1 Application Security: Electronic Commerce and E-Mail Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.

Slides:



Advertisements
Similar presentations
Chapter 17: WEB COMPONENTS
Advertisements

COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Chapter 4 Application Security Knowledge and Test Prep
Chapter 6: Hostile Code Guide to Computer Network Security.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureSurf Protect your users when surfing the Internet.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
INTRODUCTION TO WEB DATABASE PROGRAMMING
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Data Security.
Chapter 7: Using Windows Servers to Share Information.
Application Security: Web service and (April 11, 2011) © Abdou Illia – Spring 2011.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
Application Security: General apps &Web service (April 11, 2012) © Abdou Illia – Spring 2012.
Chapter 1: Introduction to Web
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Chapter 8.  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we looked at operating system and data.
IT security By Tilly Gerlack.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 21 - Web Servers (IIS, PWS and Apache) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Kingdom of Saudi Arabia Ministry of Higher Education Al-Imam Muhammad Ibn Saud Islamic University College of Computer and Information Sciences Chapter.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security fundamentals Topic 9 Securing internet messaging.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
WEB SERVER SOFTWARE FEATURE SETS
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
© 2015 Pearson Education Ltd. Chapter 8 Chapter 8.
Computer Security Keeping you and your computer safe in the digital world.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Application Security: Web service and
Chapter 5 Electronic Commerce | Security Threats - Solution
Tonga Institute of Higher Education IT 141: Information Systems
Instructor Materials Chapter 5 Providing Network Services
WWW and HTTP King Fahd University of Petroleum & Minerals
World Wide Web policy.
Chapter 5 Electronic Commerce | Security Threats - Solution
Application Security: General apps &Web service
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall

2 Figure 9-1: General Application Security Issues Executing Commands with the Privileges of a Compromised Application  If an attacker takes over an application, the attacker can execute commands with the privileges of that application  Many applications run with super user (root) privileges

3 Figure 9-1: General Application Security Issues Buffer Overflow Attacks  From Chapter 6: Vulnerabilities  Exploits  Fixes Patches Manual work-arounds, or Version upgrades)

4 Figure 9-1: General Application Security Issues Buffer Overflow Attacks  Buffers are places where data is stored temporarily  If an attacker sends too much data, a buffer might overflow, overwriting an adjacent section of RAM  If that section is retrieved, various problems can occur  Read as data, read as program instructions, illegal values that cause a crash

5 Figure 9-1: General Application Security Issues Buffer Overflow Attacks  Stacks are used to hold information temporarily on subprograms  Stack overflows might allow an attacker to execute any command (Figure 9-2)  An example: The IIS IPP Buffer Overflow Attack: Host variable is overflowed

6 Figure 9-2: Stack Entry and Buffer Overflow Return Address 1. Write Return Address 2. Add Data to Buffer Data Buffer 5. Start of Attack Code 3. Direction of Data Writing 4. Overwrite Return Address

7 Figure 9-1: General Application Security Issues Few Operating Systems But Many Applications  So application hardening is more total work than operating system hardening Application Security Actions  Understanding the server’s role and threat environment  If it runs only one or a few services, easy to disallow irrelevant things

8 Figure 9-1: General Application Security Issues Application Security Actions  Basics Physical security (Chapter 2) Harden the operating system (Chapter 6) Backup (Chapter 10)  Install Application Patches

9 Figure 9-1: General Application Security Issues Application Security Actions  Minimize applications Main applications Subsidiary applications Be guided by security baselines  Add application layer authentication  Implement cryptographic systems

10 Figure 9-1: General Application Security Issues Application Security Actions  Minimize the permissions of applications so that successful attackers will not own the machine Hackers who take over an application obtain the permissions of that application Many applications run as root, giving the hacker total control of the computer if compromised Application take-over is the most common way to hack computers today

11 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation and market capitalization

12 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Customer fraud (including credit card fraud) Loss of revenues when product is not paid for Credit card company charge-back fees Must use external firm to check credit card numbers

13 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of privacy violations  Links to internal corporate servers

