/99 $10.00 (c) 1999 IEEE

Size: px
Start display at page:

Download "/99 $10.00 (c) 1999 IEEE"

Transcription

1 WWW Distribution of Private Information with Watermarking Patrick Dymond and Michael Jenkin Department of Computer Science, York University 4700 Keele St., North York, Ontario, Canada (416) Abstract This paper considers the use of browser plugins and Java code (within standard HTTP mechanisms) to serve private condential documents securely over the World Wide Web to a group of mobile or otherwise distributed users. Web security mechanisms typically require use of either an underlying security system for transport mechanism (e.g., SSL[7]) alternate servers and data streams (e.g., S-HTTP[9]), security-oriented plugins within the browser (e.g, [6]), or helper applications (e.g., [11]). The method described here operates by providing a per-user security mechanism coded in Java which operates as part of a standard web-browser environment. This system appears to be very appropriate for serving lower-security, non-public documents, les and images to a group of heterogeneous users over the world wide web. It can also be appropriate in circumstances where the standard security mechanisms are not available. We also describe an adaptation which provides automatic per-user \watermarking" of decoded pages to allow identication of the decoder. 1 Introduction For a group of authorized distributed users, and especially for mobile users seeking access to shared private data, the world wide web may be the most accessible communications channel available. However, existing world-wide web mechanisms are not well-suited for providing private documents to a limited set of authorized users, where some degree of condentiality or privacy is required. (See [5] for a general introduction to security and the web.) Several avenues to augment existing web technology with varying degrees of security 1 exist. These dierent mechanisms interact with the world wide web at dierent levels and provide varying levels of security and convenience for the users. Existing mechanisms include Network-level security. For example, the SSL (Secure Sockets Layer) proposed by Netscape [7] and PCT (Private Communication Technology) [2] proposed by Microsoft provide security at the transport layer and essentially encrypt the entire datastream at the network level. SSL and PCT provide mechanisms for authentication of clients and servers as well as providing data condentiality (encryption) and message authentication. Although this type of approach can potentially provide a high level of security the approach is not without its drawbacks. Perhaps the most of these is that the entire datastream must be encrypted. This can result in some reduction in transmission performance. This is discussed further below. HTTP-level security. For example, S- HTTP (Secure HTTP)[9] is an augmented version of HTTP with additional features to enable secure transmission. Unfortunately S-HTTP is not supported 1 Of course no mechanism can provide complete security, rather dierent mechanisms each provide dierent features and degrees of protection. 1

2 by Microsoft's or Netscape's standard browsers, and it would appear that this standard is not in wide use. Alternate suites of software (browsers, servers, etc.) to deal with encrypted data are required. HTTP server-based security. Many HTTP servers, including NCSA and Apache, provide access conguration les which allow the server site manager to associate usernames, passwords, and internet domain constraints on the users who may access the pages. These techniques do not provide secure transmission although they do provide limited security in terms of data access. One unfortunate problem with this type of security is that well-known attacks exist. For example [10] describes a bruteforce approach to obtaining the password to an access conguration le protected web page. CCI-based security. Browsers such as Netscape and Internet Explorer provide a standard mechanism to enable helper applications for the user's browser written using CCI (Common Client Interface) standards, to deal with novel MIME-types. [11] describes a system which uses PGP[4] to encrypt and transmit web pages which are then decrypted outside of the browser via a registered helper application. Although this type of approach can provide extremely strong cryptographic protection of the transmitted data, such systems are limited by the CCI (Common Client Interface) link. Either a separate display program must be made available to display the plaintext, or alternatively the plaintext must be made available to the browser for display. In either event, plaintext may be intercepted on the client machine. One other practical diculty with this type of approach is the need to support software versions of the security system for the various browsers and hardware/software platforms that exist. Within-browser security. Browsers such as Netscape and Internet Explorer provide a standard mechanism to enable addition of new plug-ins. These plug-ins extend the functionality ofthebrowser by providing code within the browser to deal with novel MIME types. [6] describes a prototype system for serving condential information using this technique. In this system the server provides an encrypted version of portions of the page to be served. When these sections are received by the authorized user's browser they are automatically decrypted and displayed within the browser. The system reported in [6] was implemented using a very straightforward cryptography system, but the approach is actually independent of the specic cryptography system used, and stronger cryptography mechanisms could be readily incorporated. As is the case with CCI-based systems, the within-browser approach requires plugins to be constructed and supported for dierent browsers and dierent hardware platforms. Unlike the CCI-based approach, the within-browser system does not require that the plaintext be available on the client except when displaying the data. Each of these dierent approaches provide dierent levels of security. SSL/S-HTTP provide very high levels of security in a relatively transparent manner. This level of security is justied for some transactions on the internet and the web, such as encoding nancial information, However, for private information requiring only a lower degree of security, or in cases where the above security systems are not readily available, it may be useful to adopt the approach considered here, of adding your own security features to existing web servers, using CCI and plugin mechanisms within the browsers. 2

