Server-Gated Cryptography
|
|
|
- Rudolph Stafford
- 10 years ago
- Views:
Transcription
1 Server-Gated Cryptography The illusion of security Get this White Paper Entrust Inc. All Rights Reserved. 1 1
2 Contents The Myth of Server-Gated Cryptography... 3 Who Needs Strong Encryption Anyway?... 3 First Amendment Rights... 5 Striking the Right Balance... 6 More Serious Security Concerns... 7 Eliminate Unnecessary Threats, Avoid Premium SGC Certificates... 8 Entrust & You... 9 Entrust Inc. All Rights Reserved. 2 2
3 The Myth of Server-Gated Cryptography As security vendors compete for market share in the SSL certificate marketplace, some attempt to gain a better foothold by claiming that their expensive Server-Gated Cryptography (SGC) certificates are required for 128-bit security. This just isn't the case. SGC is not required to enable 128-bit security for virtually all browsers deployed today. In fact, supporting browsers that require SGC can introduce serious security vulnerabilities to very common present-day attacks. All users who still require SGC are using extremely outdated versions of Web browsers that have not been updated to address the multitude of security issues that have been identified since they were released; security issues that are far more severe than any weakness in the cryptography. This poses a significant risk to both the user and the site operator. SGC is not required to enable 128-bit security for virtually all browsers deployed today. In order to better understand why SGC was created and how it has come to pose a security threat to site operators, we need to examine the evolution of today s cryptographic regulations. Who Needs Strong Encryption Anyway? The history of server-gated crypto is fascinating. It is the story of America in microcosm; how a handful of individuals who cherished freedom and individual enterprise, driven by the profit motive, stood up to authority and won. There was an era starting roughly in the 1970s and ending abruptly at the turn of the century that cryptographers now call the Crypto Wars. The main combatants were the United States government, led by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI), and a strange alignment of interests. These included civil libertarians, such as Phil Zimmerman; Daniel Bernstein and the Electronic Frontier Foundation; and North American business interests, personified in Jim Bidzos of RSA. The battleground? The rights of U.S. citizens, as well as others around the world, to use effective encryption technology to protect themselves against surveillance by advertising interests, credit bureaus, identity thieves and their own governments. The NSA and FBI convinced the U.S. Department of Commerce to enact regulations that prohibited the export of cryptography with strength greater than 40 bits, unless the decryption key was lodged with an approved escrow agent. Entrust Inc. All Rights Reserved. 3 3
4 Although the national interest prevented them from citing real-life cases, the NSA assured the U.S. Congress that supplying strong cryptographic technology to foreigners without this escrow provision would jeopardize the security of all American citizens. But the First Amendment of the U.S. Constitution guarantees its citizens the right to freedom of speech and freedom of assembly. The civil libertarians argued that this right extends to open discussion of cryptographic techniques, as well as the right to protect their online communications with effective encryption. The business interests argued that strong cryptography was available from overseas sources, so U.S. regulations that outlawed the export of strong cryptography were hindering U.S. business with no compensating benefit to its citizens. Early versions of the Netscape Navigator and Microsoft Internet Explorer Web browsers were equipped with encryption capability that could protect communication of users from unauthorized interception. However, the strength of this safeguard was limited to 40 bits. In the mid '90s, it was becoming clear how the Web was going to revolutionize commerce, and U.S. financial institutions wanted to be part of that revolution. But, cryptographic experts were casting doubt on the adequacy of the algorithm that financial institution always turned to for protecting their communications: the Data Encryption Standard, which has a strength of 56 bits. Louis Freeh, head of the FBI at the time, repeatedly insisted that breaking a single 56-bit key using the computers available at the time would take thousands of years. So, limiting encryption strength for U.S. citizens to 56 bits allowed completely effective protection from state and criminal surveillance. But, in 1997 a computer network comprising thousands of ordinary desktop machines was used to crack a 56-bit DES key, taking just four months to complete the task. And in July 1998, the Electronic Frontier Foundation successfully cracked a DES key in just 56 hours using a special-purpose machine costing about $250,000 to build. Entrust Inc. All Rights Reserved. 4 4
