Chapter 17 - Web Security
Chapter 17 - Web Security
• Introduction
• Why web security?
• Web security threads
• Web security traffic approaches
Contents • Conclusion
Introduction!
• The World Wide Web is
fundamentally a client/server
application running over the Internet
and TCP/IP intranets
• Integrity
• Confidentiality Web
Authentication
Denial of service
security
• Denial of service
• Authentication
Confidentiality
7
1.INTEGRITY
Threats:
Effects:
• Loss of information
• Compromise of machine
• Vulnerability to all other threats
8
Prevention measures:
• Cryptographic checksums
2. CONFIDENTIALITY
Threats:
• Eavesdropping on the net
• Theft of data from client and server
• Information about network
configuration
Effects:
• Loss of information
• Loss of privacy
10
Prevention measures:
• Use Encryption, Web proxies
Example: Spyware
• Spyware is basically any technology
that helps gather information about a
computer user without their
knowledge.
• It infiltrates the computing device,
steals internet usage data and other
sensitive information.
11
Effects:
• Disruptive
• Prevent user from getting work done
12
Prevention Measures:
• It is difficult to prevent
4. Authentication
Threats:
• Impersonation of legitimate users
• Data forgery
Effects:
• Misrepresentation of user
• Belief that false information is
valid
14
Prevention Measures:
Example: Ransomware
• Ransomware is a type of malware
which restricts access to the computer
system that it infects, and demands a
ransom paid to the creator(s) of the
malware in order for the restriction to
be removed.
15
IP Security (IPsec) :
Conclusion
We can not achieve perfect security, but
with the help of assessment tools,
certification, licensing, and other means
for assessing and enhancing
professionalization, we can minimize
security hazards.