Security & Privacy on the WWW Briefing for CS3172.

Slides:



Advertisements
Similar presentations
CP3397 ECommerce.
Advertisements

Cryptography and Network Security
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
Security and Authentication Daniel L. Silver, Ph.D. Acadia & Dalhousie Univs.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Web server security Dr Jim Briggs WEBP security1.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Web Server Administration Chapter 10 Securing the Web Environment.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security & Privacy on the WWW Briefing for CS4173.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Chapter 21 Distributed System Security Copyright © 2008.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Public Key Encryption.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
The Secure Sockets Layer (SSL) Protocol
Secure Sockets Layer (SSL)
Security and Authentication
Presentation transcript:

Security & Privacy on the WWW Briefing for CS3172

Topic Outline 1.Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security Firewalls, and Encryption Secure Socket Layer (SSL) & HTTPS 2.Privacy Definition Reasons for concern Rôles Web Techniques: P3P

Information Security ‘[The] protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.’ – Alliance for Telecommunications Industry Solutions (ATIS) Network Performance, Reliability, and Quality of Service Subcommittee

Security Issues in a Nutshell Based on a diagram by Kurose & Ross secure sender secure receiver network channel data & control messages data AB T

What can ‘the intruder’ do?   eavesdrop: intercept messages  insert messages into connection  impersonate: can fake (spoof) source address in packet (or any field in packet)  hijack: ‘take over’ ongoing connection by removing sender or receiver, inserting himself in place  denial of service: prevent service from being used by others (e.g., by overloading resources) secure sender secure receiverAB T

Where Can Security Be Breached? Where Can Security ‘Leak’?   Client Channel  Server 

Where Can Security Be Breached? Where Can Security ‘Leak’?  Client Channel Server Software Network

Where Can Security Be Breached? Where Can Security ‘Leak’?  Client Channel Server  Software  Network 

Where Security. Can Be Breached

Where Security Can Be Breached  Client Channel Server  Software  Network   User

Network Transmission Local Software  In The Network  Human  User Agent Client Server Web server Users Client-sideServer-side

Where Security Can Be Breached  Client Channel Server  Software  Network   User

 User/password – shoulder surfing  Trojan horses  Password breaking (various strategies)  Denial of service attacks – flood the server with requests  Packet sniffing on net (wire tap, wireless recon.)  Spoofing websites  Dumpster diving – garbage search How many categories/classes of security invasions/breaches can students find? (#1)

How many categories/classes of security invasions/breaches can students find? (#2)  Hacking user IDs and passwords  Denial of service/access  Physical invasion of a data centre  Social Engineering – exploit human good nature to get info you should not have  Internet Packet Sniffing  Taking advantage of known frailties in systems  Domain Hijacking – impersonating another legitimate domain  Buffer Overflows  Viruses  Attacks by employees

Components of Security Diagram by Konstantin Beznosov

Important Concepts (1 of 2)  Confidentiality: only sender, intended receiver should “understand” message contents  sender encrypts message  receiver decrypts message Authentication: sender and receiver want to confirm identity of each other Trust: sender and receiver must have confidence in system and its maintainers

Important Concepts (2 of 2)  Message Integrity / Data Protection: sender and receiver want to ensure message not altered (in transit, or afterwards) at least without detection Access and Availability: services must be available to users (through the system) and users must be able to use the system Access Control / Authorization: only specific people (or agents) can use the system

Technologies & Techniques

IT Security Basics  Avoidance – preventing a security breach  Using a firewall system to frontend your intranet (or LAN) to the Internet  Minimization – early warning signals and action plans so as to reduce exposure  Attempted to access secure directories  Recovery - regular backups should be made and recovery periodically tested

IT Security Basics  Software, particularly low layer components such as the operating system and DBMS, should be kept to recent patch levels  Access from dial-in lines should be limited and if possible call-back systems can be used

IT Security Basics  Passwords (and potentially User Ids) should be forced to change periodically  Passwords should be difficult to guess  Try to create passwords such as: To Be or Not To Be  2bon2b  Databases should be secured in terms of access rights to data (usually by individual or group)