3 1.1 Reasons to consider alternatives to SSL Although SSL is an eective standard and has been put to extensive use on the web for tasks such as credit card transactions where a single, powerful security standard is essential, it may nevertheless not be the most appropriate security mechanism in some other contexts. SSL encrypts the data stream at the socket layer. This permits potentially strong security { the entire data stream is protected. But all material, including material which does not need to be secure, is protected to the same level. It is not possible to selectively encrypt the stream or to choose dierent levels of security for dierent portions of the datastream. As encrypting/decrypting the datastream is not without cost, computational resources must be expended at the both the client and the server in order to process the data. In addition to computational costs SSL encryption leads to increased communication costs. Strong encryption tends to reduce the eectiveness of network compression schemes. Thus many modern communication systems which rely on compression to achieve throughput are disadvantaged. SSL and S-HTTP also require a web server willing to provide the service. (The web server must be either SSL or S-HTTP enabled.) This often requires that an information provider wishing to provide secure data must manage their own web server or to utilize a host which provides the appropriate secure mechanism. As this can be quite expensive, many commercial sites use one host for non-secure information and a smaller second secure host for secure transactions. This tends to complicate the design and maintenance of commercial web sites. 1.2 An alternative approach In [6], we described the design of a system which allows an information provider wanting to serve secret material over the web to do so via embedding encoded material within regular web pages. On the server, the embedded material is stored encrypted using a global password, and identied in HTML as being of a special MIME type, (which signals any authorized browser to use a privacy plugin provided for that MIME type to decrypt and display the material.) Using the single global password, authorized users fetch the provided pages and decrypt the embedded material using the privacy plugin. The detailed implementation of this mechanism is briey summarized below. In addition to the limitations described above concerning plugin-based security systems, the system described in [6] relied on a single global decryption password. This makes the global system open to attack, especially when the encrypted information is of a specic form. For example, in the implementation described in [6], the security plugin decrypted Macintosh PICT les. As these les have a standard format portions of the plaintext are known and this makes the encryption vulnerable to attack. In this paper we describe a similar system which provides an enhanced level of security while avoiding the practical problem of maintaining dierent implementations for different machines and architectures. Based upon the ideas introduced for CCI- and plugin-based systems, the system described here uses Java to provide a platform-independent decryption system. This Java-based security system provides security within the browser and hence avoids the potential security problems associated with transferring the plaintext outside of the browser, while requiring only a single version of the code be maintained. As Java code is used to render the decoded imagery or text, this approach also readily permits watermarking and content-specic data-compression to be performed. 2 Encryption via a Global Key This method (described in more detail in [6]) is intended to solve the problem of serving se- 3

