Web server security Dr Jim Briggs WEBP security1.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COEN 252: Computer Forensics Router Investigation.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
APA of Isfahan University of Technology In the name of God.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Computer & Network Security
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Trends and Issues Basic Computer Concepts Education  Children are outpacing adults on the technology track. Education plays a major role in guiding.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 9 Sniffing.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
DoS/DDoS attack and defense
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Computer Security By Duncan Hall.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 40 Internet Security.
Network security Vlasov Illia
Network Security (the Internet Security)
Managing Secure Network Systems
What Makes a Network Vulnerable?
Web Servers / Deployment
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Test 3 review FTP & Cybersecurity
Presentation transcript:

Web server security Dr Jim Briggs WEBP security1

What do we mean by secure? 100% security Trading off security versus convenience Particular vulnerabilities of the Internet –The "wild west" WEBP security2

Vulnerability of web systems Open to the outside world –Aim to attract strangers! Left unattended (largely) Lots of potential security holes –Running other people's buggy software –Running own buggy software (even worse!) –Large amount of code (often) Visitors are largely anonymous and can be very remote Communication can be eavesdropped (unless encrypted) Difficult (impossible?) to test exhaustively WEBP security3

Server risks Bugs or misconfiguration problems in the Web server that allow unauthorized remote users to: –Steal confidential documents not intended for their eyes. –Execute commands on the server host machine, allowing them to modify the system. –Gain information about the Web server's host machine that will allow them to break into the system. –Launch denial-of-service attacks, rendering the machine temporarily unusable. WEBP security4

Client risks Browser-side risks, including: –Active content (e.g. Java, JavaScript, ActiveX) that crashes the browser damages the user's system breaches the user's privacy, or merely creates an annoyance –The misuse of personal information knowingly or unknowingly provided by the end-user passwords credit card numbers other sensitive data WEBP security5

Network risks Interception of network data sent from browser to server or vice versa via network eavesdropping. Eavesdroppers can operate from any point on the pathway between browser and server including: –The network on the browser's side of the connection –The network on the server's side of the connection (including intranets). –The end-user's Internet service provider (ISP) –The server's ISP –Either ISPs' regional access provider WEBP security6

General security techniques Keep your software up to date with security patches Try not to use unsafe techniques (e.g. CGI, SSI) If you have to use them, test them thoroughly –Include own use of hacker tools Design and implement an access control policy (both via the web and to the host server) Log everything; monitor the logs; and investigate suspicious activity WEBP security7

Specific server side issues Back door access to the server –Remote/local login –FTP –Alternative web sites hosted on same machine Don't run the server as "root" Turn off un-needed … –features in software –IP ports Firewalls WEBP security8

Denial of service (DoS) attacks Definition: –attack designed to render a computer or network incapable of providing normal services Typical attacks –Bandwidth attacks flood network with high volume of traffic consequence – all available network resources are consumed and legitimate user requests can not get through –Connectivity attacks flood computer with high volume of connection requests consequence – all available operating system resources are consumed, and computer can not process legitimate requests WEBP security9

Distributed DoS (DDoS) attacks Many hosts simultaneously attack target Typically caused by agent hijacking vulnerable hosts (e.g. via virus) As important to protect your machine from hijack as it is to protect it from attack Techniques: –Scan regularly for DDoS tools –Do egress filtering (check for spoofed packets) WEBP security10

HTTP security Authentication –Basic –Digest Secure transport –SSL WEBP security11