Physical Security  Large mainframe systems have always had adequate physical security  The transition from LAN to WAN to Internet has caused new interest in these methods  Physical security means locked doors and security personnel  Options are to host on a secure ISP/ASP (InternetHosting.com)InternetHosting.com

Using a Firewall  A firewall server or router acts as an electronic security cop  No machine other than firewall is directly accessible from Internet  May also function as a “proxy” server allowing intranet systems to access only portions of the Internet  Internet security methods are focused at the firewall reducing cost and admin overhead

Firewall Browser Client 1 Server A HTTP TCP/IP HTTP Server App. Server Fire Wall Server Server C Server B

Cryptography  Cryptography or ciphering is an ancient method of encoding a message — only a receiver with a key can decipher the content  A single (symmetric) secret key is used to encrypt and decrypt  Requires the communication of the key between sender and receiver!  Basis of nuclear war-head command and control security

Public Key Cryptography  In 1976 Diffie & Hellman at Stanford U. developed public-key cryptography  Asymmetric:  Private key – kept secret by owner  Public key – distributed freely to all who wish to send  Generated by computer algorithm, so a mathematical relation exists between them... however...  It is computationally difficult to determine the private key from the public key, even with knowledge of the encryption algorithm

Public Key Cryptography  The keys come in the form of tightly coupled pairs which anyone can generate using methods such as RSA, SHA-1, DSA (RSA is most common)  Javascript demo:  There is only one public key corresponding to any one private key and vice versa  Sender encodes data using public key of receiver  Receiver decodes data using unique private key, no one else can do the same  This ensures integrity of the data

Authentication  How can you be sure that the person sending the encrypted data is who they say they are  This requires some method of authenticating the identity of the sender  The solution is for the sender to “sign” the data using his/her private key – the data is encrypted using the sender’s private key  The receiver validates (decrypts the data) the “signature” using the sender’s public key  This will work as long as receiver can be sure the sender’s public key belongs to the sender and not an imposter … enter PKI

Integrity and Authentication  Example: Consider a merchant wants to send a secure message to a customer:  Merchant encrypts message using customer’s public key  Merchant then signs message by encrypting with their private key  Customer decrypts using the merchants public key to prove authenticity of sender  Customer decrypts using their private key to ensure integrity of message

PKI — Public Key Infrastructure  Integrates PK cryptography with digital certificates and certificate authorities (CA)  Digital certificate = issued by a CA, includes user name, public key, serial number, expiration date, signature of trusted CA (message encrypted by CA’s private key)  Receipt of a valid certificate is proof of identity – can be checked at CAs sight  is major player

Security and HTTPS  Certificate is an entity’s public key plus other identification (name, CA signature)  SSL – Secure Socket Layer  Lies between TCP/IP and HTTP and performs encryption  HTTPS is the HTTP protocol that employs SSL – it uses a separate server port (default = 443)

Secure sockets layer (SSL)   transport layer security to any TCP-based app using SSL services.  used between Web browsers, servers for e-commerce (shttp).  security services:  server authentication  data encryption  client authentication (optional)  server authentication:  SSL-enabled browser includes public keys for trusted CAs.  Browser requests server certificate, issued by trusted CA.  Browser uses CA’s public key to extract server’s public key from certificate.  check your browser’s security menu to see its trusted CAs.

SSL (continued)  Encrypted SSL session:  Browser generates symmetric session key, encrypts it with server’s public key, sends encrypted key to server.  Using private key, server decrypts session key.  Browser, server know session key  All data sent into TCP socket (by client or server) encrypted with session key.  SSL: basis of IETF Transport Layer Security (TLS).  SSL can be used for non-Web applications, e.g., IMAP.  Client authentication can be done with client certificates.