4 The information provider generates pages with both plaintext HTML documents as well as encrypted les (secrets.) As the encryption is performed o-site, the ISP (Internet Service Provider) need not have access to the plaintext version of the material being served. Plaintext.pict Encryption process Encrypted.pict Plaintext.html Figure 1: Site setup http server cret information embedded within regular web pages (prepared by the information provider) in such a way that it can be readily obtained only by users in possession of the secret global key. The process of serving pages with encrypted embedded regions involves two main phases; (i) the setup of the site and distribution of keys to authorized users, and (ii) serving the encrypted pages to the authorized user community. The information provider (as opposed to the ISP) generates the les that make up the web site. This site may include both plaintext and encrypted material on the same HTML page (Figure 1). The encryption process uses any appropriate standard encryption algorithm. (Our demonstration implementation uses a public domain version of the Unix crypt command, but many other cryptographic techniques could be used instead.) This encryption process can take place anywhere, and in particular it can take place on a dierent machine than the HTTP server (ISP) machine. In this case plaintext versions of the encrypted les need never exist on the HTTP machine and thus the material is hidden from the server's machine. In the most straightforward implementation all of the encrypted les on the site are encrypted with the same global password. For simplicity imagine that the information to be served consists of private images contained on otherwise plaintext pages. The images are stored on the server only as encrypted crypto-pict les (where crypto-pict is a new MIME data-type). The information provider then distributes the global key to the authorized user community. In the system described in [6], each user augments their web browser (the sample implementation uses Netscape Navigator) with a plugin. This plugin allows for the transparent decryption of the encrypted images provided by the server. The user's browser is congured to recognize the new MIME-type of the encrypted images and to assign the interpretation of this type to the plugin. It is instructive to note that the approach described in [6] to decrypt and display the data oers a number of advantages over CCI or helper-application based approaches. The datastream never leaves the browser so the encrypted data is not open to straightforward attacks on the server or on the client. It is also possible to avoid the browser's normal caching mechanism by having the plugin acquire the datastream directly rather than relying on the browser's standard mechanisms for le transfer. (This avoids attacks based on obtaining a copy of the encrypted datastream from the copy maintained in the browser's cache.) A more recent implementation of the method in [6] uses a Java applet to decrypt and display the encrypted portions of pages rather than relying on the plugin mechanism. As Java applets are platform-independent and can be written to be browser-independent, a Java-based implementation oers a number of advantages over the plugin-based implementation described in [6]. Only a single version of the software needs to be written (the applet is platform and browser independent) and the applet interface mechanism is much more stable than the interface mechanism available 4

5 Client request_page(user,page) Process page Decrypt embedded security document request encrypted page Server validate user encrypt secure page components with users key Figure 2: Per-user encryption information ow to browser plugins. Finally, it is more dicult to formulate attacks on the plugin itself as the Java applet-based decrypter bytecode is loaded from the host machine directly rather than having to be installed by the user as is the case with the plugin-based implementation. 3 Individual (per-user) Keys An apparent limitation of the global key approach is that a single encryption key exists and loss of this key opens up the entire encrypted database to unauthorized use. In order to provide a higher level of security, but still to provide a level of security and complexity below that available and required with SSL and S-HTTP, we generalize the global key approach by assigning to each user their own decoding key and then augmenting the HTTP server through CGI (Common Gateway Interface) programs on the server. The information ow for this approach issketched in Figure 2. Requests for non-secret information to the server are processed in the normal fashion through the regular HTTP mechanism. Requests for pages with encrypted material can best be described by an example. Figure 3 shows the HTML source for a page within which a secret (encrypted) image is placed. The page is stored as plaintext on the server. The browser obtains the page through the normal HTTP mechanism and then displays the <HTML> <HEAD> <TITLE>Crypter</TITLE> </HEAD> <BODY> <script Language="JavaScript"> document.writeln("<h1> Sample document with encrypted component</h1>"); document.writeln("the following image must be decrypted"); document.writeln("<hr>"); document.writeln("<applet archive=\"decoder.jar\" code=\"decoder.class\" width=200 height=100>"); document.writeln("<param name=image value=\"encrypted.gif\">"); document.writeln("<param name=userid value=\"" + prompt("enter user name") + "\">"); document.writeln("<param name=decoder value=\"" + prompt("enter decoder key") + "\">"); document.writeln("</applet>"); document.writeln("<hr>"); </script> </body> </html> Figure 3: Sample HTML code to interface the Java decrypter with the server page. The page itself contains JavaScript segments which generate HTML source which are customized to contain the user's name and decryption key. In the example presented here the user is prompted for this information at run time, but more sophisticated methods for storing this information at the client are possible including mechanisms such as Cookies and other persistent browser objects. The generated page contains a Java applet which is passed as parameters the user's name and decryption key. The Decoder applet is passed sucient information (the image and userid) to be able to construct a HTTP request for the appropriate encoded document. This request is formulated as a CGI request to the server. The CGI program will receive as arguments su- 5