5 First Amendment Rights The war was also being waged on another front. Phil Zimmerman had been fascinated by cryptography since he was a child. In later life he started a personal crusade to develop a freeware program later named Pretty Good Privacy (PGP) that would enable Internet users to strongly encrypt their communications. In 1991, the introduction of Senate Bill 266, also known as the Comprehensive Counter-Terrorism Act, provided the impetus for Zimmerman to finish his project and finally make his program available for download over the Internet. But while PGP 1.0 used a cryptographic algorithm with a large key, Zimmerman had chosen to use an algorithm of his own design. That algorithm proved to be fatally flawed: the privacy it offered was anything but pretty good. In 1992, PGP was updated with an algorithm designed by cryptographic experts and, with help from overseas collaborators, version 2.0 was made available for download from locations outside the U.S. These events served to substantiate the claim by U.S. industry that strong cryptography was available to people around the world and that U.S. companies were operating at a disadvantage. In 1995, Berkley researcher Daniel Bernstein and the EFF filed a complaint against the U.S. Department of State charging that the export laws, as they applied to cryptography, were unconstitutional. Bernstein contended that by preventing him from publishing the details of a cryptographic algorithm that he had invented, the government was denying him his constitutional right to free speech. The case finally exhausted the appeal process in May of 1999, with the Ninth Circuit court finding in Bernstein's favor. Meanwhile, in 1996, the National Research Council had issued the results of its investigation into government policy on cryptography. The experts who wrote the report had benefited from a classified briefing from the NSA. They evidently found the NSA's arguments unconvincing and wrote in favor of a liberalization of export regulations. Entrust Inc. All Rights Reserved. 5 5
6 Striking the Right Balance The 90s was a decade of turmoil in the information security industry, with battle lines shifting constantly, and much uncertainty about the eventual outcome. Finally, at the end of 1999, the administration of U.S. President Bill Clinton acted in a dramatic fashion to restore clarity. It enacted regulatory changes that would more or less lift all restrictions on the free use, including export, of effective cryptography. Shortly afterwards, the browser suppliers removed restrictions on the use of strong encryption. But during this period of uncertainty, software makers had bent over backwards to find a balance between the competing pressures. Starting with Netscape Navigator 4.0 and later updates of Microsoft IE 3, in mid- 1997, browsers delivered a capability called server-gated crypto. Browsers were shipped with the capability of performing 128-bit encryption; a strength that even the most skeptical would agree was adequate for protecting any and all personal information without unduly impacting performance. This capability would only be enabled by a flag in the website s Secure Sockets Layer (SSL) certificate. The right to assert this flag was limited to U.S. certification authorities (CAs) and those authorities were bound to assert that flag only in certificates issued to financial institutions. In this way, users of Navigator 4 and IE 3 could protect their online banking with strong encryption, effectively preventing unscrupulous ISPs from eavesdropping their login credentials and other banking details. All other uses of the Web would be protected to a strength no greater than 40 bits. The NSA and the FBI could live with this compromise. Entrust Inc. All Rights Reserved. 6 6
7 More Serious Security Concerns So, for a short period in the late 90s, browsers released into the marketplace required a special SGC SSL certificate to engage their full cryptographic capability. The remnants of that era remain today: 0.07 percent of users still have browsers that will only step up their security level to 128-bit encryption if enabled by the certificate. The remaining percent use 128-bit encryption with every SSL website they visit. Browsers of that era are riddled with far more serious vulnerabilities than the weakness of their cryptography. And the users of those browsers are plainly not managing the security of their machines. If the machine s patch status is not up to date, it also is unlikely to be running antivirus software and it must certainly be infected with viruses. The strength of the cryptography is a minor consideration by comparison. Machines infected via outdated, unsupported browsers even place other safe users of an organization s online portal at risk to phishing, man-inthe-middle or man-in-the-browser fraud attacks. Botnets, for example, not only generate spam, but also help propagate Trojan horses, worms, keystroke loggers and viruses. Machines infected via outdated, unsupported browsers even place other safe users of an organization s online portal at risk to phishing, man-inthe-middle or manin-the-browser fraud attacks. Consider, for instance, the virus known as the NIMDA worm. CERT, an organization devoted to ensuring that appropriate technology and systems-management practices are used to resist attacks on networked systems, first announced the discovery of the virus in September At the time of the announcement, Microsoft already had issued patches to address the vulnerability exploited by the NIMDA worm. While all versions of IE were affected, only version 5.01 and later were still supported. The worm can infect a machine that visits a malicious site. It infects the victim's machine with multiple copies of itself, deletes files of various types and attempts to infect other machines by spreading itself through . With minor modifications, it can be repurposed to monitor keystrokes, launch man-in-the-middle attacks and other nefarious activities. The NIMDA worm illustrates just one of the many serious vulnerabilities present in browsers that implement SGC. Entrust Inc. All Rights Reserved. 7 7
