SlideShare a Scribd company logo
Web Security
Web Security Threats
Threats Consequences Counter Measures
Integrity Modification of
user data, memory or message
traffic
Loss of Information,
Compromise of machine
Cryptographic of checksum
Confidentiality Eavesdropping on the Net
Theft of into from server/client
Info about Network
Configuration
Loss of
Information and Privacy
Encryption and Web Proxies
Denial of Service Killing of user Threads
Flooding machines with bogus
requests
Filling up Disk or Memory
Isolating machine by DNS attack
Prevent user from getting work
Done
Difficult to prevent
Authentication Impersonation of legitimate user Misrepresentation of user
Belief that false information is
valid
Cryptographic techniques
Security Facilities
HTTP FTP SMTP
TCP
IP / IPSec
HTTP FTP SMTP
SSL or TLS
TCP
IP
S/MIME PGP SET
Kerberos SMTP HTTP
UDP TCP
IP
Network Level Transport Level Application Level
Secure Socket Layer
SSL Architecture
Handshake
Protocol
Change Cipher
Spec Protocol
Alert Protocol HTTP
SSL Record Protocol
TCP
IP
Secure Socket Layer
Connection
Session
A connection is a transport that provides a suitable type of service.
For SSL its peer-to-peer relationship
They are transient.
Associated with one session.
Association between Client and Server
Created by handshake protocol
Defines security parameters
Shared among multiple connections
Avoid expensive negotiation of new security parameters
Secure Socket Layer
Session
Session Identifier
Peer Certificate
Compression Method
Cipher Spec
Master Secret
Is Resumable
Connection
Server and Client Random
Server write MAC secret
Client write MAC secret
Server write Key
Client Write Key
Initialization Vector
Sequence Number
Parameters
Secure Socket Layer
Protocols
SSL Record Protocol
Handshake Protocol
Change Cipher Spec Protocol
Alert Protocol
SSL Record Protocol
Provides
Confidentiality
Message Integrity
SSL Record Protocol
Hash( MAC_write_secret ||pad_2 ||
hash(MAC_write_secret || pad_1 || seq_num ||
SSLCompressed.type ||
SSLCompressed.length ||
SSLCompressed.fragment )
)
SSL Record Protocol
SSL Record Protocol Header
Content Type : The higher layer Protocol
Major Version : For SSlv3 its value is 3
Minor Version : For SSlv3 its value is 0
Compressed Length : The length of bytes of Plaintext fragment
SSL Handshake Protocol
SSL Handshake Protocol
SSL Handshake Protocol
SSL Handshake Protocol
SSL Change Cipher Specification Protocol
a single message.
causes pending state to become current.
hence updating the cipher suite in use.
SSL Alert Protocol
conveys SSL-related alerts to peer entity
Severity
warning or fatal
Specific alert
fatal: unexpected message, bad record mac, decompression failure,
handshake failure, illegal parameter
warning: close notify, no certificate, bad certificate, unsupported
certificate, certificate revoked, certificate expired, certificate unknown
compressed & encrypted like all SSL data
Secure Electronic Transaction
Business Requirements
• Provide confidentiality of PAYMENT and ORDERING info.
• Ensure the integrity of all TRANSMITTED data
• Provide authentication that a card holder is a LEGITIMATE user
• Provide authentication that a merchant can accept credit card
transaction
• Ensure the use of best security practices and system design
techniques
• Create protocol that doesn’t depends on transport security
mechanism.
Secure Electronic Transaction
Features of SET
• Confidentiality of INFORMATION
• Integrity of DATA
• Cardholder account authentication
• Merchant authentication
Secure Electronic Transaction
SET Participants
Secure Electronic Transaction
SET Transaction
1. customer opens account
2. customer receives a certificate
3. merchants have their own certificates
4. customer places an order
5. merchant is verified
6. order and payment are sent
7. merchant requests payment authorization
8. merchant confirms order
9. merchant provides goods or service
10.merchant requests payment
Secure Electronic Transaction
SET Transaction
Secure Electronic Transaction
Dual Signature
• customer creates dual messages
• order information (OI) for merchant
• payment information (PI) for bank
• neither party needs details of other
• but must know they are linked

More Related Content

PPTX
Transport Layer Security (TLS)
PPT
Web Security
PPTX
Web Security and SSL - Secure Socket Layer
PDF
SSL/TLS
PDF
Web Security
PDF
SSL Secure socket layer
PPT
Lecture 6 web security
PPT
Secure Socket Layer
Transport Layer Security (TLS)
Web Security
Web Security and SSL - Secure Socket Layer
SSL/TLS
Web Security
SSL Secure socket layer
Lecture 6 web security
Secure Socket Layer

What's hot (20)

PPT
SSL & TLS Architecture short
PPT
Security
PPTX
Securing TCP connections using SSL
PPT
Web Security
PPTX
Secure Socket Layer
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PDF
SSl/TLS Analysis
PPTX
Secure Socket Layer (SSL)
PPTX
Secure Socket Layer
PPT
PPT
Secure Socket Layer (SSL)
PPTX
Introduction to SSL and How to Exploit & Secure
PPTX
Ssl in a nutshell
DOCX
S/MIME
PPT
Ssl (Secure Sockets Layer)
PPSX
Secure socket layer
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PPT
SSL & TLS Architecture short
Security
Securing TCP connections using SSL
Web Security
Secure Socket Layer
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
SSl/TLS Analysis
Secure Socket Layer (SSL)
Secure Socket Layer
Secure Socket Layer (SSL)
Introduction to SSL and How to Exploit & Secure
Ssl in a nutshell
S/MIME
Ssl (Secure Sockets Layer)
Secure socket layer
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Ad