6 cient user identication information (userid) to encrypt the document for the specic user along with the name of the document (image) to be served. The CGI application veries the user name and determines the user's encryption key. The document to be encoded is then encrypted with the per-user key and the encrypted document transmitted to the Java applet. The sensitive information is then decrypted and displayed by the Java applet using the method described above. As is the case in the CCI-based system described in [11], one mechanism for having the client communicate the user's name to the server is to use a public-key system such as PGP. In this case, along with an optional user name, the client may provide the public encryption key for this user. Indeed it would be possible to use a dierent public encryption key (and corresponding private decryption key) for each encrypted document to be transmitted to the client. The secret information can also be maintained in an encrypted form on the server. As requests are received the data would be rst decoded by the CGI application (using the local server decryption key) and then re-encoded with the user's key. An alternative would be not to decrypt the version of the document stored on the server, but rather to encrypt the already-encrypted version of the document for a second time and then to transmit the result. In this case the plaintext version of the document would not necessarily exist on the server's machine. The user would be responsible for doubly decrypting the document; once with the user's key and once with the global decryption key. The advantage in not maintaining a plaintext version of the database on the server is that the plaintext documents are not available for perusal even by attackers with privileged access to the client machine. As in the case with the global key approach, we do not consider here the task of key distribution and assume that this is dealt with through some alternative, secure communications stream. For each user an encryption key known to the server and decryption key known to the user must be held. It is easy to see that this system is compatible with various publickey crypto-systems such as PGP (where the user encryption key can be a user's public key) as well as private-key approaches such as the Unix Crypt command. In the case that key distribution can take place oine, i.e. through a medium other than the World Wide Web, unencoded secret information need not appear anywhere except within the decoder plugin on the user's machine. 4 Watermarking No matter how secure the system for the transmission of data is, there is always the possibility that the data will be obtained fraudulently. In order to aid in later prosecution or to assist in determining where the security breach has occurred, it is important that the decoded document be marked with information identifying the decoder, so that it can be traced back should it be later discovered in unauthorized hands. (Clearly such watermarking could include other information available to the decrypting mechanism including the date of the decryption.) As each user has a unique decrypting key, and as the Java applet has control of the decrypting and rendering process, a straightforward technique would be to have the applet mark the rendered material in a way that uniquely identies the user who decrypted the document. If this mark is suciently well hidden and robust, then a user who copies the document will also copy information sucient to identify themselves as source of the security breach. Various techniques exit for watermarking an image so that it can be later identied. (See [1] and [3] for specic technique and [8] for an analysis of dierent attacks on watermarking techniques.) The most eective of these watermarking techniques involve per- 6

7 muting the base image in such a way that even a small portion of a watermarked version of the image can be used to identify the watermark. Watermarking can be added to the decryption system in one of two ways, either at the browser-level or at the level of the CGI. Browser-based watermarking It is straightforward for the Java applet to employ one of a number of dierent watermarking strategies to uniquely mark the image. The only added complexity is that the Java drawing model does not provide ne control over the displayed colours within the applet. Thus watermarking strategies based on using the colourmap to encode the mark are not applicable. That being said, systems such as [1] can be easily adapted to the Java applet environment. CGI-based watermarking Rather than providing watermarking within the browser, the CGI-mechanism can be used to watermark the material before encrypting the material for transfer to the browser. As the CGI-based approach provides the watermarking on the server, more sophisticated, and hence computationally expensive, watermarking algorithms can be utilized. Watermarking at the CGI-level also ensures that the watermarking process cannot be defeated by an attack on the Java-based decryption process. One drawback with the CGI-based watermarking approach, however, is that it places an extra computational load on the server. 5 Discussion This paper describes a Java applet-based privacy scheme for le distribution on the world-wide web. This mechanism provides for the encryption of data within a web page and for decryption of this information within the user's browser. Each user is assigned a unique decoding key, and pages are encrypted via a CGI program executing on the server. The mechanism requires little modication to a standard web browser or HTTP server. The browser is augmented through the addition of a decoding Java-applet, and the server is augmented through the addition of a simple CGI program which encrypts requested secrets with the appropriate encoding key. As the encryption process takes place on the server on a per-user basis, it is possible to assign dierent encryption algorithms to dierent users, and even to the same user for different materials or at dierent times, although the negotiation process for the preferred encryption algorithm must be quite simple given the limited communication that takes place between the client and server. One mechanism would be to have the client and server agree an the mechanism at the time of key transfer. Note that SSL and S-HTTP provide much more sophisticated negotiation strategies for encryption algorithm negotiation. Another potential extension over the globalkey approach involves the watermarking process. In [6] watermarking is performed at the client level within the plugin. As the encryption process here takes place on the server, it would be possible to perform the watermarking here as well. This provides a greater range of watermarking strategies as (i) the code to perform the watermarking does not have tot within the memory limits of the browser/client, and (ii) the watermarking code is not distributed to users via distribution of the plugin. Although the per-user key process discussed here provides somewhat more security than a single global key, it does requires more overhead and is not without cost. The service provider must permit the execution of CGI programs; and unless some kind of double encryption technique is used, (e.g. where the secret information to be served is stored in an encrypted format and then decrypted before encrypting with the user's encoding key) plaintext versions of the documents would be visible 7

