SlideShare a Scribd company logo
Information Security
Chapter 6
Web Security

Information Security © 2006 Eric Vanderburg
Reasons for software vulnerability
• Large amount of code
– Windows 2000 – 20 million lines
– Windows XP – 40 million lines
– Linux – 55 million lines

• Extensibility
– Ex: Firefox plug-ins
– Drivers (use signed drivers)

• Wired (connectivity)
– More internet enabled applications which may
not be secure. (weather, stocks, media
player)
Information Security © 2006 Eric Vanderburg
An email message
1. sender@source.com uses a client to
create a message for
receiver@destination.com
2. Client connects to mail.source.com
SMTP server on port 25 and forwards
the message.
3. SMTP server compares the source and
destination domain names. If they are
the same, the message goes to the
POP3 server for source.com via the
delivery agent.
Information Security © 2006 Eric Vanderburg
An email message
4. The source.com SMTP server connects to the
destination.com SMTP server and passes the
message. If the destination.com SMTP server
is not responding, the message is queued and
sent later. After 4 hours in the queue the
sender is notified.
5. Destination.com passes the message to the
destination.com POP3 server.
6. The message is stored in the POP3 mailbox
for retrieval by receiver@destination.com

Information Security © 2006 Eric Vanderburg
Email
• POP3 (Post Office Protocol) – offers a
storage place for messages until
downloaded from the server. Port 119
• IMAP (Internet Mail Access Protocol) –
Messages always reside on the server.
Port 143
• E-mail attachments are documents in
binary format (word processing
documents, spreadsheets, sound files,
pictures)
Information Security © 2006 Eric Vanderburg
Email
• **All the following operate at the application layer
• MIME (Multipurpose Internet Mail Extensions) – standard
for embedding email with rich text, graphics, sound, &
video.
• S/MIME (Secure MIME) – adds encryption and
authentication to email.
–
–
–
–
–

Digital signatures
Works with different email clients
Encrypts messages
Encryption & signing is transparent
Checksums to protect integrity

• PGP (Pretty Good Privacy) – Encrypted with a session
key that is encrypted with the recipient’s public key.
– Must download a plugin to use with email clients.
Information Security © 2006 Eric Vanderburg
Email vulnerabilities
• Several e-mail vulnerabilities can be
exploited by attackers:
– Malware
– Spam
– Hoaxes

• SMTP relay attacks allow spammers to
send thousands of e-mail messages to
users

Information Security © 2006 Eric Vanderburg
Email vulnerabilities
• SPAM
– 30 billion daily e-mail messages are spam
– 25% of users say the ever-increasing volume of spam
has reduced their overall use of e-mail
– 52% of users indicate spam has made them less
trusting of e-mail in general
– 70% of users say spam has made being online
unpleasant or annoying
– Use a backlist of spammers to block any e-mail that
originates from their e-mail addresses
– Bayesian filtering – words found in the SPAM bin help
define other SPAM messages.
Information Security © 2006 Eric Vanderburg
Internet vulnerabilities
• Buffer overflow attacks are common ways
to gain unauthorized access to Web
servers
• Both file names and aliases must be
protected if 8.3 aliases are not disabled.
Incorrect permissions could be applied.
• Dynamic content can also be used by
attackers
– Repurposed programming - using
programming tools in ways more harmful than
originally intended (Javascript, ActiveX)
Information Security © 2006 Eric Vanderburg
JavaScript
• Provides client side dynamic content
• Virtual Machine (VM) - a Java interpreter
• JavaScript code is downloaded onto the
user’s computer within the HTML code
– defense mechanisms:
• Cannot read or write to the file system
• No networking capabilities

– problems:
• Can capture and send user information without the
user’s knowledge or authorization
• Security is through browser. It does not protect
code that executes outside a browser.
Information Security © 2006 Eric Vanderburg
Java Applet
• Separate program downloaded with but
separate from the HTML
• Sandbox - Surrounds program and keeps
it away from private data and other
resources on a local computer
• Signed or unsigned

Information Security © 2006 Eric Vanderburg
ActiveX
• Standard for information sharing between
programs
• Installed when referenced by a web page
• Do not run in a sandbox. Has full access to the
OS
• Signed or unsigned – only proves source but not
safety
• Only run on Windows
• Set per computer instead of per user
• ActiveX controls as a whole are either disabled
or enabled in IE
Information Security © 2006 Eric Vanderburg
Cookies
• Stores information from a web site
– Sessions
– Saved logon

•
•
•
•
•
•

Very small (4KB)
Has an expiration date
First party cookie – A site’s own cookie
Third party cookie – Another site’s cookie
Disable third party cookie access
Many sites require cookies so disabling them will
change your online experience but disallowing
sites
Information Security © 2006 Eric Vanderburg
CGI (Common Gateway Interface)
• CGI script – program code that adheres to
CGI rules.
– Used for communicating with other server
software via web pages.
– CGI on the server must be set to not execute
remote code statements

Information Security © 2006 Eric Vanderburg
Web security
• SSL (Secure Sockets Layer)- v3.0 latest
– Disable versions 1 & 2

• TLS (Transport Layer Security) – v1.0 is
approximately the same as SSL3.0
• PCT (Personal Communications
Technology) – Microsoft technology with
longer keys and a better algorithm than
SSL. (Not popular)
• Application layer protocol so it can run on
top of any network but it must be
integrated with the program to work.
Information Security © 2006 Eric Vanderburg
SSL / TLS / PCT Steps
1.
2.
3.

