SEB GATEWAY Customer to bank online integration. specification v1.04
|
|
- Alexia Marshall
- 6 years ago
- Views:
Transcription
1 SEB GATEWAY Customer to bank online integration specification v1.04
2 Document versions Version Date Comments Initial version of the document Added part about supported qualified certificates, text clarifications (P.Kriščiūnas) Updated Security section. Added links to online specifications. Other small text changes. (A. Chmelevskis) Updated Figure 1. (A. Chmelevskis) Updated Section 3 Validation of SignableDocument type document. Added XML field name which must be signed. (A. Chmelevskis) Version / 9
3 Content 1. Introduction Security Validation of SignableDocument type document Interface specification SEB Gateway client s web services Functions and parameters SEB bank s web services Functions and parameters Container Message data formats Summary of SEB Gateway standards and patterns Additional documents... 9 Version / 9
4 1. Introduction SEB Gateway service is used to exchange data/financial messages between IT Systems of the Company and SEB bank. This document contains technical description of the service: technology used, available services, procedures, data format. This document is to be used by external users, i.e. enterprises (further referred to as the SEB Gateway client) willing to integrate their and SEB bank s IT systems. Web services will be used to exchange data between SEB and the SEB Gateway client. Web services are available on SEB s server and also on the SEB Gateway client s server. When sending data to SEB, the SEB Gateway client will use SEB's web service. When sending data to the SEB Gateway client, SEB will use the client s web service. In this data exchange scheme, the active party is the one which is sending data. Secure, encoded connection channel COMPANY B2B interface Notification Account Balance Payments Account balance request B2B interface Payment processing report Statement Bank s IS Company s ERP Version / 9
5 2. Security The system security between SEB and the SEB Gateway client is ensured by HTTP communication protocol via a dedicated VPN (Virtual Private Network) connection. Communication and data transfer security is ensured by SSL certificates and web services security standards. Message exchange security uses: data integrity pattern to verify that a message has not changed in transit; data origin authentication pattern to identify and validate the origin of a message; data confidentiality pattern to encrypt message data so that unauthorized entities cannot view the contents of the message. In all cases asymmetric cryptography is used. With asymmetric cryptography (also known as public key cryptography), the sender encrypts data with one key, and the recipient uses a different key to decrypt cipher text. The encryption key and its matching decryption key are often referred to as a public/private key pair. Figure 1: Message exchange security More information about Web Service Security Patterns can be found here Version / 9
6 3. Validation of SignableDocument type document Payment initiation orders sent from the SEB Gateway client to SEB Bank must be signed with at least one (although multiple are supported) qualified certificates of the representatives of the SEB Gateway client. SignableDocument type document is to be used. The SignableDocument type document contains the document section (element Document) and signature section (element Signature). The document section contains pain type document, which is validated using specific scheme (XSD files will be provided to the SEB Gateway client). The signature section contains one or more digital signatures, which are formed according to the XAdES-BES standard. More information about XAdES-BES standard can be found here 2 and here 3. Signatures are formed by generating required digests from document section of the SignableDocument type document and performing other signature-related actions, which enable to identify which part of the document, was signed. Currently SEB bank is prepared to validate digital signatures created with qualified certificates of the following Certificate Authorities: CA Resident Register Service under the Ministry of Interior of the Republic of Lithuania ( Secure Signature Creation Device example Lithuanian national identity cards VĮ Registrų centras ( Crypto USB key Smartcard Version / 9
