Upgrading the Web A Prospectus. Apology The Web.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 16
Advertisements

Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
CP3397 ECommerce.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
Lecture 6: Web security: SSL
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Secure Sockets Layer. SSL SSL is a communications protocol layer which can be placed between TCP/IP and HTTP It intercepts web traffic and provides security.
By: Ansuya Chauhan.
© 2004, The Technology Firm SSL Packet Decodes From Wikipedia, the free encyclopedia.  Secure Sockets Layer (SSL) is a cryptographic.
Core Web Service Security Patterns
Electronic Transaction Security (E-Commerce)
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Making VLAB Secure Javier I. Roman. What is VLAB?  An interdisciplinary consortium dedicated to the development and promotion of the theory of planetary.
Online Security Tuesday April 8, 2003 Maxence Crossley.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 17 Prof. Crista Lopes.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Creating your website Using Plain HTML. What is HTML? ► Web pages are authored in HyperText Markup Language (HTML) ► Plain text is marked up with tags,
It’s World Wide! I NTRODUCTION TO T HE WEB 1 Photo courtesy:
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Oracle Application Express 3.0 Joel R. Kallman Software Development Manager.
Secure Socket Layer (SSL)
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Web Security Fear, Surprise, and Ruthless Efficiency Mary Ellen Zurko.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
TCP/IP Protocols Dr. Sharon Hall Perkins Applications World Wide Web(HTTP) Presented by.
Build a HTML 5 App Octobershiner. What is a HTML 5 app ? What is a Web application ? Sth. In your browser Maybe a webpage or a game Multiple type of OS.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Cross Site Integration “mashups” cross site scripting.
Network Security Essentials Chapter 5
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Web Servers: The Engines that Drive the World Wide Web Dr. William Farmer Reza Sherafat McMaster University May 3, 2006.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Internet and Intranet Protocols and Applications Lecture 13: Web Beyond HTTP 4/25/2000 Arthur P. Goldberg Computer Science Department New York University.
WEB SERVER SOFTWARE FEATURE SETS
Esri UC 2014 | Demo Theater | Using ArcGIS Online App Logins in Node.js James Tedrick.
Adapted from  2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and th ed: 4.11 SY306 Web and Databases for Cyber Operations.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
COSC 2328 – Web Programming.  PHP is a server scripting language  It’s widely-used and free  It’s an alternative to Microsoft’s ASP and Ruby  PHP.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Web Page Design The Basics. The Web Page A document (file) created using the HTML scripting language. A document (file) created using the HTML scripting.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Dive into web development
TOPIC: HTTPS (Security protocol)
Web Applications Security Cryptography 1
Websocket Application
Microsoft Office Illustrated
Using SSL – Secure Socket Layer
Review Slides, Security +
ما هي خدمة بروتوكول نقل الملفات؟
Chengyu Sun California State University, Los Angeles
Unit 8 Network Security.
Electronic Payment Security Technologies
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

Upgrading the Web A Prospectus

Apology

The Web

Security

Passwords

RFC 1738 December 1994 // user : host : port / url-path The use of URLs containing passwords that should be secret is clearly unwise.

What’s wrong with the Web?

Insecure Complex

HTTP Key : value pairs Negotiation Request/response protocol

DNS

SSL

Certi  cate Authorities

HTML

Templating

Document Object Model

CSS

JavaScript

Many Have Tried Microsoft, Apple, Adobe, Oracle, many more. In most cases, the technology was much better. In most cases, the solution was not open. There was no transition.

Upgrade the Web. Keep the things it does well.

HDTV

Helper App

Transition Plan Convince one progressive browser maker to integrate. Convince one secure site to require its customers to use that browser. Risk mitigation will compel the other secure sites. Competitive pressure will move the other browser makers. The world will follow for improved security and faster application development. Nothing breaks!

Strong Cryptography ECC 521 AES 256 SHA 3-256

Zooko’s Triangle Human Meaningful Securely Unique Global: Decentralized

ECC521 public keys as unique identifiers

Secure JSON over TCP

web: ipaddress / capability

Trust Management Petnames

Vat

Cooperation under mutual suspicion.

JavaScript Message Server Qt

The Old Web: Promiscuity The New Web: Commitment

There’s nothing new here.

In the meantime, keep doing what you’re doing.

Hope

KEEP CALM AND JS ON