4.
5.
6.

Client sends a ClientHello message specifying the list of cipher
suites, compression methods and the highest protocol version it
supports.
Server receives the ClientHello and sends a ServerHello, where
selections are made from available suites, compression, and
versions.
Client and server exchange certificates (depending on the
selected public key cipher) The server can request a certificate
from the client, so that the connection can be mutually
authenticated.
Master secret (a common secret used for generating other keys)
is negotiated using Diffie-Hellman exchange, or by encrypting a
secret with a public key (if using mutual authentication).
Data is sent encrypted with a key generated from the master
secret and the selected cipher suite.
When the connection is terminated a hash of all the exchanged
data seen by both parties is sent for verification.

Information Security © 2006 Eric Vanderburg
FORTEZZA
• Information security system based on a
PC Card security token.
• Each individual who is authorized to see
protected information is issued a Fortezza
card that stores private keys and other
data needed to gain access.
• Wide in use in Government and Military
applications
• Latest version is FORTEZZA Plus
Information Security © 2006 Eric Vanderburg
HTTP & SSL
• HTTPS - HTTP over SSL/TLS – secures
individual messages instead
• SSL/TLS secures the entire
communication between client and server
• Port 443

Information Security © 2006 Eric Vanderburg
Chatting
• IM (Instant Message)
• Server contains list of users and their buddies
• When connected, a user’s IP & port are sent to
all their buddies.
• Direct connections can be established to send
messages without involving the server.
• Most chat programs can log chats (optional)
which are stored locally. Google Talk stores
chat logs on the server.
• Data sent through IM could be malicious
(pictures, programs, video, music)
Information Security © 2006 Eric Vanderburg
Acronyms
• CGI, Common Gateway Interface
• CAN-SPAM, Controlling the Assault of Non Solicited
Pornography and Marketing Act of 2003
• IM, Instant Messaging
• IMAP, Internet Mail Access Protocol
• MIME, Multipurpose Internet Mail Extensions
• PCT, Personal Communications Technology
• POP, Post Office Protocol
• PGP, Pretty Good Privacy
• S/MIME, Secure Multipurpose Internet Mail Extensions
• SSL, Secure Sockets Layer
• SMTP, Simple Mail Transfer Protocol
• TLS, Transport Layer Security
• VM, Virtual Machine
Information Security © 2006 Eric Vanderburg

More Related Content

PDF
Ch 11: Hacking Wireless Networks
PDF
Echoworx Encryption Delivery Methods
PPT
Ch08 Authentication
PPT
Android Firewall project
PDF
Fortinet FortiGate 100D
PPTX
gkkSecurity essentials domain 2
PPTX
Network security - Defense in Depth
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Ch 11: Hacking Wireless Networks
Echoworx Encryption Delivery Methods
Ch08 Authentication
Android Firewall project
Fortinet FortiGate 100D
gkkSecurity essentials domain 2
Network security - Defense in Depth
Wifi cracking Step by Step Using CMD and Kali Linux 2018

What's hot (20)

PPSX
Wireless Network Security
PDF
Wireless Networking Security
PDF
NTXISSACSC4 - Security for a New World
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
Fortinet av
PDF
The Post Covid-19 Cybersecurity World - Where Is It Headed?
PPT
Ch06 Wireless Network Security
PPTX
Wireless network security
PPTX
Application layer Security in IoT: A Survey
PDF
Network Security Tools
PPT
Fortigate Training
PPT
LAN Security
PPT
Implementing an improved security for collin’s database and telecommuters
PPTX
Firewall Design and Implementation
PPTX
Wireless security using wpa2
PPTX
Network defenses
PPTX
Flak+technologies
PPTX
Palo Alto Networks 28.5.2013
PPTX
Security standard
Wireless Network Security
Wireless Networking Security
NTXISSACSC4 - Security for a New World
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Fortinet av
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Ch06 Wireless Network Security
Wireless network security
Application layer Security in IoT: A Survey
Network Security Tools
Fortigate Training
LAN Security
Implementing an improved security for collin’s database and telecommuters
Firewall Design and Implementation
Wireless security using wpa2
Network defenses
Flak+technologies
Palo Alto Networks 28.5.2013
Security standard
Ad

Viewers also liked (20)

