Web Application Security Presented by Ben Lake. How the Web Works Hypertext Transfer Protocol (HTTP)  Application-level  Stateless Example  Web Browser.

Slides:



Advertisements
Similar presentations
CP3397 ECommerce.
Advertisements

1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Secure Socket Layer.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 2: Application Layer
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
1 Technological standards, communications protocols, security technology Packet Switching, Web Protocols, HTML, HTTP, HTTPS and HTTS Public and Private.
Chapter 8 Web Security.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Session 11: Security with ASP.NET
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
E-Business William R. Mussatto CyberStrategies, Inc. 12/2/2000.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Cookies Web Browser and Server use HTTP protocol to communicate and HTTP is a stateless protocol. But for a commercial website it is required to maintain.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Cryptography CSS 329 Lecture 13:SSL.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
TOPIC: HTTPS (Security protocol)
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Cryptography and Network Security Chapter 16
12 E-Commerce Overview.
Cryptography and Network Security
Cryptography and Network Security
Transport Layer Security (TLS)
Unit 8 Network Security.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Web Application Security Presented by Ben Lake

How the Web Works Hypertext Transfer Protocol (HTTP)  Application-level  Stateless Example  Web Browser Request  Web Server Response GET / HTTP/1.1 Host [Content] HTTP/ OK [Content]

Web Applications Pseudo Definition  A series of HTTP requests to complete a task in an environment in which state is maintained. The difference between a web site and a web application is the ability to maintain state. Examples  Online shopping, banking, class enrollment, bulletin board, etc.

Maintaining State State  A condition of mode or being.  A light has two obvious states: ON or OFF HTTP is a stateless protocol  Every request is individual and maintains no correlation between past requests. Maintaining state over HTTP is an illusion.  This illusion is created by having a key piece of information propagate between requests.

Cookies! Definition  An extension of HTTP that allows state to be maintained by providing a token piece of information between HTTP requests. Put simply, cookies are datagrams stored by a web browser at the request of a web server. How they work  Client sends request  Server sends response with its own request to set a cookie  Client decides to accept or reject cookie  Subsequent requests may or may not contain the cookie Set-Cookie: NAME=VALUE; expires=DATE; path=PATH; domain=DOMAIN_NAME; secure

Cookies! and State Cookies provide a mechanism to maintain state. The data stored in a cookie can be used to identify a user based on previous requests. Examples  Storing the ID numbers of the items you have selected for purchase.  Storing a unique ID number that identifies you as the person taking an online test.

Authentication Definition  The mechanism(s) that provide a means of identifying an individual in a public environment. When state can be maintained, authentication in a Web Application becomes feasible. Authentication allows a system to meet the needs of the individual using it. This includes Web Applications. Examples  Banking - whose account should be accessed?  Course Enrollment - what courses have you taken?  Shopping - what’s on your wish list?

Authenticating and State Authentication allows more robust and customized functionality from Web Applications. There are many ways to authenticate a client.  Scenario 1: Require user to authenticate for every request. Problems: Cumbersome for user. Solutions: Auto populating browser.  Scenario 2: Store authentication information in a cookie. Problems: Probability of authentication information being intercepted greatly increased. Solutions: Use a unique ID.  Scenario 3: Store a unique ID in a cookie assigned when authentication information is verified. Problems: Unique ID can be intercepted and used by another user. Solutions: Rolling ID and/or ID expiration.

Secure Socket Layer (SSL) Definition  A protocol layered on top of TCP to provide a secure (encrypted) transport layer for the communication between two applications. Attributes  Private - The data stream is symmetrically encrypted.  Reliable - Each packet of information is verified via a hash.  Authentic - The servers identity is authenticated using asymmetric encryption. How SSL Works  There is a handshake between the client and server to decide on a protocol version, encryption suite, and encryption method.  The peers verify one another's identity if applicable using public key encryption methods.  A secure connection is established and data is transported transparently by the secure layer.

Conclusion Security is evolving with the every newly adopted standard. Be aware of the technologies you’re utilizing, so that you can make an educated assessment of the security risks you face in any given environment.

References HTTP - ftp://ftp.isi.edu/in-notes/rfc2616.txt Cookies - SSL -