14 Figure 9-3: Webserver and E-Commerce Security Webservers Versus E-Commerce Servers  Webservice provides basic user interactions Microsoft Internet Information Server (IIS) Apache on UNIX Other webserver programs

15 Figure 9-3: Webserver and E-Commerce Security Webservers Versus E-Commerce Servers  E-commerce servers add functionality: Order entry, shopping cart, payment, etc.  Custom programs written for special purposes

16 Figure 9-4: Webservice Versus E-Commerce Service E-Commerce Software Subsidiary E-Commerce Software Component (PHP, etc.) Custom Programs Webserver Software

17 Figure 9-3: Webserver and E-Commerce Security Some Webserver Attacks  Website defacement  Numerous IIS buffer overflow attacks, many of which take over the computer

18 Figure 9-3: Webserver and E-Commerce Security Some Webserver Attacks  IIS directory traversal attacks Normally, paths start at the WWW root directory Adding../ might take the attacker up a level, out of the WWW root box If traverse to command prompt directory in Windows 2000 or NT, can execute any command with system privileges

19 Figure 9-3: Webserver and E-Commerce Security Some Webserver Attacks  IIS directory traversal attacks Companies filter out / and \ Attackers respond with hexadecimal and UNICODE representations for / and \

20 Figure 9-3: Webserver and E-Commerce Security Some Webserver Attacks  Apache has problems, too

21 Figure 9-3: Webserver and E-Commerce Security Patching the Webserver and E-Commerce Software and Its Components  Patching the webserver software is not enough  Also must patch e-commerce software  E-commerce software might use third-party component software that must be patched

22 Figure 9-3: Webserver and E-Commerce Security Controlling Dynamic Webpage Development  Static versus dynamic webpages  For static webpages: GET /path/filename.extension HTTP / version  CGI to pass parameters to a program GET /path/programname.exe?variable1= “value”&variable2=“value”… Inefficient. Starts new copy of program with each request

23 Figure 9-3: Webserver and E-Commerce Security Controlling Dynamic Webpage Development  ASP is Microsoft’s server-side scripting language  ISAPI from Microsoft starts a.dll component Component continues to run; no need to start a new copy with each request

24 Figure 9-3: Webserver and E-Commerce Security Controlling Dynamic Webpage Development  Controlling software development Programmer training in safe programming methods Auditing for security weaknesses

25 Figure 9-3: Webserver and E-Commerce Security Controlling Dynamic Webpage Development  Deployment Development servers: Developers must have wide privileges Staging servers: Only testers and systems administrators should have privileges Production servers: Only systems administrators should have privileges

26 Figure 9-3: Webserver and E-Commerce Security User Authentication  None: No burden on customer (e.g., traditional SSL/TLS)  Username and password provide some protection but may be given out without checking customer quality  IPsec and digital certificates: Expensive and difficult for customers  TLS with client digital certificates: Less expensive than IPsec but difficult for customers

27 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser to attack clients

28 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Client-side scripting Java applets: Small Java programs Scripting languages (not full programming languages)  JavaScript and VBScript Active-X from Microsoft; highly dangerous because it can do almost everything

29 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Malicious links User must click on them to execute (but not always) Common extensions are hidden by default in windows  attack.txt.exe seems to be attack.txt

30 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Common Attacks File reading and executing a command Redirection to unwanted webpage Scripts might change the registry, home page Might Trojanize the program called when user mistypes a URL Pop-up windows behind main window so source is hard to find

31 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Common Attacks Cookies and web bugs  Cookies are placed on user computer; can be retrieved by website  Can be used to track users at a website  Web bugs—links that are nearly invisible— can do the same

32 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Common Attacks Choose domain names that are common misspellings of popular domain names  Microsoff.com, (a porn site) Opening two windows; transfer information from client window to webserver window

33 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Enhancing Browser Security Patches and updates Set strong security options (Figure 9-5) for Microsoft Internet Explorer 6.0 Remotely managing browsers on employee client PCs

34 Figure 9-5: Internet Options Dialog Box in Internet Explorer 6.0

35 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange, and Lotus/IBM Exchange, Notes dominate on Windows servers On Windows clients, Microsoft Outlook Express is safer than full-featured Outlook because Outlook Express generally does not execute content

