Chapter 17: WEB COMPONENTS

Slides:



Advertisements
Similar presentations
Overview Environment for Internet database connectivity
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Cryptography and Network Security Chapter 16
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Internet Security Protocols
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
DT228/3 Web Development WWW and Client server model.
Lesson 17-Web Components. Background  The World Wide Web was invented in 1990 by Tim Berners- Lee to give physicists a convenient method of exchanging.
Building Applications using ASP.NET and C# / Session 1 / 1 of 21 Session 1.
The Internet Useful Definitions and Concepts About the Internet.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Internet…issues Managing the Internet
Introduction to Web Application Architectures Web Application Architectures 18 th March 2005 Bogdan L. Vrusias
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Active X Microsoft’s Answer to Dynamic Content Reference: Using Active X by Brian Farrar QUE
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
WWW and Internet The Internet Creation of the Web Languages for document description Active web pages.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Quick Tour of the Web Technologies: The BIG picture LECTURE A bird’s eye view of the different web technologies that we shall explore and study.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
INTRODUCTION TO WEB DATABASE PROGRAMMING
IT 210 The Internet & World Wide Web introduction.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
Human-Computer Interface Course 5. ISPs and Internet connection.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Web Components Chapter 17.
Internet-Based Client Access
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Chapter 4: Core Web Technologies
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Network Security Essentials Chapter 5
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
1 Welcome to CSC 301 Web Programming Charles Frank.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Overview Web Session 3 Matakuliah: Web Database Tahun: 2008.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Security fundamentals Topic 8 Securing network applications.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
WEB SERVER SOFTWARE FEATURE SETS
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
The Internet Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. Web Components Chapter 17.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Distributed Control and Measurement via the Internet
World Wide Web policy.
Security+ All-In-One Edition Chapter 15 – Web Components
Presentation transcript:

Chapter 17: WEB COMPONENTS By Chuong Vu

Chapter Contents Current Web Components and Concerns Web protocols SSL/TLS, HTTP/HTTPS, DAP/LDAP, FTP/SFTP Code-Based Vulnerabilities Buffer Overflows, Java/Javascript, ActiveX, Securing the Browser, CGI, Server-Side Scritps, Cookies, Signed Applets, Browser Plug-ins. Application-Base Weaknesses OVAL, Web 2.0

Current Web Components and Concerns Web is not just to browsers, but also to web components that enable services for end users through their browser interfaces. They offers users an easy-to-use, secure method of conducting data transfer over the Internet. They have three main tasks: Securing a server provide a webserver. Securing the data transport between servers and users via web. Securing the user’s computer from attack.

Web Protocols When two computer communicate, several things must happen for the communication to be effective: They must use the same and correctly language that both the parties can understand. Protocols are very important and from basic by which all the separate parts can work together.

Encryption (SSL and TLS) Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.

How SSL/TLS Works? TLS/SSL authenticates and secures data transfers by using certificate-based authentication and symmetric encryption keys. One authentication is established, the channel is secured with symmetric key cryptographic methods and hashes: RC4 or 3DES is use for symmetric key. MD5 or SHA-1 is use for hash functions.

SSL/TLS Attacks Even SSL/TLS is specifically designed to provide protection from man-in-the-middle attacks, it is not completely security solution and can be defeated. A Trojan/Keylogger program can copies keystrokes and echoes them to another TCP/IP address with the intended communication can defeat SSL/TLS.

The Web (HTTP/HTTPS) The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. It is used for transfer hyperlinked data over Internet. Hypertext Transfer Protocol Secure (HTTPS) is used to secure the connection with SSL/TLS.

Directory Service (DAP/LDAP) Directory Access Protocol (DAP) is a computer networking standard promulgated use for accessing an X.500 directory service. The Lightweight Directory Access Protocol (LDAP) is an application protocol describing interaction with directory services. SSL/TLS LDAP LDAP required SSL/TLS to achieve over for connection between client and server.

File Transfer (FTP/SFTP) File Transfer Protocol (FTP) is an application-level protocol that operates over a wide range of lower-level protocols. SSH File Transfer Protocol (SFTP) combines the file transfer application with Secure Shell (SSH) application to provide for a means of confidential FTP operations. Blind FTP (Anonymous FTP) allows unlimited public access to the files and commonly use when you want to have unlimited distribution.

Code-Based Vulnerabilities The ability to connect many machines together to transfer data is what makes the Internet so functional for so many users. Web Browsers have become powerful programming environments that perform many actions behind the scenes for a user. Example: DDOS (botnet)

Buffer Overflows The buffer overflow vulnerability is a product of poorly constructed software programs. When code in the stack-buffer overflows into another application’s process. It can cause applications to crash or execute malicious code.

Java and JavaScript Java is computer language invented by Sun Microsystems. It is a software package installed separately from the browser. JavaScript is a scripting language developed by Netscape. JavaScript is generally built in to the browser.

Different between Java and JavaScript Java and JavaScript are completely different. Java is designed for safety, reducing the opportunity for system crashes. JavaScript is used to control the look, feel and function of web pages displayed inside the browser.

ActiveX ActiveX is a software framework developed by Microsoft. It is a tool for the Windows environment and can be extremely powerful. ActiveX can be used to create complex application then embedded into other container objects such as a web browser.

CGI/Server-Side Script The Common Gateway Interface (CGI) is a standard method for web server software to delegate the generation of web content to executable files. They are usually written in a scripting language. Allows programs to be run outside the web server and to return data to the web server to be served to end users via a web page.

Cookies Cookies are small chunks of ASCII text passed within an HTTP stream to store data temporarily in a Web Browser instance. Cookies can be set for persistent (last for a defined time period) or session (Expire when the session is closed).

Signed Applets/Browser Plug-ins Code signing is the process of digitally signing executable and scripts to bring the security of shrink-wrapped software to software downloaded from the Internet. Browser Plugins are small application programs that increase a browser’s ability to handle new data types and add new functionality. (Example: Adobe PDF, NoScript, etc..)

Application-Based Weaknesses Beside the Web Browser, the application software written to run on servers and serve up the content for users is also abused by crackers. Open Vulnerability and Assessment Language (OVAL) are an XML-based languages that provides a standard for how to check for the presence of vulnerabilities and configuration issues on computer systems.

Web 2.0 Web 2.0 websites allow users to do more than just retrieve information. They provide the users with more user-interface, software and storage facilities, all through their browser.

Questions?