Trust is a Two-Way Street Ebony Buckley

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
SSLstrip Stepan Shykerynets
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Digital Signatures. Anononymity and the Internet.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Electronic Transaction Security (E-Commerce)
Online Security Tuesday April 8, 2003 Maxence Crossley.
Kerberos Authenticating Over an Insecure Network.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Public Key Encryption An example of how a bank might accomplish encryption.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING AND.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Dynamic Sessions. Assumptions Builds on Browser Binding Sessions –Security related –Limit Assertion validity Central Session Authority –Maintains global.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.

Web Security CS-431.
Setting and Upload Products
Chapter 5 Electronic Commerce | Security Threats - Solution
Web Applications Security Cryptography 1
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Digital Signatures.
Security of Digital Signatures
Security Outline Encryption Algorithms Authentication Protocols
Apache web server Quick overview.
SSL Certificates for Secure Websites
A Wireless LAN Security Protocol
Chapter 5 Electronic Commerce | Security Threats - Solution
Visit for more Learning Resources
How to Check if a site's connection is secure ?
Topic 1: Data, information, knowledge and processing
Cross-Site Request Forgeries: Exploitation and Prevention
Using SSL – Secure Socket Layer
Message Digest Cryptographic checksum One-way function Relevance
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Systems Design Chapter 6.
Digital Certificates and X.509
TLS and DLP Behind the green lock.
Protocol ap1.0: Alice says “I am Alice”
A Private Key System KERBEROS.
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Secure Electronic Transactions (SET)
Kerberos Kerberos Ticket.
Install AD Certificate Services
Transport Layer Security (TLS)
Public-Key, Digital Signatures, Management, Security
Unit 8 Network Security.
Electronic Payment Security Technologies
Integrated Security System
Presentation transcript:

Trust is a Two-Way Street Ebony Buckley Problem Despite many warnings and much advice about determining the validity of a website, users are still duped by even the most unsophisticated spoofing attempts. The traditional one-sided approach where solely the server does authentication is no longer sufficient in the face of growing malicious use of the WWW. It is now vital that both sides are active participants in the authentication process. Impact Spoofing attempts will be harder to pull off because the client’s side is actively involved in the authentication process. Approach Thesis: The site encrypts a message with its private key and then with the user’s public key. The user decrypts the message and then obtains the server’s public key from a trusted key authority to decrypt the message. Implementation: The user’s browser can ensure that this protocol is followed with very little input from the user. A system could be prototyped using browsers that allow plug-ins to be written and a test certificate server.