36 Figure 9-7: Standards Sending Client Sender’s Mail Server Receiver’s Mail Server SMTP to Send POP or IMAP to Download SMTP to Send Receiving Client Message RFC 822 or 2822 body HTML body

37 Figure 9-6: Security Technology  SMTP to send messages from client to mail server or from mail server to mail server  To download messages to client program from receiver’s mail server POP: Simple and popular; manage mail on client PC IMAP: Can manage messages on mail server

38 Figure 9-6: Security Technology  bodies RFC 822 / RFC 2822: Plain English text HTML bodies: Graphics, fonts, etc. HTML bodies might contain scripts, which might execute automatically when user opens the message  Web-based needs only a browser on the client PC

39 Figure 9-8: Web-Based Client’s Browser Webserver Program HTTP Request Message HTTP Response Message Webpage Containing Message Client PC Webserver with Web-Based Almost all client PCs now have browsers. No need to install new software

40 Figure 9-6: Security Content Filtering  Antivirus filtering and filtering for other executable code Especially dangerous because of scripts in HTML bodies  Spam: Unsolicited commercial

41 Figure 9-6: Security Content Filtering  Volume is growing rapidly: Slowing and annoying users (porno and fraud)  Filtering for spam also rejects some legitimate messages  Sometimes employees attack spammers back; only hurts spoofed sender and the company could be sued

42 Figure 9-6: Security Inappropriate Content  Companies often filter for sexually or racially harassing messages  Could be sued for not doing so

43 Figure 9-6: Security Retention  On hard disk and tape for some period of time  Benefit: Can find information  Drawback: Can be discovered in legal contests; could be embarrassing  Must retain some messages for legal purposes (firing employees, banking, etc.)

44 Figure 9-6: Security Security  Message authentication to prevent spoofed sender addresses  Employee training is not private; company has right to read Your messages may be forwarded without permission

45 Figure 9-6: Security Security  Employee training Never to put anything in a message they would not want to see in court, printed in the newspapers, or read by their boss Never forward messages without permission Don’t open attachments unless expecting it and with all software patched and antivirus scanning on

46 Figure 9-6: Security Encryption  Not widely used because of lack of clear standards  IETF has not been able to settle upon a single standard because of in-fighting  Three standards are used in corporations TLS S/MIME PGP

47 Figure 9-6: Security Encryption  TLS only requires a digital certificate for servers  S/MIME requires a PKI for digital certificates  PGP uses trust among circles of friends: If A trusts B, and B trusts C, A may trust C’s list of public keys Dangerous: Misplaced trust can spread bogus key/name pairs widely

48 Figure 9-9: Cryptographic Protection for Mail Server Sending Client Receiving Client SMTP, POP, etc. Over TLS SMTP, POP, etc. over TLS TLS is easy to implement No end-to-end encryption (Mail server sees all mail in plaintext)

49 Figure 9-9: Cryptographic Protection for Sending Client Receiving Client S/MIME with PKI End-to-end encryption Complex to administer programs typically can do it Mail Server

50 Figure 9-9: Cryptographic Protection for Sending Client Receiving Client PGP with Circles of Trust End-to-end encryption Usually clumsy user interface Mail Server

51 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues

52 Figure 9-10: Database and Instant Messaging Security Concerns Database  Often used in mission-critical applications  Application layer authentication: Many database applications have passwords beyond the computer login password  Relational databases: Tables with rows (entities) and columns (attributes)

53 Figure 9-10: Database and Instant Messaging Security Concerns Database  Granularity of access control Restrict users to certain columns (attributes) in each row  For instance, deny access to salary column to most users Limit access control to rows, for instance, only rows containing data about people in the user’s own department

54 Figure 9-10: Database and Instant Messaging Security Concerns Database  Granularity of access control Prevent access to individual data: Allow trend analysts to deal only with sums and averages for aggregates such as departments

55 Figure 9-10: Database and Instant Messaging Security Concerns Database  Problems with commercial database servers Empty administrative password for Microsoft’s SQL Server allowed break-ins New version of SQL Server will be more locked down

56 Figure 9-10: Database and Instant Messaging Security Concerns Instant Messaging (IM)  Allows instant text communication and voice if has “click to talk”  Retention problem: Not integrated into retention schedules  File transfer problem: File transfers are not checked by antivirus programs, although a few popular antivirus programs check file transmissions for a few popular IM programs.

