SlideShare uma empresa Scribd logo
1 de 79
Baixar para ler offline
Hackers
Crackers



            Script
           Kiddies


                        //By Mohamed R. Elabnody //
                             elabnody@msn.com
                              www.elabnody.net
      Actors
                                3rd May, 2012
Outline

    •   Introduction to Web Security
    •   Why Is Security So Important?
    •   Web Security Considerations
    •   Web Security Approaches
    •   Secure Socket Layer (SSL) and
        Transport Layer Security (TLS)
    •   Secure Electronic Transaction
        (SET)
    •   Recommended Reading
    •   Problems

2                             Web Security   www.elabnody.net
Key Points

    Secure socket layer (SSL) provides security services between TCP
       and applications that use TCP. The Internet standard version is called
       transport layer service (TLS).
          SSL/TLS provides confidentiality using symmetric
              encryption and message integrity using a message
              authentication code.


           SSL/TLS includes protocol mechanisms to enable two
              TCP users to determine the security mechanisms and
              services they will use.

    Secure electronic transaction (SET)
    is an open encryption and security specification designed to protect credit
        card transactions on the Internet.
3                               Web Security                          www.elabnody.net
Overview


    • Why Be Concerned about Web Security?
      – The increased use of the networks and the internet
        helps users finish many tasks quickly and efficiently
        and adds convenience to many people's lives.
        However, there is downside, as well. As more and
        more personal and business data is stored on
        computer networks, the risk and consequences of
        unauthorized computer access, theft, fraud, and
        other types of computer crime increase; so do the
        chances of data loss due to crime or employee
        misconduct.

4                         Web Security                   www.elabnody.net
Overview

    • Web security may easily be split into three specific areas:


       Client Access        • there is the client. This is the machine from which the
                              user requests a web page. By typing a URL a
                              connection between the client and server is made. The
       to Web Pages           server returns the document and the user browser
                              displays the document.


                            • the Web Server. This is where the entire web

             Server           pages and resources are held. Similarly, the web
                              server may host databases or act as a middleware
                              to back-end databases.


                            • the connection between the server and client needs

         Connection           to be considered. In very few circumstances this
                              connection will be conducted over a trusted or
                              value added network.


5                            Web Security                                               www.elabnody.net
Introduction

    •   Virtually all businesses, most government agencies, and many
        individuals now have Web sites. The number of individuals and
        companies with Internet access is expanding rapidly and all of
        these have graphical Web browsers. As a result, businesses are
        enthusiastic about setting up facilities on the Web for electronic
        commerce. But the reality is that the Internet and the Web are
        extremely vulnerable to compromises of various sorts. As
        businesses wake up to this reality, the demand for secure Web
        services grows.

                •   In this session, we begin with a discussion of the general
                    requirements for Web security and then focus on two standardized
                    schemes that are becoming increasingly important as part of Web
                    commerce: SSL/TLS and SET.


6                                       Web Security                         www.elabnody.net
Information Security
    at Work Awareness




7      Web Security        www.elabnody.net
Why Is Security So
                          Important?

    •   Stolen intellectual property
    •   System downtime
    •   Lost productivity
    •   Damage to business reputation
    •   Lost consumer confidence
    •   Severe financial losses due to lost revenue


8                       Web Security            www.elabnody.net
War on the Internet


    Oh, this is bad, but it is
      not our business, Who
      needs to get into war
      anyway
    We will only conduct our
      e-business
    That is it.



9                          Web Security   www.elabnody.net
Zone-H statistics

     • Why did you deface this website?




                   http://www.zone-h.org

10                      Web Security         www.elabnody.net
Who Are Attackers?

        Corporate
       Headquarters
                                                           External
                        Internet
                                                           Attacker




                              Unauthorized access: gaining access to
                              a computer, network, file, or other
     Internal
                              resource without permission; can be
     Attacker                 committed by
                                      Insiders      Outsiders

11                     Web Security                                    www.elabnody.net
Attacks

                    Organizational Attacks

     Common              Social Engineering

     Types of       Viruses, Trojan Horses, and Worm

      Attacks          Denial of Service (DoS)

                Accidental Breaches in Security




12                     Web Security                    www.elabnody.net
How Do Attacks Occur?

     Stages of        Examples of attacker actions
     attack
     Footprint        Runs a port scan on the firewall
     Scanning         Exploits an unpatched Web server
     Gaining Access   Creates an account with
                      administrator rights
     Maintaining      Uploads unlicensed software to the
     Access           Web server
     Cover-up         Erases the audit trail of the exploit

13                         Web Security                  www.elabnody.net
Common Types of Vulnerabilities

     Vulnerability            Examples
     Weak Passwords            Employees use blank or default passwords
     Unpatched software        Patches are not updated
                               Security hotfixes are not applied
     Miss configured           Services have more privileges than required
     Software                  Services run as the Local System account
     Social engineering        Help desk administrator resets a password
                              without verifying the identity of the caller
     Weak security on          Unused services and ports are not secured
     Internet Connections      Firewalls are used improperly
     Unencrypted data          Authentication packets are sent in clear text
     transfer                  Important data is sent over the Internet in clear
                              text
     Buffer overrun            A trusted process runs untrusted code
14                                 Web Security                               www.elabnody.net
Web Security
                         Considerations
     • The WEB is easily accessible worldwide.
       //more vulnerability//
     • Complex software hide many security
       flaws.
     • Users are not trained in computer security
       and are not aware of the risks.
     • A Web server can be exploited as a
       launching pad into a corporation’s entire
       computer complex.
15                     Web Security            www.elabnody.net
Information Security
      Threat Awareness




16        Web Security      www.elabnody.net
17   Web Security   www.elabnody.net
Web Security Approaches
 Encryption and Other Security Tools
Web Security Approaches

     • Web Security Threats …
                                            Integrity
                                         Confidentiality
                                        Denial of Service
                                         Authentication

19                       Web Security                   www.elabnody.net
Web Security Approaches


     • Web Security Threats
        – Integrity: modification of a web page, message traffic, or user
          data
        – Confidentiality: eavesdropping of web traffic
        – Denial of Service: bogus web requests, flooding web server
          memory or queue
        – Authentication: impersonation of legitimate users
        – Location of the threats
            • Web server
            • Web client
            • Network traffic



