Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Cryptography and Network Security
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 22: Internet Security Protocols and.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 22 Internet Security Protocols and Standards
Cryptography and Network Security Chapter 17
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 8 Web Security.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 7 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Arab Academy for Science & Technology and Maritime Transport e Represented By : Ahmed Eldemallawy Ahmed Madani.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
IP Securty 1. Overview 2. Architecture 3. Authentication Header 4. Encapsulating Security Payload 5. Combining security Associations 6. Internet Key Exchange.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Cryptography CSS 329 Lecture 13:SSL.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Security is one of the most widely used and regarded network services
Cryptography and Network Security
NET 536 Network Security Networks and Communication Department
Cryptography and Network Security
Cryptography and Network Security
SSL (Secure Socket Layer)
Network Security 4/21/2019 Raj Rajarajan.
Cryptography and Network Security
Cryptography and Network Security
Presentation transcript:

Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1

Web Security  Web now widely used by business, government, individuals  but Internet & Web are vulnerable  have a variety of threats  integrity  confidentiality  denial of service  authentication  need added security mechanisms 2 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SSL (Secure Socket Layer)  transport layer security service  originally developed by Netscape  version 3 designed with public input  subsequently became Internet standard known as TLS (Transport Layer Security)  uses TCP to provide a reliable end-to- end service  SSL has two layers of protocols 3 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SSL Architecture 4 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SSL Architecture  SSL session  an association between client & server  created by the Handshake Protocol  define a set of cryptographic parameters  may be shared by multiple SSL connections  SSL connection  a transient, peer-to-peer, communications link  associated with 1 SSL session 5 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SSL Record Protocol  confidentiality  using symmetric encryption with a shared secret key defined by Handshake Protocol  IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC  message is compressed before encryption  message integrity  using a MAC with shared secret key  similar to HMAC but with different padding 6 CIT 460 Information Security Dr.Khalid Dr. Mohannad

7

8

TLS (Transport Layer Security)  IETF standard RFC 2246 similar to SSLv3  with minor differences  in record format version number  uses HMAC for MAC  a pseudo-random function expands secrets  has additional alert codes  some changes in supported ciphers  changes in certificate negotiations  changes in use of padding 9 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Secure Electronic Transactions (SET)  open encryption & security specification  to protect Internet credit card transactions  developed in 1996 by Mastercard, Visa etc  not a payment system  rather a set of security protocols & formats  secure communications amongst parties  trust from use of X.509v3 certificates  privacy by restricted info to those who need it 10 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SET Components 11 CIT 460 Information Security Dr.Khalid Dr. Mohannad

SET Transaction 1.customer opens account 2.customer receives a certificate 3.merchants have their own certificates 4.customer places an order 5.merchant is verified 6.order and payment are sent 7.merchant requests payment authorization 8.merchant confirms order 9.merchant provides goods or service 10.merchant requests payment 12 CIT 460 Information Security Dr.Khalid Dr. Mohannad

IPSec general IP Security mechanisms provides:  Data integrity  Authentication  Confidentiality  Key management  Replay protection applicable to use over LANs, across public & private WANs, & for the Internet CIT463 Network Security Dr. Mohannad 13

These services will be used against the risks that will face us in the Internet like:  Denial of service attacks, where the attacker sends a lot of IP packets to the receiver to use the whole network resources.  Spoofing, in which one machine on the network masquerades as another  Sniffing, in which an eavesdropper listens in on a transmission between two other parties  Session hijacking, in which a sophisticated attacker employing both those techniques takes over an established communications session and masquerades as one of the communicating 14 CIT463 Network Security Dr. Mohannad

IPsec can be used in two kinds of modes:  Transport Mode  Tunnel Mode 15 CIT463 Network Security Dr. Mohannad

IPSec Uses CIT463 Network Security Dr. Mohannad 16

Security  is one of the most widely used and regarded network services  currently message contents are not secure  may be inspected either in transit  or by suitably privileged users on destination system 17 CIT463 Network Security Dr. Mohannad

Security Enhancements  confidentiality  protection from disclosure  authentication  of sender of message  message integrity  protection from modification  non-repudiation of origin  protection from denial by sender 18 CIT463 Network Security Dr. Mohannad

Pretty Good Privacy (PGP)  widely used de facto secure  developed by Phil Zimmermann  selected best available crypto algs to use  integrated into a single program  available on Unix, PC, Macintosh and Amiga systems  originally free, now have commercial versions available also 19 CIT463 Network Security Dr. Mohannad

S/MIME (Secure/Multipurpose Internet Mail Extensions)  security enhancement to MIME  original Internet RFC822 was text only  MIME provided support for varying content types and multi-part messages  with encoding of binary data to textual form  S/MIME added security enhancements  have S/MIME support in various modern mail agents: MS Outlook, Netscape etc 20 CIT463 Network Security Dr. Mohannad

S/MIME Functions  enveloped data  encrypted content and associated keys  signed data  encoded message + signed digest  clear-signed data  cleartext message + encoded signed digest  signed & enveloped data  nesting of signed & encrypted entities 21 CIT463 Network Security Dr. Mohannad

S/MIME Cryptographic Algorithms  hash functions: SHA-1 & MD5  digital signatures: DSS & RSA  session key encryption: ElGamal & RSA  message encryption: Triple-DES, RC2/40 and others  have a procedure to decide which algorithms to use 22 CIT463 Network Security Dr. Mohannad

Authentication Applications  will consider authentication functions  developed to support application-level authentication & digital signatures  will consider Kerberos – a private-key authentication service  then X.509 directory authentication service 23 CIT463 Network Security Dr. Mohannad

Kerberos  trusted key server system from MIT  provides centralised private-key third-party authentication in a distributed network  allows users access to services distributed through network  without needing to trust all workstations  rather all trust a central authentication server  two versions in use: 4 & 5 24 CIT463 Network Security Dr. Mohannad

Kerberos Requirements  first published report identified its requirements as:  security  reliability  transparency  scalability  implemented using an authentication protocol based on Needham-Schroeder 25 CIT463 Network Security Dr. Mohannad

Kerberos Kerberos is a computer network authentication protocol, which allows individuals communicating over a non-secure network to prove their identity to one another in a secure mannercomputer network authenticationprotocol 26 CIT463 Network Security Dr. Mohannad

Summary  have considered:  need for web security  SSL/TLS transport layer security protocols  SET secure credit card payment protocols 27 CIT 460 Information Security Dr.Khalid Dr. Mohannad