8 to the service provider. The main execution-time cost incurred on the server running the CGI script is due to the use of the encryption function. This cost depends on the complexity of the encryption function used. For example the Unix crypt algorithm, for which public-domain implementations are available, can be implemented very eciently to run as a CGI program. On the client machine, the main additional cost (over that of a regular web page access) is for decryption. Because simpler decryption algorithms may be selected, and only some parts of the the datastream may require decryption, this approach can compare favourably with methods using full datastream encryption, such as SSL. Acknowledgments The authors acknowledge the nancial support of NSERC Canada. References [1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical report, NEC Research Institute, Technical Report [5] S. Garnkel and G. Spaord. Web Security & Commerce. O'Reilly & Associates, Inc., Cambridge, MA, [6] M. Jenkin and P. W. Dymond. A pluginbased privacy scheme for world-wide-web le distribution. In HICCS-97, Hawaii, [7] Netscape Inc. Secure sockets layer. /assist/security /index.html, [8] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proc. 2nd Workshop on information hiding, Portland, Oregon, [9] E. Rescorla and A. Schiman. The secure hypertext transfer protocol. Internet-draft draft-ietf-wts-shttp.01.txt, [10] \Ryan". defeating. http. access. control. edu. 2600: The Hacker Querterly, pages 40{43, [11] J. D. Weeks, A. Cain, and B. Sanderson. Cci-based web security: a design using pgp. In World-wide Web Journal: The 4th Int. Word Wide Web conference. O'Reilly and Associates Inc., [2] J. Benaloh et al.. Private communication technology protocol. http: // /windows/ ie/ pct.htm, [3] J. Fridrich, A. C. Baldoza, and R. Simard. Robust digital watermakring based on key-dependent basis functions. In Proc. 2nd Workshop on information hiding, Portland, Oregon, [4] S. Garnkel. PGP: Pretty Good Privacy. O'Reilly & Associates, Inc., Cambridge, MA,

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

WebGroup: a secure group access control tool for the World-Wide Web

WebGroup: a secure group access control tool for the World-Wide Web IEEE Seventh International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 98, June 17-19, 1998, Stanford University, California, USA, pp. 301 305. IEEE Computer

More information

Web site Image database. Web site Video database. Web server. Meta-server Meta-search Agent. Meta-DB. Video query. Text query. Web client.