Security through HTTPS Browser Database Server Client 1 Server A URL HTTP TCP/IP HTTP Server App. Server index.html Bank Server Dedicated prog.jsp HTTPS port = 80 port = 443

SSL — Secure Socket Layer 1.Client makes HTTPS connection to server 2.Server sends back SSL version and certificate 3.Client checks if certificate from CA 4.Client creates session “premaster secret”, encrypts it and sends it to server and creates “master secret” 5.Server uses its private key to decrypt “premaster secret” and create the same “master secret” 6.The master secret is used by both to create session keys for encryption and decryption

SET — Secure Electronic Transfer  Developed by Visa & Mastercard  Designed to protect E-Comm transactions  SET uses digital certificates to authenticate customer, merchant and financial institution  Merchants must have digital certificate and special SET software  Customers must have digital certificate and SET e-Wallet software

Major Architectural Components of the Web Internet Browser Database Server Client 1 Server A Server B Bank Server URL HTTP TCP/IP Browser Client 2 HTTP Server App. Server index.html BankServer prog.jsp

Consider Your Rôle  Surfer  Information provider  Shopper  Seller  Game player  …

Consider Network Rôles  Client  Server  Browser  Web Server  User  Interpreting browser display  Issuing commands

Privacy

Source: Privacy International's PHR2004-Overview of Privacy (13/11/2004 version) Some Definitions of Privacy  Robert Ellis Smith, editor of the Privacy Journal, defined privacy as "the desire by each of us for physical space where we can be free of interruption, intrusion, embarrassment, or accountability and the attempt to control the time and manner of disclosures of personal information about ourselves."[6]  According to Edward Bloustein, privacy is an interest of the human personality. It protects the inviolate personality, the individual's independence, dignity and integrity.[7]  According to Ruth Gavison, there are three elements in privacy: secrecy, anonymity and solitude. It is a state which can be lost, whether through the choice of the person in that state or through the action of another person.[8]

The Right To Privacy Universal Declarationof Human Rights Article 12 No one shall be subjected to arbitrary interference with his privacy, …. Everyone has the right to the protection of the law against such interference ….

The Right To Privacy Universal Declaration of Human Rights (Article 12) No one shall be subjected to arbitrary interference with his privacy, …. Everyone has the right to the protection of the law against such interference …. (10 Dec. 1948, UN GA Res. 217 A (III)) Scott McNealy (Sun's CEO) ‘You have zero privacy anyway. Get over it.’ (25 Jan at a press conferenceat a press conference)

* Source: W3C P3P Project webpage, 10 March 2006 P3P *  The Platform for Privacy Preferences Project  W3C standard  Expected to enable simple, automated ways for WWW users to gain more control over the use of personal information  A high-level data interchange language (like PICS codes for filtering and Common Content leases)  Not a whole solution, only an infrastructure

* Source: W3C P3P Project webpage, 10 March 2006 P3P: How *  ‘P3P-enabled browsers can “read” this snapshot automatically and compare it to the consumer's own set of privacy preferences.’  ‘P3P enhances user control by putting privacy policies where users can find them, in a form users can understand, and, most importantly, enables users to act on what they see.’

Netscape 7 uses P3P Hidden

Netscape 7: P3P Details

Example P3P Policies  html html  html html

P3P Resources   See especially  How to create a policy Entities Expiry Verification  How to implement a policy Requires server administration Use of keywords

Credits  Some of these slides and diagrams are from Dr. Danny Silver of Acadia U.'s Jodrey School of Computer Science, and Dalhousie U.'s Faculty of Computer Science  Some of these notes are based on slides provided with the textbook Computer Networking: A Top Down Approach Featuring the Internet (2nd edition). By Jim Kurose and Keith Ross (copyright held by the authors) Published by Addison-Wesley in July From Privacy International’s PHR2004-Overview of Privacy [6] Robert Ellis Smith, Ben Franklin's Web Site 6 (Sheridan Books 2000). [7] Privacy as an Aspect of Human Dignity, 39 New York University Law Review 971 (1964). [8] Privacy and the Limits of Law, 89 Yale Law Journal 421, 428 (1980).

Next Topic: Filtering