20                               Web Security                          www.elabnody.net
Web Security Approaches


     • Encryption: method of scrambling e-mail or files to
       make them unreadable

     • Secure Web servers: use encryption to protect
       information transmitted via their Web pages
        – Most common is SSL
        – Look for a locked padlock on the status bar and https://
          in the URL
        – Only transmit credit card numbers and other sensitive
          data via a secure Web server
21                            Web Security                      www.elabnody.net
Web Security Approaches




22      Web Security     www.elabnody.net
Web Security Approaches
                            Security facilities in the TCP/IP protocol stack
         Transparent                                                                  Application
         to end users                    Above TCP                                   Specific -SET
                                      Embedded in package




      illustrates this difference. One way to provide Web security is to use IP Security (Figure 1).
         The advantage of using IPSec is that it is transparent to end users and applications and
                 Figure 1. Relative Location of Security Facilities in the TCP/IP
     provides a general-purpose solution. Further, IPSec includes a filtering capability so that only
                                              Protocol Stack
                       selected traffic need incur the overhead of IPSec processing.
Cryptography and Network Security Principles and Practices, 4th Edition,              Page 531
23                                             Web Security                                www.elabnody.net
Secure Socket Layer (SSL)


     •   Implements three cryptographic assurances:


          Authentication   Confidentiality   Message integrity



     • Also provides secure key exchange between a
       browser (client) and server.
     • Provides security parameters negotiation.
     • Does not offer non-repudiation.
25                         Web Security                  www.elabnody.net
How Does SSL/TLS Work?




26         Web Security   www.elabnody.net
How Does SSL/TLS Work?

     – User browses to a secure Web server by
       using HTTPS
     – The browser generates a unique session
       key and encrypts it by using the Web
       server’s public key from its root certificate
     – The session key is received by the Web
       server and is decrypted by using the
       server's private key
     – After the connection has been established,
       all communication between the browser
       and Web server is secure




27                                      Web Security   www.elabnody.net
Secure Socket Layer (SSL)




     SSL Architecture:
     • SSL runs on the top of TCP to provide reliable and secure end-to-
       end service.
     • Consists of two layers




28                              Web Security                         www.elabnody.net
SSL Architecture


     • Depends on TCP for end-to-end reliability
     • Two layers of protocols:
       – SSL Record Protocol - basic security services
         to higher layers
       – Three higher layer protocols - used in the
         management of SSL exchanges




29                       Web Security               www.elabnody.net
SSL Architecture
                         Manages SSL Exchanges
The SSL
Record
Protocol           SSL    SSL change
                                      SSL alert
provides basic  Handshake cipher spec                                HTTP
                                       protocol
security         protocol   protocol
services to                                                                      Basic
various higher-            SSL record protocol                                   Security
layer                                                                            Services
protocols.
                                               TCP


                                                IP
                                Figure 2. SSL Protocol Stack

 Cryptography and Network Security Principles and Practices, 4th Edition,
30                                         Web Security                     Page 532
                                                                               www.elabnody.net
SSL Architecture


     • Two important SSL concepts:
       – Connection: peer-to-peer relationships in the transport
         layer. Every connection is associated with one session.
       – Session: An association between a client and a
         server created by the Handshake Protocol.
           • Define a set of cryptographic security parameters,
             which can be shared among multiple connections.
           • Avoid the expensive negotiation of new security
             parameters for each connection.


31                           Web Security                     www.elabnody.net
SSL Record Protocol


     • Provides two services for SSL
       Connections:
       1. Confidentiality: A shared secret key used for
          conventional encryption of SSL payload.
       2. Message Integrity: A shared secret key is
          used to construct a message authentication
          code.




32                       Web Security                www.elabnody.net
SSL Record Protocol
                                              Operation
                                               Message

                                                                                            Message Blocks

                                                              Optional


MAC: Message Authentication Code                   indicates the overall operation of the SSL Record Protocol. The
                                                   Record Protocol takes an application message to be transmitted,
                                                   fragments the data into manageable blocks, optionally
                                                   compresses the data, applies a MAC, encrypts, adds a header,
                                                   and transmits the resulting unit in a TCP segment. Received data
                                                   are decrypted, verified, decompressed, and reassembled and
                                                   then delivered to higher-level users.

                          Figure 3. SSL Record Protocol Operation
Cryptography and Network Security Principles and Practices, 4th Edition,                     Page 534
33                                           Web Security                                          www.elabnody.net
SSL Record Protocol


     • Record protocol takes an application
       message and performs the following
       operations:
       – Fragmentation: block 0f 16k bytes or less)
       – Compression: optional, must not increase
         content length beyond 1024 bytes
       – Add a MAC (a shared secret key is used)
       – Encryption (symmetric encryption)
       – Appends an SSL record header.

34                       Web Security                 www.elabnody.net
SSL Record Format

     •   The final step of SSL Record Protocol processing is to pretend a
         header, consisting of the following fields:
           – Content Type (8 bits): Used
             by higher layers to process
             the enclosed fragment.
           – Major Version (8 bits):
             Indicates the major version of
             SSL used.
           – Minor Version (8 bits):
             Indicates the minor version of
             SSL used.
           – Compressed length (16 bits):
             The length of fragment in
             bytes.
Cryptography and Network Security Principles and Practices, 4th Edition,   Page 535
35                                         Web Security                      www.elabnody.net
Handshake Protocol
      Message Types




36    Web Security    www.elabnody.net
Handshake Protocol

     •   The most complex part of
                                                   Phase 1
         SSL.
     •   Allows the server and client
         to
          – authenticate each other.
                                                   Phase 2
          – negotiate encryption, MAC
            algorithm and cryptographic
            keys.
                                                   Phase 3
     •   Used before any application
         data are transmitted.