Web site Image database. Web site Video database. Web server. Meta-server Meta-search Agent. Meta-DB. Video query. Text query. Web client. (Published in WebNet 97: World Conference of the WWW, Internet and Intranet, Toronto, Canada, Octobor, 1997) WebView: A Multimedia Database Resource Integration and Search System over Web Deepak Murthy

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

GSS-REST, a Proposed Method for HTTP Application-Layer Authentication

GSS-REST, a Proposed Method for HTTP Application-Layer Authentication GSS-REST, a Proposed Method for HTTP Application-Layer Authentication nico@cryptonector.com April 27, 2011 Abstract Applications often require context-specic authentication decisions, particularly HTTP

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

A Revocable Backup System

A Revocable Backup System The following paper was originally published in the Proceedings of the Sixth USENIX UNIX Security Symposium San Jose, California, July 1996. A Revocable Backup System Dan Boneh and Richard Lipton Princeton

More information

The World Wide Web. Internet

The World Wide Web. Internet The World Wide Web Relies on the Internet: LAN (Local Area Network) connected via e.g., Ethernet (physical address: 00-B0-D0-3E-51-BC) IP (Internet Protocol) for bridging separate physical networks (IP

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption

More information

E-Commerce/Web Security

E-Commerce/Web Security E-Commerce/Web Security Prepared For: Software Engineering 4C03 Kartik Sivaramakrishnan McMaster University 2005 Prepared by James Allin 9902847 1.0 - Introduction... 3 2.0 - E-Commerce Transaction Overview...

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Generic Extensions of WWW Browsers. Ralf Hauser Michael Steiner. Information Technology Solutions Department, IBM Research Division

Generic Extensions of WWW Browsers. Ralf Hauser Michael Steiner. Information Technology Solutions Department, IBM Research Division Generic Extensions of WWW Browsers Ralf Hauser Michael Steiner Information Technology Solutions Department, IBM Research Division Zurich Research Laboratory, CH-8803 Ruschlikon, Switzerland tel: +41.1.724-8426,

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Presented by: Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis

Presented by: Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis 2 nd Assignment of Comm. Sys. & Computer N.W Department of Information Technology, Institute of Graduate Studies and Research, University of Alexandria, Egypt. Presented by: Ahmed Atef Elnaggar Supervisor:

More information

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS. Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Outline. Web browsers & Web servers

Outline. Web browsers & Web servers Web browsers & Web servers 1 Outline Goals and Objectives Topics headlines Introduction Finding a web page Browser Tasks Top browsers Browser window structure Internet Explorer Netscape / Mozilla Opera

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market (Apache has 70%; IIS has 20%) Both major servers have lots

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary INTERNET ENGINEERING HTTP Protocol Sadegh Aliakbary Agenda HTTP Protocol HTTP Methods HTTP Request and Response State in HTTP Internet Engineering 2 HTTP HTTP Hyper-Text Transfer Protocol (HTTP) The fundamental

More information

Network Encryption Methods

Network Encryption Methods Network Encryption Network Encryption Methods CSC362, Information Security Objectives understanding the impact of employing encryption at different protocol layers application layer encryption transport

More information

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17,   ISSN International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, www.ijcea.com ISSN 2321-3469 DYNAMIC SELECTION OF ALGORITHM TO IMPROVE SECURITY Amit Jain 1 1 Computer Science

More information

Architecture. Steven M. Bellovin October 31,

Architecture. Steven M. Bellovin October 31, Architecture Steven M. Bellovin October 31, 2016 1 Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

CS321: Computer Networks FTP, TELNET, SSH

CS321: Computer Networks FTP, TELNET, SSH CS321: Computer Networks FTP, TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in FTP File Transfer Protocol (FTP) is the standard protocol provided

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache has 49%; IIS has 36% (source: http://news.netcraft.com/archives/2008/09/30/

More information

HTTP Protocol and Server-Side Basics

HTTP Protocol and Server-Side Basics HTTP Protocol and Server-Side Basics Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming HTTP Protocol and Server-Side Basics Slide 1/26 Outline The HTTP protocol Environment Variables

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Covert Distributed Computing Using Java Through Web Spoofing

Covert Distributed Computing Using Java Through Web Spoofing University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1998 Covert Distributed Computing Using Java Through Web Spoofing J. Horton

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

Pass, No Record: An Android Password Manager

Pass, No Record: An Android Password Manager Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server

More information

Global Servers. The new masters

Global Servers. The new masters Global Servers The new masters Course so far General OS principles processes, threads, memory management OS support for networking Protocol stacks TCP/IP, Novell Netware Socket programming RPC - (NFS),

More information

Users Guide. Kerio Technologies

Users Guide. Kerio Technologies Users Guide Kerio Technologies C 1997-2006 Kerio Technologies. All rights reserved. Release Date: June 8, 2006 This guide provides detailed description on Kerio WebSTAR 5, version 5.4. Any additional modifications