8 Users of any but the most recent versions of popular browsers are vulnerable to attack. These machines may be part of a botnet and may be unwittingly participating in worm and phishing attacks on other users. Keystrokes may be logged remotely, and while they may be protected from eavesdropping by their ISP, they have left themselves open to far more serious attacks from criminals and repressive governments. Sites that allow users to pass sensitive information bank account identification credentials, for example using browsers of this vintage are doing all of their users a disservice. These organizations should instead educate their customers about the true state of the security of their online transactions and encourage them to upgrade to properly supported and secure products. Eliminate Unnecessary Threats, Avoid Premium SGC Certificates In the end, it s the responsibility of the Web site operator to do what s right for its customers and its own well-being. That s obvious, but what does that mean in a real-world environment? Thankfully, it s pretty simple supporting Web browsers that require premium SGC certificates introduces serious security threats to an organization. It s simply not worth the risk to the more than 99 percent of customers as well as the organization itself to give less than 1 percent of the Internet population the illusion of security. SGC is not required to enable 128-bit security for virtually all browsers deployed today. Extended Validation (EV) SSL certificates alone are superior to SGC certificates; or even a combination of EV with SGC certificates. Why? EV SSL certificates require the end-user to use a browser protected by at least 128-bit encryption for SSL security. This requirement ensures the consumer is using a relatively up-to-date browser (eliminating the need for SGC), and making the user s Internet session as well as the organization using the EV SSL certificate more secure. Entrust Inc. All Rights Reserved. 8 8
9 Entrust & You More than ever, Entrust understands your organization s security pain points. Whether it s the protection of information, securing online customers, regulatory compliance or large-scale government projects, Entrust provides identity-based security solutions that are not only proven in real-world environments, but cost-effective in today s uncertain economic climate. Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust s awardwinning software authentication platforms manage today s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eid initiatives, certificate management and SSL. For more information about Entrust products and services, call , [email protected] or visit entrust.com/ev. Company Facts Website: Employees: 359 Customers: 5,000 Offices: 10 Globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, Texas Sales North America: EMEA: +44 (0) [email protected] 23568/8-12 Entrust Inc. All Rights Reserved. 9 9
Private-Key Duplication
Private-Key Duplication The safe use of wildcard and multi-server certificates Get this White Paper Entrust Inc. All Rights Reserved. Entrust Inc. All Rights Reserved. 1 1 Contents Background... 3 Multi-Server
A Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates
Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates 2008 Copyright Godaddy. All rights Reserved Page 1 Contents 1. Where We Are Now...3 2. How SSL Certificates
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
E-BUSINESS THREATS AND SOLUTIONS
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Strong Identity Authentication for First Responders
Strong Identity Authentication for First Responders Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards Entrust Inc. All
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Security and Trust: The Backbone of Doing Business Over the Internet
WHITE PAPER: SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET White Paper Security and Trust: The Backbone of Doing Business Over the Internet Security and Trust: The Backbone of Doing
Cybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
This guide will go through the common ways that a user can make their computer more secure.
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
CHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
MUNICIPAL WIRELESS NETWORK
MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Security Features of SellerDeck Web Sites
Security Features of SellerDeck Web Sites Introduction This paper describes the security techniques used by SellerDeck and the possible attacks that might be made. It compares SellerDeck products with
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Corporate Account Take Over (CATO) Guide
Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
WHY YOU NEED AN SSL CERTIFICATE
Go Daddy Technical Brief ecommerce Security WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
