Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.

Slides:



Advertisements
Similar presentations
Overview Environment for Internet database connectivity
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Chapter 17: WEB COMPONENTS
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Layer 7- Application Layer
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Internet…issues Managing the Internet
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Chapter 8 Web Security.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
INTRODUCTION TO WEB DATABASE PROGRAMMING
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 7: Using Windows Servers to Share Information.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Web Components Chapter 17.
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Web Server.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
The Secure Sockets Layer (SSL) Protocol
TOPIC: HTTPS (Security protocol)
WWW and HTTP King Fahd University of Petroleum & Minerals
Secure Sockets Layer (SSL)
Amit Kulkarni February 17, 2004
Chapter 27 WWW and HTTP.
The Secure Sockets Layer (SSL) Protocol
Security+ All-In-One Edition Chapter 15 – Web Components
Electronic Payment Security Technologies
Presentation transcript:

Web Security Chapter 6

Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates to SSL Explore common uses of instant messaging applications and identify vulnerabilities associated with those applications continued…

Learning Objectives Understand the vulnerabilities of JavaScript, buffer overflow, ActiveX, cookies, CGI, applets, SMTP relay, and how they are commonly exploited

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Commonly used protocols for managing the security of a message transmission across the “insecure” Internet

Secure Sockets Layer (SSL) Developed by Netscape for transmitting private documents via the Internet Uses a public key to encrypt data that is transferred over the SSL connection URLs that require an SSL connection start with “ instead of “

Transport Layer Security (TLS) Latest version of SSL Not as widely available in browsers

SSL/TLS Protocol Runs on top of the TCP and below higher-level protocols Uses TCP/IP on behalf of higher-level protocols Allows SSL-enabled server to authenticate itself to SSL-enabled client Allows client to authenticate itself to server Allows both machines to establish an encrypted connection

Secure Sockets Layer Protocol

SSL/TLS Protocol Uses ciphers to enable encryption of data between two parties Uses digital certificates to enable authentication of the parties involved in a secure transaction

Cipher Types Used by SSL/TLS Asymmetric encryption (public key encryption) Symmetric encryption (secret key encryption)

Digital Certificates Components  Certificate user’s name  Entity for whom certificate is being issued  Public key of the subject  Time stamp Typically issued by a CA that acts as a trusted third party  Public certificate authorities  Private certificate authorities

Secure Hypertext Transfer Protocol (HTTPS) Communications protocol designed to transfer encrypted information between computers over the World Wide Web An implementation of HTTP Often used to enable online purchasing or exchange of private information over insecure networks Combines with SSL to enable secure communication between a client and a server

Instant Messaging (IM) Communications service that enables creation of a private chat room with another individual Based on client/server architecture Typically alerts you whenever someone on your private list is online Categorized as enterprise IM or consumer IM systems Examples: AOL Instant Messenger, ICQ, NetMessenger, Yahoo! Messenger

IM Security Issues Cannot prevent transportation of files that contain viruses and Trojan horses Misconfigured file sharing can provide access to sensitive or confidential data Lack of encryption Could be utilized for transportation of copyrighted material; potential for substantial legal consequences Transferring files reveals network addresses of hosts; could be used for Denial-of-Service attack

IM Applications Do not use well-known TCP ports for communication and file transfers; use registered ports Ports can be filtered to restrict certain functionalities or prevent usage altogether

Vulnerabilities of Web Tools Security of Web applications and online services is as important as intended functionality  JavaScript  ActiveX  Buffers  Cookies  Signed applets  Common Gateway Interface (CGI)  Simple Mail Transfer Protocol (SMTP) relay

JavaScript Scripting language developed by Netscape to enable Web authors to design interactive sites Code is typically embedded into an HTML document and placed between the and tags Programs can perform tasks outside user’s control

JavaScript Security Loopholes Monitoring Web browsing Reading password and other system files Reading browser’s preferences

ActiveX Loosely defined set of technologies developed by Microsoft  Outgrowth of OLE (Object Linking and Embedding) and COM (Component Object Model) Provides tools for linking desktop applications to WWW content Utilizes embedded Visual Basic code that can compromise integrity, availability,and confidentiality of a target system

Buffer Temporary storage area, usually in RAM Acts as a holding area, enabling the CPU to manipulate data before transferring it to a device

Buffer Overflow Attacks Triggered by sending large amounts of data that exceeds capacity of receiving application within a given field Take advantage of poor application programming that does not check size of input field Not easy to coordinate; prerequisites:  Place necessary code into program’s address space  Direct application to read and execute embedded code through effective manipulation of registers and memory of system

Cookies Messages given to Web browsers by Web servers  Browser stores message in a text file  Message is sent back to server each time browser requests a page from server Verify a user’s session Designed to enhance browsing experience

Vulnerabilities of Cookies Contain tools that are easily exploited to provide information about users without consent  Attacker convinces user to follow malicious hyperlink to targeted server to obtain the cookie through error handling process on the server  User must be logged on during time of attack To guard against EHE attacks  Do not return unescaped data back to user  Do not echo 404 file requests back to user

Java Applets Internet applications (written in Java programming language) that can operate on most client hardware and software platforms Stored on Web servers from where they can be downloaded onto clients when first accessed With subsequent server access, the applet is already cached on the client and can be executed with no download delay

Signed Applets Technique of adding a digital signature to an applet to prove that it came unaltered from a particular trusted source Can be given more privileges than ordinary applets Unsigned applets are subject to sandbox restrictions

Unsigned Applets

Sandbox Model Prevent the applet from:  Performing required operations on local system resources  Connecting to any Web site except the site from which the applet was loaded  Accessing client’s local printer  Accessing client’s system clipboard and properties

Signed Applets

Reasons for Using Code Signing Features To release the application from sandbox restrictions imposed on unsigned code To provide confirmation regarding source of the applications code

Common Gateway Interface (CGI) Interface specification that allows communication between client programs and Web servers that understand HTTP Uses TCP/IP Can be written in any programming language Parts of a CGI script  Executable program on the server (the script itself)  HTML page that feeds input to the executable

Typical Form Submission

CGI Interactive nature leads to security loopholes  Allowing input from other systems to a program that runs on a local server exposes the system to potential security hazards

Precautions to Take When Running Scripts on a Server Deploy IDS, access list filtering, and screening on the border of the network Design and code applications to check size and content of input received from clients Create different user groups with different permissions; restrict access to hierarchical file system based on those groups Validate security of a prewritten script before deploying it in your production environment

Simple Mail Transfer Protocol (SMTP) Standard Internet protocol for global communications Transaction takes place between two SMTP servers Designed as a simple protocol  Easy to understand and troubleshoot  Easily exploited by malicious users

Vulnerabilities of SMTP Relay Spam via SMTP relay can lead to:  Loss of bandwidth  Hijacked mail servers that may no longer be able to serve their legitimate purpose Mail servers of innocent organizations can be subject to blacklisting

Chapter Summary Protocols commonly implemented for secure message transmissions  Secure Socket Layer  Transport Layer Security Data encryption across the Internet through Secure Hyper Text Transfer Protocol in relation to SSL/TSL continued…

Chapter Summary Instant Messaging  Common uses  Vulnerabilities Well-known vulnerabilities associated with web development tools