More information

Network Working Group Request for Comments: 1984 Category: Informational August 1996

Network Working Group Request for Comments: 1984 Category: Informational August 1996 Network Working Group IAB Request for Comments: 1984 IESG Category: Informational August 1996 IAB and IESG Statement on Cryptographic Technology and the Internet Status of This Memo This memo provides

More information

gateways to order processing in electronic commerce. In fact, the generic Web page access can be considered as a special type of CGIs that are built i

gateways to order processing in electronic commerce. In fact, the generic Web page access can be considered as a special type of CGIs that are built i High-Performance Common Gateway Interface Invocation Ganesh Venkitachalam Tzi-cker Chiueh Computer Science Department State University of New York at Stony Brook Stony Brook, NY 11794-4400 fganesh, chiuehg@cs.sunysb.edu

More information

Secure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB. Abstract

Secure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB. Abstract Secure Internet Commerce -- Design and Implementation of the Security Architecture of Security First Network Bank, FSB. Nicolas Hammond NJH Security Consulting, Inc. 211 East Wesley Road Atlanta, GA 30305-3774

More information

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital

More information

Public Key Infrastructure. What can it do for you?

Public Key Infrastructure. What can it do for you? Public Key Infrastructure What can it do for you? What is PKI? Centrally-managed cryptography, for: Encryption Authentication Automatic negotiation Native support in most modern Operating Systems Allows

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

Webbed Documents 1- Malcolm Graham and Andrew Surray. Abstract. The Problem and What We ve Already Tried

Webbed Documents 1- Malcolm Graham and Andrew Surray. Abstract. The Problem and What We ve Already Tried Webbed Documents 1- Malcolm Graham and Andrew Surray WriteDoc Inc. Northern Telecom malcolm@writedoc.com surray@bnr.ca Abstract This paper describes the work currently being done within Northern Telecom

More information

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Determine relevance of

More information

To find a quick and easy route to web-enable

To find a quick and easy route to web-enable BY JIM LEINBACH This article, the first in a two-part series, examines IBM s CICS Web Support (CWS) and provides one software developer s perspective on the strengths of CWS, the challenges his site encountered

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts File services Domains, DNS 1 DHCP Server Scripts Intranet and Extranets Web services HNC COMPUTING - Network Concepts A domain is a logical grouping of networked computers that share a central directory

More information

ConnectUPS-X / -BD /-E How to use and install SSL, SSH

ConnectUPS-X / -BD /-E How to use and install SSL, SSH ConnectUPS-X /-BD /-E product family Root CA Certificate installation Rev. B Page 1/16 Index 1. How to use and install SSL (Secure Socket Layer)...3 1.1. General Certificate warning message if not installed...3

More information

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Lecture Overview IN5290 Ethical Hacking Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Summary - how web sites work HTTP protocol Client side server side actions Accessing

More information

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification

More information

Configuring the CSS for Device Management

Configuring the CSS for Device Management CHAPTER 2 Configuring the CSS for Device Management Before you can use the WebNS Device Management user interface software, you need to perform the tasks described in the following sections: WebNS Device

More information

Software Elements of Electronic Business Sites

Software Elements of Electronic Business Sites Software Elements of Electronic Business Sites Daniel A. Menascé, Ph. D. www.cs.gmu.edu/faculty/menasce.html 1 Implementation Options Client Server Client-side: client-side scripts Java applets Server-side:

More information

CS2 Advanced Programming in Java note 8

CS2 Advanced Programming in Java note 8 CS2 Advanced Programming in Java note 8 Java and the Internet One of the reasons Java is so popular is because of the exciting possibilities it offers for exploiting the power of the Internet. On the one

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

Client 2. Authentication 5

Client 2. Authentication 5 Pipeline Pilot Web Port Support Guide April 2011 Contents Requirements 2 Requirements 2 Server 2 Client 2 Web Port Access 3 Authentication 5 Introduction Pipeline Pilot Web Port is a web-based application

