An Introduction to E-Commerce Security By Graham Mead.

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
For further information computersecurity.wlu.ca
Module 5: Configuring Access to Internal Resources.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Securing Microsoft® Exchange Server 2010
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
TELE 301 Lecture 17: FTP … 1 Overview Last Lecture –Remote Terminal Services (SSH) This Lecture –File transfer and web caching Next Lecture –Directory.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
Network Security: Lab#3 Transport-Level Security Tools J. H. Wang May 12, 2011.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
FileZilla An open-source success story. Mark Swelstad – Itec400, Winter 2007.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Associate ® Administration An Associate administrator has the ability to change the parameters for both the author and for the typist. There can be enterprise.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
WinSCP SUSAN WOYTON ITEC400 APRIL 5, What is WinSCP? Windows based Program Transfers files using File Transfer Protocol (FTP) Secure File Transfer.
Introduction to Operating Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
TECHNOLOGY GUIDE THREE
Aplikasi Jaringan.
Telnet/SSH Connecting to Hosts Internet Technology.
Virtual Private Networks
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewalls Jiang Long Spring 2002.
6. Application Software Security
Presentation transcript:

An Introduction to E-Commerce Security By Graham Mead

Security Strategies Enforce Secure Passwords by Design. Don’t trust users are who they say they are, unless they can prove it. PCI Data Security Standard ISO/IEC (risks to information assets)

Secure Transfer Methods HTTPS, SSH, SFTP. These protocols use encryption. They allow you to transfer data securely. Use the ‘High’ encryption level for Remote Desktop. This uses a 128 bit key. Never use telnet, http or ftp to login. These are insecure protocols.

Default Security is Weak Configuration found in Admin Tools -> Terminal Services Configuration. Change the Encryption drop down box to at least High.

HTTPS Example Click on the padlock to see this window. The White box would display the address of the web site. The Green box would

Implementing Security Mod_security can filter out bad traffic and help protect web applications. mod_ssl allows the HTTPS protocol to be used with apache.

Mod Security Over 70% of all attacks now carried out over the web port. (modsecurity) Mod Security is a web application layer firewall. It can be used to help protect web sites. Two example alerts can be seen in the image below. First it protects against a directory listing, that could be valuable to an attacker Secondly it protects against an SQL Injection attack.

Security is Everyone's Responsibility. Don’t be the weak link.

References /faq.html#d0e47 (modsecurity.org 2007) /faq.html#d0e47