSL CERTIFICATES Strong SSL = Secure Communications There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
SSL: A False Sense of Security? How the Tenable Solution Restores SSL Effectiveness and Mitigates Related Threats
SSL: A False Sense of Security? How the Tenable Solution Restores SSL Effectiveness and Mitigates Related Threats White Paper Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems
By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.
The way the world does business is changing, and corporate security must change accordingly. For instance, e-mail now carries not only memos and notes, but also contracts and sensitive financial information.
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