7 4. Interface specification All WSDL files will be provided to the SEB Gateway client SEB Gateway client s web services WSDL file lba-unifi-cashmanagement-customer-v01.wsdl lba-unifi-paymentsinitiation-customer-v01.wsdl Functions and parameters SEB Bank may call these functions: banktocustomerstatementv02 banktocustomerdebitcreditnotificationv02 customerpaymentstatusreportv03 Function description and parameters: Function Parameters Input Output Description lba-unifi-cashmanagement-customer-v01.wsdl banktocustomerstatement V02 banktocustomerdebitcredi tnotificationv02 document:iso.std.iso._ tech.xsd.camt_053_001.D ocument document:iso.std.iso._ tech.xsd.camt_054_001.D ocument lba-unifi-paymentsinitiation-customer-v01.wsdl Document passed: account statement Document passed: notification on account debit or credit transaction customerpaymentstatusre portv03 Document:iso.std.iso._ tech.xsd.pain_002_001.D ocument Document passed: payment status Version / 9
8 4.2. SEB bank s web services WSDL file lba-unifi-cashmanagement-bank-v01.wsdl lba-unifi-paymentsinitiation-bank-v01.wsdl Functions and parameters SEB Gateway client may call these service functions on the SEB bank side: customercredittransferinitiationv03 accountreportingrequestv02 Function description and parameters: Function Parameters Input Output Description lba-unifi-paymentsinitiation-bank-v01.wsdl customercredittransf erinitiationv03 document: lt.lba.xmlns._2011._01.u nifi.customercredittrans ferinitiation.v03.signabl edocumenttype lba-unifi-cashmanagement-bank-v01.wsdl iso.std.iso._20022.tech.x sd.pain_002_001.docum ent Document passed: payment order in xml format, signed with certificates. Response received: payment status document accountreportingreq uestv02 document:iso.std.iso._ tech.xsd.camt_06 0_001.Document iso.std.iso._20022.tech.x sd.camt_052_001.docu ment Document passed: request for account balance Response received: account balance xml 4.3. Container To ensure the security of data exchange via web services, ws-security standards will be used (detailed descriptions available here 4 ). Security policies are attached or detached in the WSDL file. 4 Version / 9
9 Each WSDL file on SEB bank side and the SEB Gateway client side will specify the security policy file, which describes security instruments used for data exchange between SEB bank and the SEB Gateway client. 5. Message data formats Message data formats are provided in the document ISO20022_formats_mapping_B2B.xls 6. Summary of SEB Gateway standards and patterns ISO20022 UNIFI XML WSDL 1.1 WS-Policy 1.2 WS-I Basic Profile 1.1 WS-I Basic Security Profile 1.1 WS-Address WS-Addressing Idempotency pattern 7. Additional documents Universal financial industry message (document) Web Services Definition Language Web Services Policy for formal contract establishment in relation to Non-Functional characteristics (i.e. Security, Asynchronous Intercommunication) Basic Profile for Web Service Definition Interoperability Basic Profile for Web Service Security Interoperability Web Services Signature and Encryption for message Security for Asynchronous intercommunication (i.e. safe resend of the same message) is used to establish reliability Additional documents will be provided by the bank to the SEB Gateway client: XML Schema Definition (XSD) files, Web Services Description Language (WSDL) files. Version / 9
Chapter 6: Security of higher layers. (network security)
Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationLesson 13 Securing Web Services (WS-Security, SAML)
Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element
More informationLecture III : Communication Security Mechanisms
Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security
More informationChapter 8 Web Security
Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client
More informationDatapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record
1 2 3 Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record 5 White boxes show the access points for different kinds of security. That s what we will
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationIBM i Version 7.2. Security Digital Certificate Manager IBM
IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
More informationWeb Services. File Transfer Service Description
Web Services File Transfer Service Description Contents 1 General... 2 1.1 Web Services... 2 1.2 Abbreviations and terms used in the service description... 2 2 Agreement on the use of the Web Services
More informationCPET 581 E-Commerce & Business Technologies. References
CPET 581 E-Commerce & Business Technologies The E-Commerce Security Part 2 of 2 Paul I-Hai Lin, Professor http://www.etcs.ipfw.edu/~lin A Specialty Course for M.S. in Technology IT/Advanced Computer Applications
More informationIBM Presentations: Implementing SSL Security in WebSphere Partner Gateway
IBM Software Group IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway Presenter: Max Terpolilli WPG L2 Support WebSphere Support Technical Exchange Agenda IBM Software Group Digital
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationPublic Key Infrastructure. What can it do for you?