57 Figure 9-10: Database and Instant Messaging Security Concerns Relay Servers and IM  Some IM systems send all messages through a relay server This makes retention possible It makes filtering possible For many security vulnerabilities, only the relay server needs to be updated, not all clients New Client PC Relay Server

58 Topics Covered Applications are the most common target for hacking break-ins  If hacker takes over an application, has the permissions of that application, often root permissions  Few operating systems but many applications  Hardening applications is much harder than managing operating systems (Chapter 6)

59 Topics Covered Buffer Overflow Attacks  Attacker sends “data” for a field that contains a program to be executed  Data is longer than the program’s memory buffer for that variable  When program instructions in the overflowed areas are executed, the attacker’s code executes

60 Topics Covered Hardening Applications  The server should be hardened and backed up  Patches should be installed for vulnerabilities However, many applications exist, so just learning about vulnerabilities and patches can be a problem  Minimize applications Main applications Subsidiary applications Be guided by security baselines

61 Topics Covered Hardening Applications (Continued)  Add application layer authentication  Implement cryptographic systems  Minimize the permissions of applications so that successful hackers will not own the machine

62 Topics Covered Webserver and E-Commerce Security  Importance of these applications to the firm  Damage to firm if taken over (including the revelation of private client data)  Webservice dominated by Microsoft Internet Information Server (IIS) and Apache on UNIX E-Commerce Attacks  Defacement  Take-overs through buffer overflow attacks  IIS directory traversal attacks

63 Topics Covered E-Commerce service has multiple applications  All must be patched and otherwise hardened E-Commerce Software Subsidiary E-Commerce Software Component (PHP, etc.) Custom Programs Webserver Software

64 Topics Covered Dynamic Webpages  Accept user data  Create webpage on the fly, then send back to the user  If not programmed properly, will have vulnerabilities that can be exploited  Deployment through development server, testing server, and then production server—each will specific permissions for developers

65 Topics Covered User Authentication  None: No burden on customer (e.g., traditional SSL/TLS)  Username and password provide some protection but may be given out without checking customer quality  Customer digital certificates: Expensive and difficult for customers

66 Topics Covered Attacks on Browsers  Very widespread Many Internet Explorer Vulnerabilities  Client-side scripting executes code on the user PC If vulnerabilities are found, these scripts can do extensive damage  Malicious Links May download attack programs to user PCs and execute them

67 Topics Covered Attacks on Browsers  Programs exploiting browser vulnerabilities can do considerable damage Delete files Install pop-up adds, redirect to pornography sites, steal credit card numbers, etc. Intrusive cookies Web bugs Attack URLs similar to legitimate URLs

68 Topics Covered  Enhancing Browser Security Patches and updates Set strong security options Remotely managing browsers on employee client PCs

69 Topics Covered Security  Vulnerabilities in mail servers (SENDMAIL, Exchange)  Need antivirus filtering  Need spam filtering (sometimes filters out legitimate messages)  Inappropriate content (harassment)  Need to retain certain , but retaining too much leave a firm open to legal discovery searches

70 Topics Covered Security  User Education is not private Your messages may be forwarded without permission Never to put anything bad in a message Never forward messages without permission Never open attachments unless expecting them and all your software is patched and your antivirus scanning on

71 Topics Covered Encryption  Not widely used  No single standard  Three standards are used in corporations TLS S/MIME PGP (used circles of trust for public keys)

72 Topics Covered Database Security  Application authentication beyond login authentication for defense in depth  Restrict users to certain data  May prohibit access to individual data for privacy reasons  Commercial database servers have suffered from vulnerabilities that must be patched

73 Topics Covered Instant Messaging  Messages not retained properly  File transfers usually not subject to antivirus filtering  Relay servers may have all messages pass through them Allows filtering Can stop some vulnerabilities without updating all clients New