TIP Remember, your sense of conviction and your involvement with the content of the presentation are critical to its success.

Slides:



Advertisements
Similar presentations
AUTOMATING FREE & REDUCED MEAL APPLICATION PROCESSING Online Submission Presented To Muscogee County GA. SD Image One – X208
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Principles of Information Security, 2nd edition1 Cryptography.
Basics Dayton Metro Library Place photo here August 10, 2015.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Using Personal Certificates Jeff D’Angelo Jeremy Hill Network of People, Jan 6, 2005.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Website Design and Construction Services and Standards.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
© CAcert, 2008 Teus/HCC-Venlo 8 Jan slides minus 1 to go TIP Remember, your sense of conviction and your involvement with the content of the presentation.
CAcert, a Security Community. The Problem Back in 2001: Sydney had WLAN network access everywhere (Sydney Wireless) People were running their own mailservers.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
© CAcert, 2009 Ulrich Schroeter, Assurer Training Events, April 2009 What is the CCA?
Client Certs -- the old-new thing CAcert The Community CA cacert.org.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Amazon Web Services (aws)
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Virtual Private Network (VPN)
State Management Cookies, Sessions SoftUni Team State Management
CAcert A Communities Way To Professionalism
Chapter 3 E-business Infrastructure
Some bits on how it works
Client Certs -- the old-new thing
Public Key Infrastructure (PKI)
BY GAWARE S.R. DEPT.OF COMP.SCI
Security.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
12 E-Commerce Overview.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Message Digest Cryptographic checksum One-way function Relevance
Pooja programmer,cse department
Goals Introduce the Windows Server 2003 family of operating systems
الفصل الثالث عشر الانترنت والاتصالات
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
IS 4506 Server Configuration (HTTP Server)
The Internet and Electronic Mail
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Dashboard eHealth services: actual mockup
Security.
Internet.
Network Security 4/21/2019 Raj Rajarajan.
Unit 8 Network Security.
Advanced Computer Networks
Electronic Payment Security Technologies
Computer Networks Protocols
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Presentation transcript:

TIP Remember, your sense of conviction and your involvement with the content of the presentation are critical to its success.

What is CAcert about? content trust X.509 digital certificates CAcert community CAcert services the HowTo why should I? me too!

On the internet everybody is a dog

trust is not identification! who are they? trust worthy? use digital signatures for identification Web of Trust GPG X.509 certificates

Identification (the email from Nigeria)‏ verify email sender receiver MTA client MTA server forging

Your passport is it you? BBC 1 Panorama 1st of December 2006 Shahiba Tulaganova UK journalist: within 5 months on east European markets bought 20 EU passports, 5 other (UK, Dld, F, S, NL, B, Es, PO, G, Cs, Pl, Au, ....)‏ 300-3000 euro each and was able to pass UK border many times with them.

Secure digital content documents images software code stamping

Secure data transfer Secure Socket Layer SSL Secure Hypertext Transfer Protocol https Virtual Private Network VPN

Certificates are official Pres. Clinton signed S 761 - The Millenium Digital Commerce Act June 30,2000. http://www.techlawjournal.com/cong106/digsig/Default.htm

What is a digital certificate?

How does a cert look like? mcvax.theunis.org.pem mcvax.theunis.org.key mcvax.theunis.org.csr mcvax.theunis.org.crt mcvax.theunis.org.p12

Client certificate how to? use your browser use firefox or use thunderbird edit preferences advanced certificates

CAcert HowTo join/register create a CAcert account

get assured by an Assurer: CAcert HowTo get assured by an Assurer: Individual CAP or as Organisation COAP documents/policies: http://svn.cacert.org/CAcert/ and FAQ http://wiki.cacert.org/wiki

CAcert HowTo create have it signed import Private key Cert Sign Req Public Key: the certificate

Use it to login to sign documents, really? to identify yourself how broken is email address/password pair? better use CAcert cert login! to sign documents, really? to identify yourself to secure data transports

CAcert is community work >10.000 assurers translations into 30 languages > 100.000 certs in use >100 on the help desk: 7 * 24 email support World Wide and CAcert certs are free!

CAcert is currently being audited, to get into committed agreements get in software distributions and browser: mozilla, ... committed agreements for end user and for usage (license)‏ community accepted policies quality assurance: education and control dispute resolution by arbitration committed to the EU privacy directive (EU DPA)‏ CAcert services moved into a high secure location in Nld

CAcert is supported CAcert services run on Oophaga Foundation highly secured servers in Holland sponsored by HCC, NLUUG, NLnet SUN/AMD, Tunix, Cisco, Net Apps and hopefully by you too!

CAcert is you! TIP Remember, your sense of conviction and your involvement with CAcert are critical to its success. Thanks, some materials are used from: Wren Hunt, Jens Paul