Public Key Infrastructure What can it do for you? What is PKI? Centrally-managed cryptography, for: Encryption Authentication Automatic negotiation Native support in most modern Operating Systems Allows
More information2/24/2018. Computer Security CS433 Luai E. Hasnawi, PhD
Computer Security CS433 Luai E. Hasnawi, PhD lhasnawi@taibahu.edu.sa Bits (or characters) in a file are independent from each other. These elements has no binding. If one element is changed, it can go
More informationConfiguring SSL Security
CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationS/MIME Security Services
This chapter contains the following sections: Overview of, on page 1 in Email Security Appliance, on page 1 Signing, Encrypting, or Signing and Encrypting Outgoing Messages using S/MIME, on page 4 Verifying,
More informationS/MIME Security Services
This chapter contains the following sections: Overview of, page 1 in Email Security Appliance, page 1 Signing, Encrypting, or Signing and Encrypting Outgoing Messages using S/MIME, page 5 Verifying, Decrypting,
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationGetting to Grips with Public Key Infrastructure (PKI)
Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationkey distribution requirements for public key algorithms asymmetric (or public) key algorithms
topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems
More informationLotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4
Lotus Protector Mail Security and Mail Encryption Interop Guide Lotus Protector Interop Guide Mail Encryption 2.1.0.1 Mail Security 2.5.1 Version 1.4 Lotus Protector Mail Security and Mail Encryption Configuration
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationGlenda Whitbeck Global Computing Security Architect Spirit AeroSystems
Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher
More informationSEPA Credit Transfer Customer-to-Bank Implementation Guidelines for the Netherlands
SEPA Credit Transfer Customer-to-Bank Implementation Guidelines for the Netherlands Disclaimer These guidelines may be subject to changes. Utmost care has been taken to ensure the information in this publication
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationE-commerce security: SSL/TLS, SET and others. 4.2
E-commerce security: SSL/TLS, SET and others. 4.2 1 The need of authenticated payment SSL protects credit card details while they are transmitted through Internet but Why trust the Merchant? Once credit
More informationNetwork Security Essentials
Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of
More informationDRAFT COPY
Inter-Entity Payment Protocol (IPP) The Inter-Entity Payment Protocol (IPP) facilitates adhoc interactions between independent accounting systems on the web. It is a server-to-server protocol. 1 Brands,
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationAn Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach
An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on
More information1.264 Lecture 28. Cryptography: Asymmetric keys
1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationPublic Key Infrastructure
Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure
More informationSEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security
SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationCipherMail encryption. CipherMail white paper
CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More informationSecurity issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.
Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed
More informationE-Commerce/Web Security
E-Commerce/Web Security Prepared For: Software Engineering 4C03 Kartik Sivaramakrishnan McMaster University 2005 Prepared by James Allin 9902847 1.0 - Introduction... 3 2.0 - E-Commerce Transaction Overview...
More informationTelemetry Data Sharing Using S/MIME
Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More informationSSL/TSL EV Certificates
SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo
More informationIUID Registry Application Programming Interface (API) Version 5.6. Software User s Manual (SUM)
IUID Registry Application Programming Interface (API) Version 5.6 Software User s Manual (SUM) Document Version 1.0 May 28, 2014 Prepared by: CACI 50 N Laura Street Jacksonville FL 32202 Prepared for:
More informationSingle Sign-On. Introduction
Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationExam Name: IBM WebSphere Datapower SOA. Appliances Firmware V3.8.1, Solution Implementation
Vendor: IBM Exam Code: 000-609 Exam Name: IBM WebSphere Datapower SOA Appliances Firmware V3.8.1, Solution Implementation Version: DEMO 1. Which of the following is an advantage of using WS-Security instead
More informationSectigo Security Solution
Sectigo Email Security Solution 2018 Sectigo. All rights reserved. Email hacking is a commonly used malicious tactic in our increasingly connected world. Business email compromise (BEC), or email account
More informationCYBER SECURITY MADE SIMPLE
CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published
More informationA Signing Proxy for Web Services Security
A Signing Proxy for Web Services Security Dr. Ingo Melzer Prof. Mario Jeckle What is a Web Service? Web Service Directory Description UDDI/WSIL WSDL Transport Content Infrastructure SOAP XML Web Service
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationSecurity: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationP2P Instructions. 4. Select Person to Person
P2P Instructions 1. To utilize P2P, you need to first be enrolled in digital banking. Sign up at www.ucbankmn.com or enroll directly through our mobile app. (To learn more about digital banking see https://www.ucbankmn.com/eservices/online-banking.)