                                                   Phase 4

37                               Web Security   www.elabnody.net
Handshake Protocol




38    Web Security    www.elabnody.net
Handshake Protocol


     • Authenticate each other and negotiate
       cryptographic parameters (encryption and
       MAC algorithms, cryptographic keys, …)
       – Phase 1: establish security capabilities
       – Phase 2: server authentication and key
         exchange
       – Phase 3: client authentication and key
         exchange
       – Phase 4: finish
39                        Web Security              www.elabnody.net
An SSL Session

     1. Negotiation of cryptographic
        parameters
       //Two computers probably don’t know each other’s
         capabilities.//

     2. Key Agreement.
       //C & S generate shared secret key.//

     3. Authentication (client authenticates
        server).
     4. Confidentiality and integrity.
       //private messages exchanged between C & S.//

40                           Web Security                 www.elabnody.net
https://ssl.trustwave.com/support/support-how-ssl-works.php
41                                        Web Security        www.elabnody.net
Hello and Negotiate
                                     Parameters

         •   Client sends server a plaintext message to suggest some
     1       parameters for conversation:

                        Version:
                            SSL 3.1 if you can, else SSL 3.0
                        Key Exchange:
                            RSA if you can, else Diffie-Hellman
                        Secret Key Cipher Method:
                            TripleDES if you can, else DES
                        Message Digest:
                            MD5 if you can, else SHA-1
                            Random #: 777,666,555
42                                  Web Security                   www.elabnody.net
Hello and Negotiate
                                      Parameters

         •   Server responds by its choice of parameters in a plaintext
     1       message:

                         Version:
                             SSL 3.1
                         Key Exchange:
                             RSA
                         Secret Key Cipher Method:
                             TripleDES
                         Message Digest:
                             SHA-1
                             Random #: 444,333,222

43                                  Web Security                      www.elabnody.net
Hello and Negotiate
                                   Parameters

         • After responding to the hello message, the server sends
     1     the client its digital certificate.
                   //A trusted CA signed this certificate.//




         • The client uses the trusted CA’s public key to decrypt
           the certificate and obtains server’s public key and
           verifies the server.
44                               Web Security                   www.elabnody.net
Key Agreement and Exchange

     • The client generates a               Client           Server
       48-byte random value                 DES secret Key DES secret Key
       (called pre-master                   Secret key for   Secret key for
       secret), encrypts it with            message          message
       server’s public RSA key,             integrity        integrity
       and sends it to server.
                                            Secret key to    Secret key to
     • The server decrypts this
                                            initialize the   initialize the
       message and generates
       six keys.                     2      cipher.          cipher.




45                           Web Security                          www.elabnody.net
Key Agreement and
                              Exchange

     • Generation of six shared secret keys:
        <> Random values exchanged.
        <> Pre-master secret.
        <> Pseudo-random function generator.                 2
        Example:
          PRF(pre-master secret, random1+ random2)
        Computed repeatedly.




46                          Web Security             www.elabnody.net
Authentication


     The client authenticates the server:
     • The clients sends the server a message that
       is encrypted with the generated secret keys.
        //called the “finished handshake” message//
     • The server responds with its own encrypted                    3
       finished handshake message.
       <> The clients is now convinced that it is
       communicating with right server.
        //pre-master secret could only be decrypted with the
           server’s private key.//



47                               Web Security                  www.elabnody.net
Authentication


     Does server need to authenticate the
       client?
        – In general yes, but in this situation it may
          not be necessary:
     • Reasons:                                                3
       1. It is not necessary because it will be
          done when the client gives his/her CC
          number.
       2. A client may not have information to
          authenticate itself to the server.
       3. It is time-consuming for server.
48                            Web Security               www.elabnody.net
Confidentiality and Integrity

                                                                  4
     • Client and server use the generated
       secret keys for confidential data
       transfer.
        <> The client uses its secret key to generate
           a HMAC for the message.
        <> The client encrypts message data + HMAC
           with its secret key and sends it to server.
        <> The server decrypts the received
           message with its secret key.
        <> The server checks the integrity of the
           message using HMAC.
49                            Web Security               www.elabnody.net
What is HTTPS




50   Web Security      www.elabnody.net
Secure Electronic Transactions
Secure Electronic
                                            Transactions

           •     An open encryption and security specification.
           •     Designed to protect credit card transaction on the Internet.
           •     Companies involved:
                  – MasterCard, Visa, IBM, Microsoft, Netscape, RSA,
                    Terisa and Verisign
           •     Not a payment system.
           •     Set of security protocols and formats
                 (enables users to employ existing CC payment infrastructure
                 securely in an open environment).


     RSA       Rivest-Shamir-Adelman
     CC        Common Criteria

52                                        Web Security                         www.elabnody.net
SET Services


     • Provides three services:
       1. Provides a secure communication channel
          among all parties involved in a transaction.
       2. Provides trust by the use of X.509v3 digital
          certificates.
       3. Ensures privacy: information is only available
          to involved parties.




53                        Web Security                www.elabnody.net
SET Overview


     • Key Features of SET:
        –   Confidentiality of information
        –   Integrity of data
        –   Cardholder account authentication
        –   Merchant authentication




54                             Web Security      www.elabnody.net
SET Participants




55   Web Security       www.elabnody.net
Sequence of events for
                                  transactions

     1.   The customer opens an account.
     2.   The customer receives a certificate.
          (contains customer’s public key)
     3.   Merchants have their own certificates.
          (Two certificates: one for signing messages and the other for key
          exchange.)
     4.   The customer places an order.
     5.   The merchant is verified.
          (merchant sends a copy of its certificate; the customer can verify it.)
     6.   The order and payment are sent.
          >The payment information is encrypted in such a way that it can not be
          read by the merchant.
          > Customer’s certificate enables the merchant to verify the customer.


56                                   Web Security                                   www.elabnody.net
Sequence of events for
                            transactions

     7.   The merchant requests payment authorization.
          >Merchant sends the payment information to payment
          gateway, requesting authorization.
     8.   The merchant confirms the order.
          >Merchant sends confirmation to customer.
     9.   The merchant provides the goods or service.
          >Merchant ships goods to customer.
     10. The merchant requests payments.
          >Merchant sends payment request to the payment
          gateway, which handles payment processing.


57                           Web Security                      www.elabnody.net
Dual Signature


     • Objective: to link two messages that are
       intended for two different recipients.
     • Customer wants to send:
       1. Order Information (OI) to merchant.
       2. Payment information (PI) to bank.
          >Customer wants to link these two items and
          also wants to keep them separate.


