Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Computer Security and Penetration Testing
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Reading Log Files. 2 Segment Format
0 Web Service Security JongSu Bae. 1  Introduction 2. Web Service Security 3. Web Service Security Mechanism 4. Tool Support 5. Q&A  Contents.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 An Overview of Computer Security computer security.
IP Spoofing, CS2651 IP Spoofing Bao Ho ToanTai Vu CS Security Engineering Spring 2003 San Jose State University.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 19 Security.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Web services security I
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
11/16/2012ISC329 Isabelle Bichindaritz1 Web Database Application Development.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University IP security Ge Zhang
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Network Security (the Internet Security)
IT443 – Network Security Administration Instructor: Bo Sheng
Unit 8 Network Security.
Advanced Computer Networks
Presentation transcript:

Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at

Web Security2 Chapter 1 Internet WWW Terms: –vulnerabilities, threats, countermeasures Generic security model –Security policy –Host security –Network security –Organizational security –Legal security

Web Security3 Internet Has seen dramatic growth since 1995 Has evolved from the collegial inter- network for researchers in the 70s and 80s into today’s global Internet for … –Fun –Commercial transactions –Education –… Has seen all types of security breaches …

Web Security4 Internet The Internet has become a popular target to attack (the number of security breaches has in fact escalated more than the growth rate of the Internet) Security problems receive public attention Examples –Internet Worm (e.g., Robert T. Morris, Jr. in 1988) –Password sniffing (1994) –IP spoofing and sequence number guessing (e.g., Kevin Mitnick in 1995) –Session hijacking –(Distributed) denial-of-service attacks (since 1996)

Web Security5 DOS via Syn Flood A: the initiator; B: the destination TCP connection multi-step –A: SYN to initiate –B: SYN+ACK to respond –C: ACK gets agreement Sequence numbers then incremented for future messages –Ensures message order –Retransmit if lost –Verifies party really initiated connection

Web Security6 Internet Protocols

Web Security7 WWW The Web Based on the HTTP protocol An application-level protocol HTTP is a simple request/response protocol Lightness and speed necessary for distributed, collaborative, hypermedia information systems A stateless protocol

Web Security8 HTTP & History of the WWW  [HTTP 1991] The Original HTTP as defined in 1991The Original HTTP as defined in 1991  [HTTP 1992] Basic HTTP as defined in 1992Basic HTTP as defined in 1992  [HTTP 1996] RFC1945: Hypertext Transfer Protocol -- HTTP/1.0. Informational. RFC1945  [HTTP 1999] RFC2616: Hypertext Transfer Protocol -- HTTP/1.1. RFC2616  [irt.org 1998] WWW – How It All Began.WWW – How It All Began  [isoc.org 2000] The Internet Society. A Brief History of the Internet. August 4, 2000.A Brief History of the Internet

Web Security9 HTTP  can be used for many tasks, such as name servers and distributed object management systems, through extension of its request methods  Its data typing feature allows systems to be built independently of the data being transferred.

Web Security10 Current Trends Web services are being designed and deployed on the WWW. –Centered around the XML protocol –Example initiatives: MS.NET Sun ONE (Open Net Environment) –Protocols: WSDL, SOAP, UDDI, …

Web Security11 Web Services

Web Security12 Some terminology Vulnerability –A weakness that can be exploited Threat –A circumstance, condition, or event that may violate a system’s security by possibly exploiting the systems vulnerabilities Control (or Countermeasures) –a feature, function, tool, or mechanism that either reduces a system’s vulnerabilities or counters its threat(s)

Web Security13 Sample Controls Firewalls VPN SSL / TLS S / MIME Kerberos …

Web Security14 The Bigger Picture Security in any system, including Web Security, encompasses many aspects. –Policies –Technical Network security Host security –Non-technical Organizational Legal

Web Security15 Policies High-level statements of what are allowed and what are not allowed Example policy statements –“Any access from the Internet to intranet resources must be strongly authenticated and properly authorized.” –“Any classified data must be properly encrypted for transmission.” Policies are enforced by the overall architectural design and various mechanisms.

Web Security16 Host Security User authentications Access control (to resources) Secure storage of data Secure processing of data Audit trail

Web Security17 Network Security The security of the underlying network is critical to assure the security of networked applications, including Web and other Internet applications. A security breach that occurs at a lower layer (e.g., ICMP) may result in major problem at a higher layer (e.g., DOS attack at the Web server).

Web Security18 Services vs Mechanisms Example security services –Authentication, confidentiality of data, data integrity, access control, non-repudiation, … Example security mechanisms –Passwords for user authentication –Biometrics for user authentication –RSA encryption for data confidentiality –Digital signature for … –Routing control –firewalls –…

Web Security19 Organizational Security Security is also a people problem. In fact, human behavior is still the most important factor with regard to security and safety. Human behavior may be influenced by religion, ethics, education, or organizational security controls. Organizational security controls include directions/instructions that define legitimate human behavior and operational procedures in the organization.

Web Security20 Legal Security As a last resort: to legally prosecute the attacker(s) Need support and evidence provided by the various security services Example: non-repudiation of an e-contract