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationSMart esolutions Information Security
Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart
More informationUCS Manager Communication Services
Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication
More informationService Description XML Account Reporting
Service Description XML Account Reporting 6.10.2016 Table of Contents 1 XML account reporting... 3 1.1 General... 3 1.2 XML account reporting services... 3 1.2.1 XML balance query (camt.052)... 3 1.2.2
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationIntroduction. Ahmet Burak Can Hacettepe University. Information Security
Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,
More informationIBM Systems and Technology Group
IBM Systems and Technology Group Encryption Facility for z/os Update Steven R. Hart srhart@us.ibm.com 2013 IBM Corporation Topics Encryption Facility for z/os EF OpenPGP Support X.509 vs. OpenPGP Certificates
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationEnterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape
Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG
Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,
More informationTestpassport.
Testpassport http://www.testpassport.cn Exam : 000-609 Title : IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Version : Demo 1 / 15 1. Which of the following is an advantage of using WS-Security
More informationBank of Hawaii Protecting Confidential . What's in this User Guide
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, and financial information. By default, emails are sent
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationProgramming Web Services in Java
Programming Web Services in Java Description Audience This course teaches students how to program Web Services in Java, including using SOAP, WSDL and UDDI. Developers and other people interested in learning
More informationKey Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) April 2 nd, 2009 1 Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases 2 The Need for Interoperable
More informationSSL, Credit Card Transactions. CS174 Chris Pollett Nov. 5, 2007.
SSL, Credit Card Transactions CS174 Chris Pollett Nov. 5, 2007. Outline HTTPS and the Secure Socket Layer Credit Card Transactions HTTPS and the Secure Socket Layer When we use HTTP to browse the web,
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : TB0-107 Title : Tibco BusinessWorks 5 Exam Vendors : Tibco Version : DEMO
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : TB0-107 Title : Tibco BusinessWorks 5 Exam Version : DEMO 1 / 6 1. What is the benefit of TIBCO BusinessWorks Process Engines using HTTP(S) for run-time initialization? A. The TIBCO
More informationCPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:
CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME: There are 6 questions on this quiz. Each question is individually weighted. If you do not understand the question, please ask for clarification. 1 I. (24
More informationCirius Secure Messaging Single Sign-On
Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationITdumpsFree. Get free valid exam dumps and pass your exam test with confidence
ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : 000-609 Title : IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Vendors : IBM
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationApplication of Cryptography in.net Framework
Application of Cryptography in.net Framework Paul Lo Software Engineer in Cyberwisdom.net M.Math(CS), MCSD..net Overview Basic Cryptography CryptoAPI enhancement in.net AES support in.net XML Signature
More informationCISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION
CUSTOMER TESTIMONIAL CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION EXECUTIVE SUMMARY Visionary Technology Provides New Model for Application Infrastructure Services
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationQUANTUM SAFE PKI TRANSITIONS
QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver
More informationSSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1
SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm
More informationCertificate service General description Implementation project of a national Incomes Register
Version 1.0 Certificate service General description Implementation project of a national Incomes Register Version history Version Date Description 1.0 30.10.2017 Document published. CONTENTS 1 Foreword...
More informationIntroduction to Electronic Identity Documents
Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional
More informationCryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent
More informationImplementing Secure Socket Layer
This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client
More informationComputer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography
Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution
More informationP02439 Business Service Delivery. Non-Functional Requirements, Service Characteristics and Policies
Project P02439 Business Service Delivery Version 1.1 Non-Functional Requirements, Service Characteristics and Policies Date: [18/10/07] Table of Contents 1 INTRODUCTION... 3 2 SERVICE CHARACTERISTICS...
More informationRouting and security for remote labs for teaching and research (SRS-E-LABO)
Routing and security for remote labs for teaching and research (SRS-E-LABO) Alassane Diop Research Associate, Center for Research LICEF, TELUQ / UQAM, Montréal, Québec, Canada Abstract: In this paper,
More informationChapter 8 Information Technology
CRIM 2130 Introduction to Critical Infrastructure Protection Spring 2016 Chapter 8 Information Technology School of Criminology and Justice Studies University of Massachusetts Lowell Enterprise systems
More informationCryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology
Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems
More informationOVERVIEW OF ONLINE TRANSACTION FLOW
OVERVIEW OF ONLINE TRANSACTION FLOW POSSIBLE PROBLEMS FACED BY ONLINE SHOPPER USING CREDIT CARD FOR PAYMENT Scenario Stage Reasons Payment Status in ipay88 Report 1 I. Internet connection Online shopper
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More information