58                       Web Security              www.elabnody.net
Dual Signature


     >Merchant need not know about CC#.
     >Bank need not know the details of
       customer’s order.
       >> However, these two items must be linked to
          resolve any dispute.
       >>Customer can prove that this payment was
          intended for this order.
       //protects customer and merchant.//

59                       Web Security              www.elabnody.net
Generation of Dual Sign.


        • Customer takes the hash (SHA-1) of PI.
        • Customer takes the hash of OI.
        • Concatenates these two and takes hash of
          the result.
        • Customer signs the final hash with his
          private key.
             DS = EKRc[H(H(PI)||H(OI))]
SHA Secure Hash Algorithm

60                             Web Security      www.elabnody.net
Dual Signature

     DS  EKRc [ H ( H ( PI ) || H(OI))]




61              Web Security               www.elabnody.net
Dual Signature


     • Merchant has DS, OI, and PIMD.
       >Merchant computers H(PIMD||H(OI)).
       >Merchant decrypts DS using customer’s public
         key.
       >If both these items are equal, the merchant has
         verified the DS.
       //Merchant is never sent the PI//



62                       Web Security                www.elabnody.net
Dual Signature


     • The bank has DS, PI, and OIMD.
       >The bank computers H(H(PI)||OIMD).
       >The bank decrypts DS using customer’s public
          key.
       >If both these items are equal, the merchant has
          verified the DS.
       //The bank is never sent the OI.//



63                       Web Security                www.elabnody.net
Payment Processing




64    Web Security    www.elabnody.net
Payment Processing


      • Look at three steps:

                             2.
           1.                                  3.
                          Payment
     Purchase request                     Payment capture
                        authorization




65                         Web Security                 www.elabnody.net
[1]

     Purchase               Payment Processing
     Request:


          – Before purchase request, customer makes an order
          – Initiate request: request certificate to the merchant
          – Initiate response: merchant returns signed response and
            his certificate and the payment gateway’s certificate
          – Purchase request: cardholder sends a purchase request
            which includes purchase-related info(PI, DS, OIMD) ,
            order-related info (OI, DS, PIMD), and cardholder
            certificate
          – Purchase response: signed response from the merchant
            for the purchase request


66                             Web Security                     www.elabnody.net
Cardholder
       sends
      Purchase    Payment Processing
      Request




67                 Web Security    www.elabnody.net
[2]

       Payment                       Payment Processing
     authorization:


         •    Payment authorization ensures that the merchant will
              receive payment.
         •    Authorization request message includes
               – Purchase-related info: PI, DS, OIMD, and digital envelope
               – Authorization-related info: authorization block (transaction ID
                 signed with merchant’s private key) and digital envelope
               – Certificates: cardholder’s signature key certificate, merchant’s
                 signature key certificate, merchant’s key-exchange key
                 certificate
         •    The payment gateway authorizes the PI from the issuer


68                                      Web Security                          www.elabnody.net
[3]

     Payment              Payment Processing
     capture :


      • Authorization response message includes
          – Authorization-related info: authorization block
            and digital envelope
          – Capture token info: signed and encrypted
            token for payment, the digital envelope

      • Payment capture using the capture token
          – Capture request
          – Capture response
69                           Web Security                 www.elabnody.net
70   Web Security   www.elabnody.net
Creating a Security


      Staying Current
       – Use the Microsoft Baseline Security Analyzer
         to check for nonsecure configuration and
         detect missing patches
       – Check the Microsoft Security Web page for tips
         and news
          http://www.microsoft.com/security
       – Check for patches to any third-party software


71                          Web Security             www.elabnody.net
Creating a Security


      Test Data: Authentication, Authorization, and
       Implementation Data
        – Authentication data
           • Is authentication secure (clear text passwords)?
           • Can passwords be guessed?
           • Are accounts locked out after multiple failed logon
             attempts?
        – Authorization data
           • Can a user get access to inappropriate data?
        – Implementation data
           • Are Web pages, error messages, or form data revealing
             any implementation details?
72                              Web Security                       www.elabnody.net
Don't we all wish it
       was this easy!!!




73                    Web Security   www.elabnody.net
Problems

     •   Consider the following threats to Web security and describe
         how each is countered by a particular feature of SSL.
          –   Brute-Force Cryptanalytic Attack: An exhaustive search of the key
              space for a conventional encryption algorithm.
          –   Known-Plaintext Dictionary Attack: Many messages will contain
              predictable plaintext, such as the HTTP GET command. An attacker
              constructs a dictionary containing every possible encryption of the
              known-plaintext message. When an encrypted message is intercepted,
              the attacker takes the portion containing the encrypted known plaintext
              and looks up the ciphertext in the dictionary. The ciphertext should
              match against an entry that was encrypted with the same secret key. If
              there are several matches, each of these can be tried against the full
              ciphertext to determine the right one. This attack is especially effective
              against small key sizes (e.g., 40-bit keys).
          –   Replay Attack: Earlier SSL handshake messages are replayed.
74                                      Web Security                               www.elabnody.net
Problems

     •   Consider the following threats to Web security and describe
         how each is countered by a particular feature of SSL.
          –   Man-in-the-Middle Attack: An attacker interposes during key exchange,
              acting as the client to the server and as the server to the client.
          –   Password Sniffing: Passwords in HTTP or other application traffic are
              eavesdropped.
          –   IP Spoofing: Uses forged IP addresses to fool a host into accepting
              bogus data.
          –   IP Hijacking: An active, authenticated connection between two hosts is
              disrupted and the attacker takes the place of one of the hosts.
          –   SYN Flooding: An attacker sends TCP SYN messages to request a
              connection but does not respond to the final message to establish the
              connection fully. The attacked TCP module typically leaves the "half-
              open connection" around for a few minutes. Repeated SYN messages
              can clog the TCP module.
75                                    Web Security                             www.elabnody.net
12 Steps to IT Security




76     Web Security       www.elabnody.net
References


     1) William Stallings (2005) “Cryptography and Network Security
        Principles and Practices”, Fourth Edition, Publisher: Prentice Hall
     2) Microsoft (2012) “Microsoft E-learning - Security” (online available)
        http://www.microsoft.com/security/default.aspx . Retrieved Date
        14th April, 2012.
     3) Learn Security (2012) Foundations of Security: What Every
        Programmer Needs To Know, (online available)
        http://www.learnsecurity.com . Retrieved Date 14th April, 2012.
     4) Department of Justice (2012) Computer Crime & Intellectual
        Property Section, (online available)
        http://www.usdoj.gov/criminal/cybercrime/ . Retrieved Date 14th
        April, 2012.

