CSDS Lecture Week 7
CSDS Lecture Week 7
Security has always been an issue in computing, primarily because the key assets are
informational, and not physical, hence data is more open to covert theft, and
communications are more open to being intercepted secretly – since data can be
replicated very simply while leaving the original intact.
Security is important for any system, but becomes increasingly important as the Web
spreads in scope (geographically and across areas of our life), and is used more and
more for value-based transactions.
Security Enforcement
Tools for Security Management
Users going from one of these zones to another are treated differently from each
other. Further, most firewalls are able to do more granular controls, e.g. specific
users (IP addresses can be limited to accessing specific services. Note that a
firewall can be a separate, special purpose box, or it can be a software run of a
general purpose computer. Typically, the separate box approach is viewed as
more secure, as it makes the firewall itself less vulnerable to attack. All major
networking vendors, such as Cisco, Lucent and 3Com have firewall offerings,
typically OEM from specialist firewall makers such as Checkpoint and Sonic.
5. Proxy servers. Using a proxy server means that all the transactions with a
particular service go through a first server, pretending to be that service. This
first server is a computer, stripped down to ensure it has no security holes, which
accepts requests, screens them, then, passes them on if appropriate. Because
prosy servers are general purpose computers, they can run arbitrarily complex
software to check incoming and outgoing requests, including sophisticated
firewall and intrusion detection software. Note that, as well as performing
security functions, proxy servers can help with performance, through caching and
load balancing. Also, note that proxy servers can be an effective solution to
denial-of-service attacks, as bogus packets are kept clear or the real servers.
At present, it is too computationally intensive to hack the PKI where they key size
is large, so it is the safest mechanism for e-commerce confidentiality, and is now
commonly used. PKI is, however, a little computationally intensive to use, hence,
in general, it is used at the start of the session to share unique passwords. Which
are then used for the duration of the session.
3. HTTPS. HTTP is the session layer protocol that manages a Web session.
HTTPs is a secure version of HTTP, embedding a Secure Socket layer (SSL).
SSL includes PKI encryption. Note that a newer version of SSL is called TLS
(Transport Layer Security). For HTTPS to work, clearly the computers at both
ends must support it.
4. PGP. Pretty Good Privacy is a public domain encryption utility that can be used
with e-mail clients, such as MS Outlook or Lotus Notes, or embedded in a
custom program.
7. DES/3DES. DES is a symmetric standard that was sued for many years in US
military applications, and thus the export or hardware or software containing DES
algorithms was limited. 3DES or triple DES refers to the application of three DES
transformations, in order to make a message more confidential. In general, DES
is currently regarded by the hacking community as a little weak.
8. SET. Secure Electronic Trading is a standard for secure credit card transactions
developed by a consortium of Visa, Mastercard, Microsoft, and Netscape using
digital certificates. SET is a fairly heavy standard in terms of processing
requirements and has received some resistance from the industry.
9. VPNs. Virtual Private Networks are used to tunnel securely across the Internet,
to facilitate private WAN connection through the Internet, or remote LAN access
for an individual user. Standards for VPN include PPTP and L2TP. IPSEC also
contains a VPN standard.