1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, 2006. ICNS '06. Digital Object Identifier 10.1109/ICNS.2006.114.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Enabling Secure Internet Access with ISA Server
Computer networks Fundamentals of Information Technology Session 6.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Chapter 17: WEB COMPONENTS
® Microsoft Office 2010 Browser and Basics.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
CCNA – Network Fundamentals
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
Computer Security and Penetration Testing
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
1 Integrating ISA Server and Exchange Server. 2 How works.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
IT 210 The Internet & World Wide Web introduction.
Computer Concepts 2014 Chapter 7 The Web and .
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
ASP.NET 2.0 Chapter 5 Advanced Web Controls. ASP.NET 2.0, Third Edition2 Objectives.
File-Mate 1500 Design Review II
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Types of Electronic Infection
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
ACM 511 Introduction to Computer Networks. Computer Networks.
Building Rich Web Applications with Ajax Linda Dailey Paulson IEEE – Computer, October 05 (Vol.38, No.10) Presented by Jingming Zhang.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
TimeLedger components developed by ITOS LTD. This project is aimed at small and average-size businesses and covers a whole spectrum of project management.
CertifiedMail …when privacy matters ™. What CertifiedMail empowers you to achieve Secure …simplified. End-to-end secure messaging From any sender.
School of Computing and Information Systems CS 371 Web Application Programming AJAX.
XP Browser and Basics COM111 Introduction to Computer Applications.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
WEB SERVER SOFTWARE FEATURE SETS
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Expense Tracking System Developed by: Ardhita Maharindra Muskan Regmi Nir Gurung Sudeep Karki Tikaprem Gurung Date: December 05 th, 2008.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Chapter 40 Internet Security.
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Understanding the OSI Reference Model
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Amit Kulkarni February 17, 2004
Working at a Small-to-Medium Business or ISP – Chapter 7
ONLINE SECURE DATA SERVICE
Unit 8 Network Security.
Your computer is the client
Presentation transcript:

1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS Speaker: Yan-Shiang Wang Date:

2 Motivation The sender must find a key server where the recipient’s key is stored, confirm with the recipient that it is indeed the recipient’s key. The vast majority of s are unencrypted. The primary barrier to encryption is usability.

3 Motivation (cont.) Even if an unencrypted makes it safely to its destination, it is still vulnerable.  malicious insiders  external attackers  surveillance

4 Flow chart 1. Find the key server 2. Obtain the recipient’s public key 3. Send the encrypted to mail server 4. Recipient asks his 5. Recipient gets his

5 Web-Based Solution Access from any computer in the world connected to the Internet. Without rich, intuitive and responsive interfaces. Web-page must reload the entire page every time the user takes an action.

6 Using AJAX A marketing term used to describe various programming techniques. JavaScript running on a Web browser to request data (from the server) and update the page (based on the response) without requiring a reload of the entire page.

7 Goal Usability  Achieved through offering desktop features Security  Achieved through integrated, transparent encryption

8 Solution The entire session (browse on web page) can be encrypted over SSL. All is encrypted as it arrives at the server using dynamically- generated user-based key pairs. Outbound are encrypted and stored on the MailSaurus server.

9 Flow chart 1. Sender edit his 2. MailSaurus acknowledges recipient’s mail server 3. Recipient asks his 4. Recipient gets his URL 5. Recipient goes to MailSaurus to read his

10 Quick Response Created a buffer which accepts server requests and queues them by FIFO  In order to preserve the order of server calls and prevent multiple actions take place simultaneously  A timeout mechanism guards against frozen processes

11 Screenshot

12 Secure Registered When a user wishes to send a secure registered , MailSaurus encrypts the message and stores it locally. MailSaurus sends the recipient a notification . It is also a convenient method for senders to send large attachment files.

13 Screenshot

14 Conclusion No data stored on client Vastly improving the overall security of the Internet Reducing the opportunities for attackers and intercept

15 Reference Integrated Encryption  Transparent Encryption 