More information

Systems Analysis and Design in a Changing World, Fourth Edition

Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements

More information

Outline. Computer Science 331. Information Hiding. What This Lecture is About. Data Structures, Abstract Data Types, and Their Implementations

Outline. Computer Science 331. Information Hiding. What This Lecture is About. Data Structures, Abstract Data Types, and Their Implementations Outline Computer Science 331 Data Structures, Abstract Data Types, and Their Implementations Mike Jacobson 1 Overview 2 ADTs as Interfaces Department of Computer Science University of Calgary Lecture #8

More information

CHAPTER 7 WEB SERVERS AND WEB BROWSERS

CHAPTER 7 WEB SERVERS AND WEB BROWSERS CHAPTER 7 WEB SERVERS AND WEB BROWSERS Browser INTRODUCTION A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

World Wide Web. Hypertext

World Wide Web. Hypertext World Wide Web HTTP, HTTPS SSL, TLS URL, Hypertext WWW s and Browsers Proxy, Plugin, Cookie Hypertext The WWW implementation of documents which include hyperlinks referencing other documents on the system.

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Hypertext Transport Protocol

Hypertext Transport Protocol Hypertext Transport Protocol HTTP Hypertext Transport Protocol Language of the Web protocol used for communication between web browsers and web servers TCP port 80 HTTP - URLs URL Uniform Resource Locator

More information

Access Gateway 9.3, Enterprise Edition

Access Gateway 9.3, Enterprise Edition Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

CSC 5930/9010 Cloud S & P: Cloud Primitives

CSC 5930/9010 Cloud S & P: Cloud Primitives CSC 5930/9010 Cloud S & P: Cloud Primitives Professor Henry Carter Spring 2017 Methodology Section This is the most important technical portion of a research paper Methodology sections differ widely depending

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Security Assertions Markup Language

Security Assertions Markup Language . Send comments to: Phillip Hallam-Baker, Senior Author 401 Edgewater Place, Suite 280 Wakefield MA 01880 Tel 781 245 6996 x227 Email: pbaker@verisign.com Security Assertions Markup Language Straw-man

More information

Transaction Security Challenges & Solutions

Transaction Security Challenges & Solutions Transaction Security Challenges & Solutions A REPORT FROM NEWNET COMMUNICATION TECHNOLOGIES, LLC Copyright NewNet Communication Technologies, LLC. 700 East Butterfield Road, Suite 350, Lombard, IL 60148

More information

Pluggable Transports Roadmap

Pluggable Transports Roadmap Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis steven.murdoch@cl.cam.ac.uk,asn@torproject.org Tor Tech Report 2012-03-003 March 17, 2012 Abstract Of the currently available pluggable

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

SSL/TLS. How to send your credit card number securely over the internet

SSL/TLS. How to send your credit card number securely over the internet SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying

More information

LivePoplet: Technology That Enables Mashup of Existing Applications

LivePoplet: Technology That Enables Mashup of Existing Applications LivePoplet: Technology That Enables Mashup of Existing Applications Akihiko Matsuo Kenji Oki Akio Shimono (Manuscript received January 29, 2009) We have developed LivePoplet, a technology that allows the

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers

More information

1-7 Attacks on Cryptosystems

1-7 Attacks on Cryptosystems 1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Introduction to SSL. Copyright 2005 by Sericon Technology Inc. Introduction to SSL The cornerstone of e-commerce is a Web site s ability to prevent eavesdropping on data transmitted to and from its site. Without this, consumers would justifiably be afraid to enter

More information

CS 0478 Topic 1.2. only. From sender to receiver. directions simultaneously. data can be sent from A to B and from B to A along the same line

CS 0478 Topic 1.2. only. From sender to receiver. directions simultaneously. data can be sent from A to B and from B to A along the same line Communication and Internet Technologies:- When data is sent from one device to another, it is important to consider how that data is transmitted. It is also important to ensure that the data hasn t been

More information

Analytics, Insights, Cookies, and the Disappearing Privacy

Analytics, Insights, Cookies, and the Disappearing Privacy Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 20 th November 2017 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Symbolic Links 4. Deploy A Firewall 5

Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Symbolic Links 4. Deploy A Firewall 5 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Symbolic Links 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical

More information

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes

More information