Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.

Slides:



Advertisements
Similar presentations
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
WEB BROWSER SECURITY By Robert Sellers Brian Bauer.
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
Internet Phishing Not the kind of Fishing you are used to.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
Objectives Moodle is an online learning environment where instructors & their students interact. In this workshop you will learn: 1.Configure system requirements.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
EValid Getting Started. Agenda Introduction to eValid First experience of using eValid Recording and Site Analysis in eValid.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Prevent Cross-Site Scripting (XSS) attack
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 P3P I Week 6 - October.
Web Programming: Client/Server Applications Server sends the web pages to the client. –built into Visual Studio for development purposes Client displays.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Internet Browsing the world. Browse Internet Course contents Overview: Browsing the world Lesson 1: Internet Explorer Lesson 2: Save a link for future.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
P3P & Internet Explorer 6.0 New York – Feb. 4, 2002.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Cross Site Integration “mashups” cross site scripting.
Use of a P3P User Agent by Early Adopters Lorrie Faith Cranor Manjula Arjula Praven Guduru AT&T Labs November 2002.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Protecting Students on the School Computer Network Enfield High School.
Module 5: Configuring Internet Explorer and Supporting Applications.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Visualizing Privacy I March 7, 2006.
World Wide Web policy.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Riding Someone Else’s Wave with CSRF
HACKIN G CITRIX.
Windows Vista Inside Out
Presentation transcript:

Privacy and Security on the Web Part 1

Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review and hopefully send tomorrow. Proposals: I will grade by next Tuesday Proposals: I will grade by next Tuesday

In The Beginning… Man-in-the-middle Man-in-the-middle Sniffing Sniffing SSL solved these SSL solved these Browser SSL indicators Browser SSL indicators –Locks –Keys –Borders –URL bar Question: How would you show users that a secure connection exists?

Now Common Vulnerabilities ActiveX Controls ActiveX Controls Java applets (bypassing of sandbox’s restrictions) Java applets (bypassing of sandbox’s restrictions) Cross-Site Scripting (mainly faults of web sites) Cross-Site Scripting (mainly faults of web sites) Cross-Zone and Cross-Domain Vulnerabilities Cross-Zone and Cross-Domain Vulnerabilities –Prevention of a web site from accessing data in a different domain (or zone) is broken Malicious Scripting, Active Content, and HTML Malicious Scripting, Active Content, and HTML Spoofing (faking various parts of the browser user interface) Spoofing (faking various parts of the browser user interface)

Also Privacy Users give personal information to get something Users give personal information to get something creating accounts, completing real world transactions, etc. creating accounts, completing real world transactions, etc. Cookies (usernames, sessionIDs, etc.) Cookies (usernames, sessionIDs, etc.) (which of course leads to phishing) (which of course leads to phishing) Just part of visiting a site Just part of visiting a site Tracking cookies Tracking cookies Web bugs Web bugs Traffic logs Traffic logs

So what do users do? Privacy practices paper results: Privacy practices paper results: –Users actions and stated preferences don’t always agree –Users do not understand current technologies relating to privacy –Judge “trustworthiness” on a variety of factors –Do not read privacy policies, but do use their presence to judge trust Implications?

Privacy policies How to make one: How to make one: – – Examples: – – ?ie=UTF8&nodeId=468496http:// ?ie=UTF8&nodeId=468496

What’s wrong with them? Accessibility? Accessibility? Readability? Readability? –Number of notices contain complex language requiring college-level knowledge Length (time) Length (time) Content Content See Jensen and Potts. Privacy policies as decision-making tools: an evaluation of online privacy notices. CHI 2004.

Proposed solution: P3P What is P3P? What is P3P? What do you think of P3P? What do you think of P3P? What happened to P3P? What happened to P3P? Creating P3P policies: Creating P3P policies: –

P3P and P3P user agents What: machine readable privacy policy in XML format. What: machine readable privacy policy in XML format. How does it work? How does it work? –website encode their privacy policies in P3P format –User agents read the policy and parse it out Benefit: Offers an easy way for web sites to communicate about their privacy policies in a standard machine-readable format Benefit: Offers an easy way for web sites to communicate about their privacy policies in a standard machine-readable format Privacy is visualized in the following ways: Privacy is visualized in the following ways: –Summarize privacy policies –Compare policies with user preferences –Alert and advise users

Privacy Bird: demo Opinions on Privacy Bird? Opinions on Privacy Bird?

Web Bugs and Traffic Logs Loading of remote image that doesn’t impact visual layout of page Loading of remote image that doesn’t impact visual layout of page Set 3 rd party cookie Set 3 rd party cookie Remote server can log event of image load even if cookie is rejected Remote server can log event of image load even if cookie is rejected However, there are lots of cases where we want our browsers to load images and display them to us However, there are lots of cases where we want our browsers to load images and display them to us Can be difficult to tell when this action is beneficial and when it isn’t Can be difficult to tell when this action is beneficial and when it isn’t

Bugnosis: A demo Thoughts? Thoughts?

P3P in IE6 Privacy icon on status bar indicates that a cookie has been blocked – pop-up appears the first time the privacy icon appears Automatic processing of compact policies only; third-party cookies without compact policies blocked by default

Users can click on privacy icon for list of cookies; privacy summaries are available at sites that are P3P-enabled

Privacy summary report is generated automatically from full P3P policy

What other tools are out there? Anti-spyware Anti-spyware Cookie managers Cookie managers Anonymizers Anonymizers Password managers and protectors Password managers and protectors Anti-phishing toolbars Anti-phishing toolbars Encryption tools Encryption tools Disk wiping utilities Disk wiping utilities What do you use? What do you use? What do you do manually to protect yourself? What do you do manually to protect yourself?

Research question What privacy issues should people be aware of on the Internet? What privacy issues should people be aware of on the Internet? How do we build tools to make people aware of these? How do we build tools to make people aware of these?

Next week More Security/Privacy and the Internet More Security/Privacy and the Internet Heuristic eval of Firefox extensions Heuristic eval of Firefox extensions Test prep Test prep Exam: 2 weeks from today Exam: 2 weeks from today