tailieunhanh - SecureSockets

The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems | Secure Sockets Overview of Lecture We covered an overview of authenticated key exchange protocols In this lecture we will Look at issues related to Web Security Examine a specific implementation of such a protocol, known as Secure Sockets Web Security Issues The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems Threats Consequences Countermeasures Integrity Modification of Data Trojan horses Loss of Information Compromise of Machine MACs and Hashes Confidentiality Eavesdropping Theft of Information Loss of Information Privacy Breach Encryption DoS Stopping Filling up Disks and Resources Stopped Transactions Authentication Impersonation Data Forgery Misrepresentation of User Accept . | Secure Sockets Overview of Lecture We covered an overview of authenticated key exchange protocols In this lecture we will Look at issues related to Web Security Examine a specific implementation of such a protocol, known as Secure Sockets Web Security Issues The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems Threats Consequences Countermeasures Integrity Modification of Data Trojan horses Loss of Information Compromise of Machine MACs and Hashes Confidentiality Eavesdropping Theft of Information Loss of Information Privacy Breach Encryption DoS Stopping Filling up Disks and Resources Stopped Transactions Authentication Impersonation Data Forgery Misrepresentation of User Accept false Data Signatures, MACs Table from Stallings, and from A. Rubin So Where to Secure the Web? There are many strategies to securing the web We may attempt to secure the IP Layer of the TCP/IP Stack: This may be accomplished using IPSec, for example. We may leave IP alone and secure on top of TCP: This may be accomplished using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) We may seek to secure specific applications by using application-specific security solutions: For example, we may use Secure Electronic Transaction (SET) The first two provide generic solutions, while the third provides for more specialized services We will focus this lecture on SSL A Quick Look at Securing the TCP/IP Stack TCP IP/IPSEC HTTP FTP SMTP TCP IP HTTP FTP SMTP SSL/TLS TCP IP S/MIME PGP UDP Kerberos SMTP SET HTTP At the Network Level At the Transport Level At the Application Level Overview of SSL The Secure Sockets Layer was originally developed (1994) by Netscape in order to secure http .

TÀI LIỆU LIÊN QUAN
19    40    0
TỪ KHÓA LIÊN QUAN