77                                 Web Security                          www.elabnody.net
•   3DES:   3DES Triple Data Encryption Standard
     •   CC:     Common Criteria
     •   DES:    Data Encryption Standard
     •   DSS:    Digital Signature Standard
     •   IETF:   Internet Engineering Task Force
     •   MAC:    Message Authentication Code
     •   MIME:   Multipurpose Internet Mail Extension
     •   MD5:    Message Digest, Version 5
     •   PGP:    Pretty Good Privacy
     •   RSA:    Rivest-Shamir-Adelman
     •   SET:    Secure Electronic Transaction
     •   SHA:    Secure Hash Algorithm
     •   SHS:    Secure Hash Standard
     •   SSL:    Secure Sockets Layer
     •   TCP:    Transmission Control Protocol
     •   TLS:    Transport Layer Security
     •   UDP:    User Datagram Protocol

78                                             Web Security   www.elabnody.net
Mohamed R. Elabnody
  www.elabnody.net
 elabnody@msn.com

     3rd May, 2012

Mais conteúdo relacionado

Mais procurados

Web API authentication and authorization
Web API authentication and authorization Web API authentication and authorization
Web API authentication and authorization Chalermpon Areepong
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongDerek Perkins
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionSina Manavi
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
CSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCCSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCSuvash Shah
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorizationFrank Victory
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 

Mais procurados (20)

Web API authentication and authorization
Web API authentication and authorization Web API authentication and authorization
Web API authentication and authorization
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Web Server Hardening
Web Server HardeningWeb Server Hardening
Web Server Hardening
 
Proxy server
Proxy serverProxy server
Proxy server
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Json Web Token - JWT
Json Web Token - JWTJson Web Token - JWT
Json Web Token - JWT
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
CSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCCSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVC
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
API Security Fundamentals
API Security FundamentalsAPI Security Fundamentals
API Security Fundamentals
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
Soap vs rest
Soap vs restSoap vs rest
Soap vs rest
 

Destaque

Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
Web security presentation
Web security presentationWeb security presentation
Web security presentationJohn Staveley
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Data protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelData protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelFabien Gandon
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityYnon Perek
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesCarol McDonald
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartSatria Ady Pradana
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityPaul Brown
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 

Destaque (20)

Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Network security
Network securityNetwork security
Network security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Data protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelData protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 Panel
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security
Network security Network security
Network security
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A Jumpstart
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and Identity
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Semelhante a Web Security Approaches Encryption Tools

Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITYyashwanthlavu
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaAlphageeks
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 

Semelhante a Web Security Approaches Encryption Tools (20)

Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Cloud security
Cloud securityCloud security
Cloud security
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez Metula
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 

Último

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Último (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Web Security Approaches Encryption Tools

  • 1. Hackers Crackers Script Kiddies //By Mohamed R. Elabnody // elabnody@msn.com www.elabnody.net Actors 3rd May, 2012
  • 2. Outline • Introduction to Web Security • Why Is Security So Important? • Web Security Considerations • Web Security Approaches • Secure Socket Layer (SSL) and Transport Layer Security (TLS) • Secure Electronic Transaction (SET) • Recommended Reading • Problems 2 Web Security www.elabnody.net
  • 3. Key Points Secure socket layer (SSL) provides security services between TCP and applications that use TCP. The Internet standard version is called transport layer service (TLS). SSL/TLS provides confidentiality using symmetric encryption and message integrity using a message authentication code. SSL/TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use. Secure electronic transaction (SET) is an open encryption and security specification designed to protect credit card transactions on the Internet. 3 Web Security www.elabnody.net
  • 4. Overview • Why Be Concerned about Web Security? – The increased use of the networks and the internet helps users finish many tasks quickly and efficiently and adds convenience to many people's lives. However, there is downside, as well. As more and more personal and business data is stored on computer networks, the risk and consequences of unauthorized computer access, theft, fraud, and other types of computer crime increase; so do the chances of data loss due to crime or employee misconduct. 4 Web Security www.elabnody.net
  • 5. Overview • Web security may easily be split into three specific areas: Client Access • there is the client. This is the machine from which the user requests a web page. By typing a URL a connection between the client and server is made. The to Web Pages server returns the document and the user browser displays the document. • the Web Server. This is where the entire web Server pages and resources are held. Similarly, the web server may host databases or act as a middleware to back-end databases. • the connection between the server and client needs Connection to be considered. In very few circumstances this connection will be conducted over a trusted or value added network. 5 Web Security www.elabnody.net
  • 6. Introduction • Virtually all businesses, most government agencies, and many individuals now have Web sites. The number of individuals and companies with Internet access is expanding rapidly and all of these have graphical Web browsers. As a result, businesses are enthusiastic about setting up facilities on the Web for electronic commerce. But the reality is that the Internet and the Web are extremely vulnerable to compromises of various sorts. As businesses wake up to this reality, the demand for secure Web services grows. • In this session, we begin with a discussion of the general requirements for Web security and then focus on two standardized schemes that are becoming increasingly important as part of Web commerce: SSL/TLS and SET. 6 Web Security www.elabnody.net
  • 7. Information Security at Work Awareness 7 Web Security www.elabnody.net
  • 8. Why Is Security So Important? • Stolen intellectual property • System downtime • Lost productivity • Damage to business reputation • Lost consumer confidence • Severe financial losses due to lost revenue 8 Web Security www.elabnody.net
  • 9. War on the Internet Oh, this is bad, but it is not our business, Who needs to get into war anyway We will only conduct our e-business That is it. 9 Web Security www.elabnody.net
  • 10. Zone-H statistics • Why did you deface this website? http://www.zone-h.org 10 Web Security www.elabnody.net
  • 11. Who Are Attackers? Corporate Headquarters External Internet Attacker Unauthorized access: gaining access to a computer, network, file, or other Internal resource without permission; can be Attacker committed by Insiders Outsiders 11 Web Security www.elabnody.net
  • 12. Attacks Organizational Attacks Common Social Engineering Types of Viruses, Trojan Horses, and Worm Attacks Denial of Service (DoS) Accidental Breaches in Security 12 Web Security www.elabnody.net
  • 13. How Do Attacks Occur? Stages of Examples of attacker actions attack Footprint Runs a port scan on the firewall Scanning Exploits an unpatched Web server Gaining Access Creates an account with administrator rights Maintaining Uploads unlicensed software to the Access Web server Cover-up Erases the audit trail of the exploit 13 Web Security www.elabnody.net
  • 14. Common Types of Vulnerabilities Vulnerability Examples Weak Passwords  Employees use blank or default passwords Unpatched software  Patches are not updated  Security hotfixes are not applied Miss configured  Services have more privileges than required Software  Services run as the Local System account Social engineering  Help desk administrator resets a password without verifying the identity of the caller Weak security on  Unused services and ports are not secured Internet Connections  Firewalls are used improperly Unencrypted data  Authentication packets are sent in clear text transfer  Important data is sent over the Internet in clear text Buffer overrun  A trusted process runs untrusted code 14 Web Security www.elabnody.net
  • 15. Web Security Considerations • The WEB is easily accessible worldwide. //more vulnerability// • Complex software hide many security flaws. • Users are not trained in computer security and are not aware of the risks. • A Web server can be exploited as a launching pad into a corporation’s entire computer complex. 15 Web Security www.elabnody.net
  • 16. Information Security Threat Awareness 16 Web Security www.elabnody.net
  • 17. 17 Web Security www.elabnody.net
  • 18. Web Security Approaches Encryption and Other Security Tools
  • 19. Web Security Approaches • Web Security Threats … Integrity Confidentiality Denial of Service Authentication 19 Web Security www.elabnody.net
  • 20. Web Security Approaches • Web Security Threats – Integrity: modification of a web page, message traffic, or user data – Confidentiality: eavesdropping of web traffic – Denial of Service: bogus web requests, flooding web server memory or queue – Authentication: impersonation of legitimate users – Location of the threats • Web server • Web client • Network traffic 20 Web Security www.elabnody.net
  • 21. Web Security Approaches • Encryption: method of scrambling e-mail or files to make them unreadable • Secure Web servers: use encryption to protect information transmitted via their Web pages – Most common is SSL – Look for a locked padlock on the status bar and https:// in the URL – Only transmit credit card numbers and other sensitive data via a secure Web server 21 Web Security www.elabnody.net
  • 22. Web Security Approaches 22 Web Security www.elabnody.net
  • 23. Web Security Approaches Security facilities in the TCP/IP protocol stack Transparent Application to end users Above TCP Specific -SET Embedded in package illustrates this difference. One way to provide Web security is to use IP Security (Figure 1). The advantage of using IPSec is that it is transparent to end users and applications and Figure 1. Relative Location of Security Facilities in the TCP/IP provides a general-purpose solution. Further, IPSec includes a filtering capability so that only Protocol Stack selected traffic need incur the overhead of IPSec processing. Cryptography and Network Security Principles and Practices, 4th Edition, Page 531 23 Web Security www.elabnody.net
  • 24.
  • 25. Secure Socket Layer (SSL) • Implements three cryptographic assurances: Authentication Confidentiality Message integrity • Also provides secure key exchange between a browser (client) and server. • Provides security parameters negotiation. • Does not offer non-repudiation. 25 Web Security www.elabnody.net
  • 26. How Does SSL/TLS Work? 26 Web Security www.elabnody.net
  • 27. How Does SSL/TLS Work? – User browses to a secure Web server by using HTTPS – The browser generates a unique session key and encrypts it by using the Web server’s public key from its root certificate – The session key is received by the Web server and is decrypted by using the server's private key – After the connection has been established, all communication between the browser and Web server is secure 27 Web Security www.elabnody.net
  • 28. Secure Socket Layer (SSL) SSL Architecture: • SSL runs on the top of TCP to provide reliable and secure end-to- end service. • Consists of two layers 28 Web Security www.elabnody.net
  • 29. SSL Architecture • Depends on TCP for end-to-end reliability • Two layers of protocols: – SSL Record Protocol - basic security services to higher layers – Three higher layer protocols - used in the management of SSL exchanges 29 Web Security www.elabnody.net
  • 30. SSL Architecture Manages SSL Exchanges The SSL Record Protocol SSL SSL change SSL alert provides basic Handshake cipher spec HTTP protocol security protocol protocol services to Basic various higher- SSL record protocol Security layer Services protocols. TCP IP Figure 2. SSL Protocol Stack Cryptography and Network Security Principles and Practices, 4th Edition, 30 Web Security Page 532 www.elabnody.net
  • 31. SSL Architecture • Two important SSL concepts: – Connection: peer-to-peer relationships in the transport layer. Every connection is associated with one session. – Session: An association between a client and a server created by the Handshake Protocol. • Define a set of cryptographic security parameters, which can be shared among multiple connections. • Avoid the expensive negotiation of new security parameters for each connection. 31 Web Security www.elabnody.net
  • 32. SSL Record Protocol • Provides two services for SSL Connections: 1. Confidentiality: A shared secret key used for conventional encryption of SSL payload. 2. Message Integrity: A shared secret key is used to construct a message authentication code. 32 Web Security www.elabnody.net
  • 33. SSL Record Protocol Operation Message Message Blocks Optional MAC: Message Authentication Code indicates the overall operation of the SSL Record Protocol. The Record Protocol takes an application message to be transmitted, fragments the data into manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit in a TCP segment. Received data are decrypted, verified, decompressed, and reassembled and then delivered to higher-level users. Figure 3. SSL Record Protocol Operation Cryptography and Network Security Principles and Practices, 4th Edition, Page 534 33 Web Security www.elabnody.net
  • 34. SSL Record Protocol • Record protocol takes an application message and performs the following operations: – Fragmentation: block 0f 16k bytes or less) – Compression: optional, must not increase content length beyond 1024 bytes – Add a MAC (a shared secret key is used) – Encryption (symmetric encryption) – Appends an SSL record header. 34 Web Security www.elabnody.net
  • 35. SSL Record Format • The final step of SSL Record Protocol processing is to pretend a header, consisting of the following fields: – Content Type (8 bits): Used by higher layers to process the enclosed fragment. – Major Version (8 bits): Indicates the major version of SSL used. – Minor Version (8 bits): Indicates the minor version of SSL used. – Compressed length (16 bits): The length of fragment in bytes. Cryptography and Network Security Principles and Practices, 4th Edition, Page 535 35 Web Security www.elabnody.net
  • 36. Handshake Protocol Message Types 36 Web Security www.elabnody.net
  • 37. Handshake Protocol • The most complex part of Phase 1 SSL. • Allows the server and client to – authenticate each other. Phase 2 – negotiate encryption, MAC algorithm and cryptographic keys. Phase 3 • Used before any application data are transmitted. Phase 4 37 Web Security www.elabnody.net
  • 38. Handshake Protocol 38 Web Security www.elabnody.net
  • 39. Handshake Protocol • Authenticate each other and negotiate cryptographic parameters (encryption and MAC algorithms, cryptographic keys, …) – Phase 1: establish security capabilities – Phase 2: server authentication and key exchange – Phase 3: client authentication and key exchange – Phase 4: finish 39 Web Security www.elabnody.net
  • 40. An SSL Session 1. Negotiation of cryptographic parameters //Two computers probably don’t know each other’s capabilities.// 2. Key Agreement. //C & S generate shared secret key.// 3. Authentication (client authenticates server). 4. Confidentiality and integrity. //private messages exchanged between C & S.// 40 Web Security www.elabnody.net
  • 42. Hello and Negotiate Parameters • Client sends server a plaintext message to suggest some 1 parameters for conversation: Version: SSL 3.1 if you can, else SSL 3.0 Key Exchange: RSA if you can, else Diffie-Hellman Secret Key Cipher Method: TripleDES if you can, else DES Message Digest: MD5 if you can, else SHA-1 Random #: 777,666,555 42 Web Security www.elabnody.net
  • 43. Hello and Negotiate Parameters • Server responds by its choice of parameters in a plaintext 1 message: Version: SSL 3.1 Key Exchange: RSA Secret Key Cipher Method: TripleDES Message Digest: SHA-1 Random #: 444,333,222 43 Web Security www.elabnody.net
  • 44. Hello and Negotiate Parameters • After responding to the hello message, the server sends 1 the client its digital certificate. //A trusted CA signed this certificate.// • The client uses the trusted CA’s public key to decrypt the certificate and obtains server’s public key and verifies the server. 44 Web Security www.elabnody.net
  • 45. Key Agreement and Exchange • The client generates a Client Server 48-byte random value DES secret Key DES secret Key (called pre-master Secret key for Secret key for secret), encrypts it with message message server’s public RSA key, integrity integrity and sends it to server. Secret key to Secret key to • The server decrypts this initialize the initialize the message and generates six keys. 2 cipher. cipher. 45 Web Security www.elabnody.net
  • 46. Key Agreement and Exchange • Generation of six shared secret keys: <> Random values exchanged. <> Pre-master secret. <> Pseudo-random function generator. 2 Example: PRF(pre-master secret, random1+ random2) Computed repeatedly. 46 Web Security www.elabnody.net
  • 47. Authentication The client authenticates the server: • The clients sends the server a message that is encrypted with the generated secret keys. //called the “finished handshake” message// • The server responds with its own encrypted 3 finished handshake message. <> The clients is now convinced that it is communicating with right server. //pre-master secret could only be decrypted with the server’s private key.// 47 Web Security www.elabnody.net
  • 48. Authentication Does server need to authenticate the client? – In general yes, but in this situation it may not be necessary: • Reasons: 3 1. It is not necessary because it will be done when the client gives his/her CC number. 2. A client may not have information to authenticate itself to the server. 3. It is time-consuming for server. 48 Web Security www.elabnody.net
  • 49. Confidentiality and Integrity 4 • Client and server use the generated secret keys for confidential data transfer. <> The client uses its secret key to generate a HMAC for the message. <> The client encrypts message data + HMAC with its secret key and sends it to server. <> The server decrypts the received message with its secret key. <> The server checks the integrity of the message using HMAC. 49 Web Security www.elabnody.net
  • 50. What is HTTPS 50 Web Security www.elabnody.net
  • 52. Secure Electronic Transactions • An open encryption and security specification. • Designed to protect credit card transaction on the Internet. • Companies involved: – MasterCard, Visa, IBM, Microsoft, Netscape, RSA, Terisa and Verisign • Not a payment system. • Set of security protocols and formats (enables users to employ existing CC payment infrastructure securely in an open environment). RSA Rivest-Shamir-Adelman CC Common Criteria 52 Web Security www.elabnody.net
  • 53. SET Services • Provides three services: 1. Provides a secure communication channel among all parties involved in a transaction. 2. Provides trust by the use of X.509v3 digital certificates. 3. Ensures privacy: information is only available to involved parties. 53 Web Security www.elabnody.net
  • 54. SET Overview • Key Features of SET: – Confidentiality of information – Integrity of data – Cardholder account authentication – Merchant authentication 54 Web Security www.elabnody.net
  • 55. SET Participants 55 Web Security www.elabnody.net
  • 56. Sequence of events for transactions 1. The customer opens an account. 2. The customer receives a certificate. (contains customer’s public key) 3. Merchants have their own certificates. (Two certificates: one for signing messages and the other for key exchange.) 4. The customer places an order. 5. The merchant is verified. (merchant sends a copy of its certificate; the customer can verify it.) 6. The order and payment are sent. >The payment information is encrypted in such a way that it can not be read by the merchant. > Customer’s certificate enables the merchant to verify the customer. 56 Web Security www.elabnody.net
  • 57. Sequence of events for transactions 7. The merchant requests payment authorization. >Merchant sends the payment information to payment gateway, requesting authorization. 8. The merchant confirms the order. >Merchant sends confirmation to customer. 9. The merchant provides the goods or service. >Merchant ships goods to customer. 10. The merchant requests payments. >Merchant sends payment request to the payment gateway, which handles payment processing. 57 Web Security www.elabnody.net
  • 58. Dual Signature • Objective: to link two messages that are intended for two different recipients. • Customer wants to send: 1. Order Information (OI) to merchant. 2. Payment information (PI) to bank. >Customer wants to link these two items and also wants to keep them separate. 58 Web Security www.elabnody.net
  • 59. Dual Signature >Merchant need not know about CC#. >Bank need not know the details of customer’s order. >> However, these two items must be linked to resolve any dispute. >>Customer can prove that this payment was intended for this order. //protects customer and merchant.// 59 Web Security www.elabnody.net
  • 60. Generation of Dual Sign. • Customer takes the hash (SHA-1) of PI. • Customer takes the hash of OI. • Concatenates these two and takes hash of the result. • Customer signs the final hash with his private key. DS = EKRc[H(H(PI)||H(OI))] SHA Secure Hash Algorithm 60 Web Security www.elabnody.net
  • 61. Dual Signature DS  EKRc [ H ( H ( PI ) || H(OI))] 61 Web Security www.elabnody.net
  • 62. Dual Signature • Merchant has DS, OI, and PIMD. >Merchant computers H(PIMD||H(OI)). >Merchant decrypts DS using customer’s public key. >If both these items are equal, the merchant has verified the DS. //Merchant is never sent the PI// 62 Web Security www.elabnody.net
  • 63. Dual Signature • The bank has DS, PI, and OIMD. >The bank computers H(H(PI)||OIMD). >The bank decrypts DS using customer’s public key. >If both these items are equal, the merchant has verified the DS. //The bank is never sent the OI.// 63 Web Security www.elabnody.net
  • 64. Payment Processing 64 Web Security www.elabnody.net
  • 65. Payment Processing • Look at three steps: 2. 1. 3. Payment Purchase request Payment capture authorization 65 Web Security www.elabnody.net
  • 66. [1] Purchase Payment Processing Request: – Before purchase request, customer makes an order – Initiate request: request certificate to the merchant – Initiate response: merchant returns signed response and his certificate and the payment gateway’s certificate – Purchase request: cardholder sends a purchase request which includes purchase-related info(PI, DS, OIMD) , order-related info (OI, DS, PIMD), and cardholder certificate – Purchase response: signed response from the merchant for the purchase request 66 Web Security www.elabnody.net
  • 67. Cardholder sends Purchase Payment Processing Request 67 Web Security www.elabnody.net
  • 68. [2] Payment Payment Processing authorization: • Payment authorization ensures that the merchant will receive payment. • Authorization request message includes – Purchase-related info: PI, DS, OIMD, and digital envelope – Authorization-related info: authorization block (transaction ID signed with merchant’s private key) and digital envelope – Certificates: cardholder’s signature key certificate, merchant’s signature key certificate, merchant’s key-exchange key certificate • The payment gateway authorizes the PI from the issuer 68 Web Security www.elabnody.net
  • 69. [3] Payment Payment Processing capture : • Authorization response message includes – Authorization-related info: authorization block and digital envelope – Capture token info: signed and encrypted token for payment, the digital envelope • Payment capture using the capture token – Capture request – Capture response 69 Web Security www.elabnody.net
  • 70. 70 Web Security www.elabnody.net
  • 71. Creating a Security  Staying Current – Use the Microsoft Baseline Security Analyzer to check for nonsecure configuration and detect missing patches – Check the Microsoft Security Web page for tips and news http://www.microsoft.com/security – Check for patches to any third-party software 71 Web Security www.elabnody.net
  • 72. Creating a Security  Test Data: Authentication, Authorization, and Implementation Data – Authentication data • Is authentication secure (clear text passwords)? • Can passwords be guessed? • Are accounts locked out after multiple failed logon attempts? – Authorization data • Can a user get access to inappropriate data? – Implementation data • Are Web pages, error messages, or form data revealing any implementation details? 72 Web Security www.elabnody.net
  • 73. Don't we all wish it was this easy!!! 73 Web Security www.elabnody.net
  • 74. Problems • Consider the following threats to Web security and describe how each is countered by a particular feature of SSL. – Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm. – Known-Plaintext Dictionary Attack: Many messages will contain predictable plaintext, such as the HTTP GET command. An attacker constructs a dictionary containing every possible encryption of the known-plaintext message. When an encrypted message is intercepted, the attacker takes the portion containing the encrypted known plaintext and looks up the ciphertext in the dictionary. The ciphertext should match against an entry that was encrypted with the same secret key. If there are several matches, each of these can be tried against the full ciphertext to determine the right one. This attack is especially effective against small key sizes (e.g., 40-bit keys). – Replay Attack: Earlier SSL handshake messages are replayed. 74 Web Security www.elabnody.net
  • 75. Problems • Consider the following threats to Web security and describe how each is countered by a particular feature of SSL. – Man-in-the-Middle Attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client. – Password Sniffing: Passwords in HTTP or other application traffic are eavesdropped. – IP Spoofing: Uses forged IP addresses to fool a host into accepting bogus data. – IP Hijacking: An active, authenticated connection between two hosts is disrupted and the attacker takes the place of one of the hosts. – SYN Flooding: An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the "half- open connection" around for a few minutes. Repeated SYN messages can clog the TCP module. 75 Web Security www.elabnody.net
  • 76. 12 Steps to IT Security 76 Web Security www.elabnody.net
  • 77. References 1) William Stallings (2005) “Cryptography and Network Security Principles and Practices”, Fourth Edition, Publisher: Prentice Hall 2) Microsoft (2012) “Microsoft E-learning - Security” (online available) http://www.microsoft.com/security/default.aspx . Retrieved Date 14th April, 2012. 3) Learn Security (2012) Foundations of Security: What Every Programmer Needs To Know, (online available) http://www.learnsecurity.com . Retrieved Date 14th April, 2012. 4) Department of Justice (2012) Computer Crime & Intellectual Property Section, (online available) http://www.usdoj.gov/criminal/cybercrime/ . Retrieved Date 14th April, 2012. 77 Web Security www.elabnody.net
  • 78. 3DES: 3DES Triple Data Encryption Standard • CC: Common Criteria • DES: Data Encryption Standard • DSS: Digital Signature Standard • IETF: Internet Engineering Task Force • MAC: Message Authentication Code • MIME: Multipurpose Internet Mail Extension • MD5: Message Digest, Version 5 • PGP: Pretty Good Privacy • RSA: Rivest-Shamir-Adelman • SET: Secure Electronic Transaction • SHA: Secure Hash Algorithm • SHS: Secure Hash Standard • SSL: Secure Sockets Layer • TCP: Transmission Control Protocol • TLS: Transport Layer Security • UDP: User Datagram Protocol 78 Web Security www.elabnody.net
  • 79. Mohamed R. Elabnody www.elabnody.net elabnody@msn.com 3rd May, 2012