Similar to web security (20)

PDF
Vtu network security(10 ec832) unit 5 notes.
PDF
Network Security_Module_2_Dr Shivashankar
PPT
Web securiy - Network security essentials
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PDF
BAIT1103 Chapter 4
PPT
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
PPTX
Network Security- Secure Socket Layer
PPTX
Secure Sockets Layer (SSL)
PPTX
Secure Socket Layer.pptx
PPT
Web security
PDF
Network Security_Module_2.pdf
PPT
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
PPT
Secure socket later
PPTX
ssl-tls-ipsec-vpn.pptx
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PPTX
1643129870-internet-security.pptx
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
SSL And TLS
PPTX
Ssl (Secure Socket Layer)
Vtu network security(10 ec832) unit 5 notes.
Network Security_Module_2_Dr Shivashankar
Web securiy - Network security essentials
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
BAIT1103 Chapter 4
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
Network Security- Secure Socket Layer
Secure Sockets Layer (SSL)
Secure Socket Layer.pptx
Web security
Network Security_Module_2.pdf
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
Secure socket later
ssl-tls-ipsec-vpn.pptx
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
1643129870-internet-security.pptx
SECURE SOCKET LAYER ( WEB SECURITY )
SSL And TLS
Ssl (Secure Socket Layer)
Ad

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
composite construction of structures.pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Welding lecture in detail for understanding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
bas. eng. economics group 4 presentation 1.pptx
composite construction of structures.pdf
additive manufacturing of ss316l using mig welding
Automation-in-Manufacturing-Chapter-Introduction.pdf
Geodesy 1.pptx...............................................
Welding lecture in detail for understanding
R24 SURVEYING LAB MANUAL for civil enggi
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Operating System & Kernel Study Guide-1 - converted.pdf
573137875-Attendance-Management-System-original
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CYBER-CRIMES AND SECURITY A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx

web security

  • 2. Web Security Threats Threats Consequences Counter Measures Integrity Modification of user data, memory or message traffic Loss of Information, Compromise of machine Cryptographic of checksum Confidentiality Eavesdropping on the Net Theft of into from server/client Info about Network Configuration Loss of Information and Privacy Encryption and Web Proxies Denial of Service Killing of user Threads Flooding machines with bogus requests Filling up Disk or Memory Isolating machine by DNS attack Prevent user from getting work Done Difficult to prevent Authentication Impersonation of legitimate user Misrepresentation of user Belief that false information is valid Cryptographic techniques
  • 3. Security Facilities HTTP FTP SMTP TCP IP / IPSec HTTP FTP SMTP SSL or TLS TCP IP S/MIME PGP SET Kerberos SMTP HTTP UDP TCP IP Network Level Transport Level Application Level
  • 4. Secure Socket Layer SSL Architecture Handshake Protocol Change Cipher Spec Protocol Alert Protocol HTTP SSL Record Protocol TCP IP
  • 5. Secure Socket Layer Connection Session A connection is a transport that provides a suitable type of service. For SSL its peer-to-peer relationship They are transient. Associated with one session. Association between Client and Server Created by handshake protocol Defines security parameters Shared among multiple connections Avoid expensive negotiation of new security parameters
  • 6. Secure Socket Layer Session Session Identifier Peer Certificate Compression Method Cipher Spec Master Secret Is Resumable Connection Server and Client Random Server write MAC secret Client write MAC secret Server write Key Client Write Key Initialization Vector Sequence Number Parameters
  • 7. Secure Socket Layer Protocols SSL Record Protocol Handshake Protocol Change Cipher Spec Protocol Alert Protocol
  • 9. SSL Record Protocol Hash( MAC_write_secret ||pad_2 || hash(MAC_write_secret || pad_1 || seq_num || SSLCompressed.type || SSLCompressed.length || SSLCompressed.fragment ) )
  • 10. SSL Record Protocol SSL Record Protocol Header Content Type : The higher layer Protocol Major Version : For SSlv3 its value is 3 Minor Version : For SSlv3 its value is 0 Compressed Length : The length of bytes of Plaintext fragment
  • 15. SSL Change Cipher Specification Protocol a single message. causes pending state to become current. hence updating the cipher suite in use.
  • 16. SSL Alert Protocol conveys SSL-related alerts to peer entity Severity warning or fatal Specific alert fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown compressed & encrypted like all SSL data
  • 17. Secure Electronic Transaction Business Requirements • Provide confidentiality of PAYMENT and ORDERING info. • Ensure the integrity of all TRANSMITTED data • Provide authentication that a card holder is a LEGITIMATE user • Provide authentication that a merchant can accept credit card transaction • Ensure the use of best security practices and system design techniques • Create protocol that doesn’t depends on transport security mechanism.
  • 18. Secure Electronic Transaction Features of SET • Confidentiality of INFORMATION • Integrity of DATA • Cardholder account authentication • Merchant authentication
  • 20. Secure Electronic Transaction SET Transaction 1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates 4. customer places an order 5. merchant is verified 6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10.merchant requests payment
  • 22. Secure Electronic Transaction Dual Signature • customer creates dual messages • order information (OI) for merchant • payment information (PI) for bank • neither party needs details of other • but must know they are linked