PPTX
Security of the database
PPSX
Information security presentation
PDF
نظام إدارة مؤسسات تعليم القران
PDF
Rfid tech for library | تحديد الهوية بموجات الراديو
PPTX
SSL/TLS Eavesdropping with Fullpath Control
PPTX
محاولة تأريخ لعلم الأجرام عبر الأنترنت
PDF
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
PPTX
حجية الدليل الرقمي وموقع المشروع اليبي
PDF
Truth and Consequences
PPTX
PDF
نظام إدارة المؤسسات التدربية التعليمية
PPSX
قضايا معرفية في الأمن السبراني
PPTX
امن الشبكات المخاطر والحلول
PPT
Managing System Security
PPTX
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
PDF
افاق المعرفة- نظام ادارة المكتبات
PDF
مسودة مشروع قانون المعاملات الالكترونية الليبي
PPTX
إختبارات في أمن المعلومات It security
PPTX
شبكات و أمن المعلومات 1
PPTX
أساسيات أمن المعلومات
Security of the database
Information security presentation
نظام إدارة مؤسسات تعليم القران
Rfid tech for library | تحديد الهوية بموجات الراديو
SSL/TLS Eavesdropping with Fullpath Control
محاولة تأريخ لعلم الأجرام عبر الأنترنت
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
حجية الدليل الرقمي وموقع المشروع اليبي
Truth and Consequences
نظام إدارة المؤسسات التدربية التعليمية
قضايا معرفية في الأمن السبراني
امن الشبكات المخاطر والحلول
Managing System Security
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
افاق المعرفة- نظام ادارة المكتبات
مسودة مشروع قانون المعاملات الالكترونية الليبي
إختبارات في أمن المعلومات It security
شبكات و أمن المعلومات 1
أساسيات أمن المعلومات
Ad

Similar to Information Security Lesson 6 - Web Security - Eric Vanderburg (20)

PPT
Security - ch5.ppt
PPT
E-COMMERCE SECURITY (2).ppt
PPT
Electronic commerce security seventh annual edition
PPT
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
PPT
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
PDF
Ch7-Computer Security
PPT
Security
PPTX
6 security
PPTX
Internet Security
PPTX
Chapter 2 System Security.pptx
PDF
Ssl tls-beginners-guide
PPT
Security chapter6
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
PPTX
PDF
Ericas-Security-Plus-Study-Guide
PPTX
Www architecture,cgi, client server security, protection
PPT
Ch03 Protecting Systems
PPT
Technical seminar on Security
PPT
Clients and Servers.ppt
PPTX
Security - ch5.ppt
E-COMMERCE SECURITY (2).ppt
Electronic commerce security seventh annual edition
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
Ch7-Computer Security
Security
6 security
Internet Security
Chapter 2 System Security.pptx
Ssl tls-beginners-guide
Security chapter6
IT8005_EC_Unit_III_Securing_Communication_Channels
Ericas-Security-Plus-Study-Guide
Www architecture,cgi, client server security, protection
Ch03 Protecting Systems
Technical seminar on Security
Clients and Servers.ppt

More from Eric Vanderburg (20)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Ransomware: 2016's Greatest Malware Threat
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPT
Incident response table top exercises
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
Countering malware threats - Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...

Information Security Lesson 6 - Web Security - Eric Vanderburg

  • 1. Information Security Chapter 6 Web Security Information Security © 2006 Eric Vanderburg
  • 2. Reasons for software vulnerability • Large amount of code – Windows 2000 – 20 million lines – Windows XP – 40 million lines – Linux – 55 million lines • Extensibility – Ex: Firefox plug-ins – Drivers (use signed drivers) • Wired (connectivity) – More internet enabled applications which may not be secure. (weather, stocks, media player) Information Security © 2006 Eric Vanderburg
  • 3. An email message 1. sender@source.com uses a client to create a message for receiver@destination.com 2. Client connects to mail.source.com SMTP server on port 25 and forwards the message. 3. SMTP server compares the source and destination domain names. If they are the same, the message goes to the POP3 server for source.com via the delivery agent. Information Security © 2006 Eric Vanderburg
  • 4. An email message 4. The source.com SMTP server connects to the destination.com SMTP server and passes the message. If the destination.com SMTP server is not responding, the message is queued and sent later. After 4 hours in the queue the sender is notified. 5. Destination.com passes the message to the destination.com POP3 server. 6. The message is stored in the POP3 mailbox for retrieval by receiver@destination.com Information Security © 2006 Eric Vanderburg
  • 5. Email • POP3 (Post Office Protocol) – offers a storage place for messages until downloaded from the server. Port 119 • IMAP (Internet Mail Access Protocol) – Messages always reside on the server. Port 143 • E-mail attachments are documents in binary format (word processing documents, spreadsheets, sound files, pictures) Information Security © 2006 Eric Vanderburg
  • 6. Email • **All the following operate at the application layer • MIME (Multipurpose Internet Mail Extensions) – standard for embedding email with rich text, graphics, sound, & video. • S/MIME (Secure MIME) – adds encryption and authentication to email. – – – – – Digital signatures Works with different email clients Encrypts messages Encryption & signing is transparent Checksums to protect integrity • PGP (Pretty Good Privacy) – Encrypted with a session key that is encrypted with the recipient’s public key. – Must download a plugin to use with email clients. