Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.

Slides:



Advertisements
Similar presentations
Service Manager for MSPs
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
DotNet Market Web Site “EMarket” Milena Natanov Project Supervisor: Victor Kulikov Lab Chief Engineer: Dr. Ilana David Semester spring, – Project.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Microsoft Passport Waldemar Swiercz.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Chapter 5 Database Application Security Models
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Microsoft Azure Introduction ISYS 512. Microsoft Azure Microsoft Azure is a cloud.
Chapter 9: Novell NetWare
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Database Application Security Models Database Application Security Models 1.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Module 11: Securing a Microsoft ASP.NET Web Application.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Small Business Security Keith Slagle April 24, 2007.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Module 3: Configuring Mailbox Server Roles. Overview Overview of Exchange Server 2007 Administration Tools Implementing Mailbox Server Roles Managing.
GUDURU PRAVEEN REDDY.NET IMPERSONATION. Contents Introduction Impersonation Enabled Impersonation Disabled Impersonation Class Libraries Impersonation.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Secure Windows App Development. Authentication.
Windows SharePoint 2007 Introduction. What is Microsoft SharePoint 2007? Microsoft SharePoint 2007 is the central information sharing and collaboration.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Introduction TO Network Administration
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Configuring and Deploying Web Applications Lesson 7.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Unit 3 Virtualization.
Securing Network Servers
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
KeePass Password Safe Dan Koller Jesse Cowan.
Encrypting Databases to Mitigate Server Breaches
ICT meeting Business needs
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
How to Fix Windows 10 Update Error 0x ?.
Network Services.
Getting Started.
Getting Started.
An Introduction to Cloud Computing
Single Sign On Glen Dorton 1/18/2019.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment

Introduction With the growing concern in computer security today user authentication plays an important role in keeping a system safe from hackers and intruders that are attempting to breach security by means of breaching a point of authentication to gain access to a system and others.

Form-based authentication can allow a developer or administrator the ability to limit access for certain users in an application if there were a large number of users or if users have the ability to register themselves, the user’s registration information such as their name, username, password, and can all be stored in a database structure on the same or another server

Passport Authentication centralized account management service that is used to allow multiple users access to multiple web applications using a single user account To use Passport Authentication you must purchase an account and pay for a Passport SDK from a service that is under the control of the Microsoft Passport Network ome.srf?vv=330&lc=1033https://accountservices.passport.net/ppnetworkh ome.srf?vv=330&lc=1033

Encryption/Decryption using types of validation that involve encrypting and decrypting the values that are taken in from the web application interface in terms of usernames and passwords can be easily accomplished by incorporating encrypt and decrypt functions in the code with a combination of algorithms and storage variables.

Encrypt function

Decrypt function

Intranet.NET Application usually used to grant access to employee users of a system When using this type of configuration it is most appropriate to use the Windows authentication method where the users are mapped to a valid Windows account

Intranet.NET configuration

User Authenitcation in.NET There are many different options when it comes to using the.NET framework for user authentication Authentication is a very critical component in Web development Hackers today are constantly on the move in efforts to gain access to other remote systems on the Internet today with the purpose of vandalizing, gaining personally in satisfaction of knowing they can do it, and or personal gains referring to finance or software

Security today To help in keeping your system up to date there are security white paper sites out there that give information regarding threats on the market (such as the latest spammers), security and service updates, security support, and other information relating to system security As an example the Watchguard site provides these types of solutions and they can be found on the web at:

Conclusion Poorly configured authentication in web applications can leave systems prone to these hackers’ attempts so it is always good to research the capabilities of the technology you are developing or administering in terms of what types of authentication are available on the market

Questions?