Académique Documents
Professionnel Documents
Culture Documents
Objectives
Describe security issues associated with e-mail. Implement security practices for e-mail. Detail the security issues of instant messaging protocols. Describe the functioning of the SSL/TLS protocol suite. Explain web applications, plug-ins, and associated security issues. Describe secure file transfer options. Explain directory usage for data retrieval. Explain scripting and other Internet functions that present security concerns. Use cookies to maintain parameters between web pages. Examine web-based application security issues.
E-mail Usage
Security of E-mail
Originally launched unsecure; remains unsecure. Internet e-mail depends on three primary protocols:
Used as a medium:
Malicious Code
Can be found and dispersed by many different methods:
Hoax E-mails
E-mail hoaxes are mostly a nuisance, wasting everyones time, taking up Internet bandwidth and server processing time as well. Sites like Snopes.com debunk such hoaxes.
10
11
12
Fighting Spam
Ways to fight spam include:
13
Mail Encryption
Provision for confidentiality or more commonly known as privacy. E-mail is sent in the clearclear text unless the message and/or attachments are encrypted. E-mail content encryption methods include:
S/MIME PGP
14
S/MIME
Secure/Multipurpose Internet Mail Extensions (S/MIME) is a secure implementation of the MIME protocol specification. MIME was created to allow Internet e-mail to support new and more creative features. MIME allows e-mail to handle multiple types of content in a message, including file transfers. Every time you send a file as an e-mail attachment, you are using MIME. S/MIME takes this content and specifies a framework for encrypting the message as a MIME attachment.
15
16
The user sends the e-mail, and the mail agent applies encryption as specified in the mail programs programming. The content is encrypted with the generated symmetric key, and that key is encrypted with the public key of the recipient of the e-mail for confidentiality.
17
18
19
20
Instant Messaging
Technology that allows individuals to chat online. AOL Instant Messenger (AIM) is a prevalent chat application.
21
Instant Messaging
To work properly IM has to:
Attach to a server (typically announcing the IP address of the originating client) Announce your presence on the server
22
Instant Messaging
23
Securing a server that delivers content to users over the Web. Securing the transport of information between users and servers over the Web. Securing the users computer from attack over a web connection.
24
Web Protocols
Common protocols used on the Web:
Encryption (SSL and TLS) The Web (HTTP and HTTPS) Directory Services (DAP and LDAP) File Transfer (FTP and SFTP)
25
26
IE 8 Security Options
27
28
29
SSL/TLS Handshake
30
31
IE 8 Certificate Store
32
33
34
SSL/TLS Attacks
SSL/TLS is specifically designed to provide protection from man-in-the middle attacks. A Trojan program that copies keystrokes and echoes them to another TCP/IP address in parallel with the intended communication can defeat SSL/TLS.
35
36
High-assurance notification in IE 7
37
38
SSL/TLS LDAP
SSL/TLS provides several important functions to LDAP services:
Establish the identity of a data source through the use of certificates. Provide for the integrity and confidentiality of the data being presented.
39
40
Vulnerabilities
Because SSL is enabled does not mean the user is safe. Key loggers can record what is being typed on a users computer before it is encrypted. A companys database can get hacked releasing your information to the world.
41
Code-based Vulnerabilities
Buffer overflows Java and JavaScript ActiveX Securing the browser CGI Server-side scripts Cookies Signed applets
Browser plug-ins
42
Buffer Overflows
The buffer overflow vulnerability is a result of poor coding practices on the part of software programmers. This occurs when an application can accept more input than it has assigned storage space, and the input data overwrites other program areas.
43
Java
Java is a computer language invented by Sun Microsystems as an alternative to Microsofts development languages. Designed to be platform-independent Java offered a low learning curve and a way of implementing programs across an enterprise. Although platform independence never fully materialized, Java has found itself to be a leader in object-oriented programming languages. Java can still perform malicious activities, and the fact that many users falsely believe it is safe increases its usefulness for attackers.
44
JavaScript
JavaScript is a scripting language developed to be operated within a browser instance. The primary purpose is to enable features such as validation of forms. Enterprising programmers found many other uses for JavaScript, such as manipulating the browser history files, now prohibited by design. JavaScript actually runs within the browser, and the code is executed by the browser itself. This has led to compatibility problems.
45
46
47
ActiveX
ActiveX is a broad collection of application programming interfaces (APIs), protocols, and programs developed by Microsoft.
Used to download and execute code automatically over an Internet-based channel. Can enable a browser to display a custom type of information in a particular way. Can perform complex tasks, such as update the operating system and application programs.
48
ActiveX
ActiveX Security Settings in IE 8
49
The NoScript plug-in allows the user to determine from which domains to trust scripts.
50
51
Cookies
Cookies are small chunks of ASCII text passed within an HTTP stream to store data temporarily in a web browser instance. It a series of name-value pairs that is stored in memory during a browser instance.
52
Cookies
Firefox Cookie Management
53
Cookies
Microsoft Internet Explorer 7 Cookie Management
54
Cookies
55
Signed Applets
The ability to use a certificate to sign an applet allows the identity of the author to be established. A signed applet can be hijacked as easily as a graphic or any other file. Inlining is using an embedded control from another site with or without the other sites permission.
56
Browser Plug-ins
Plug-ins are small application programs that increase a browsers ability to handle new data types and add new functionality. Dynamic data such as movies and music can be manipulated by a wide variety of plug-ins, and one of the most popular comes from Real Networks.
57
Browser Plug-ins
Add-ons for IE 8
58
OVAL comprises two main elements: an XML-based machinereadable language for describing vulnerabilities, and a repository. Common Vulnerabilities and Exposures (CVE) is a system that provides a reference-method for publicly known information-security vulnerabilities and exposures.
59
60
Summary
Describe security issues associated with e-mail. Implement security practices for e-mail. Detail the security issues of instant messaging protocols. Describe the functioning of the SSL/TLS protocol suite. Explain web applications, plug-ins, and associated security issues. Describe secure file transfer options. Explain directory usage for data retrieval. Explain scripting and other Internet functions that present security concerns. Use cookies to maintain parameters between web pages. Examine web-based application security issues.
61
References
[princ00] Principles of Computer Security: CompTIA Security+ and Beyound, Second Edition, Wm. Arthur Conklin, et. al., McGraw Hill, 2010 [gmail00] Gmail http://www.gmail.com [thun00] Thunderbird http://www.mozillamessaging.com/en-US/thunderbird/ [enig00] Enigmail http://enigmail.mozdev.org/home/index.php [gpg00] GPG http://www.gnupg.org/ [seti00] Setting up Thunderbird to work with gmail and gpg http://www.ericpuryear.com/2007/09/24/setting-up-thunderbird-to-work-with-gmailand-gpg/ [spam00] Dealing with Spam http://www.us-cert.gov/cas/tips/ST04-007.html [hoax00] Hoax Emails http://www.snopes.com [oval00] OVAL http://oval.mitre.org/index.html [vir00] Virus and Spyware http://news.zdnet.com/2422-13569_22156290.htmlhttp://news.zdnet.com/2422-13569_22-156290.html [spam01] Spam http://news.zdnet.com/2422-13569_22-156230.html [mail00] Mail Encryption http://cnettv.cnet.com/secure-your-e-mail-from-pryingeyes/9742-1_53-50004023.html [conf00] Conficker Worm http://www.cbsnews.com/video/watch/?id=4905403n [frse00] Free Security Apps http://cnettv.cnet.com/best-free-security-apps/97421_53-50002962.html
62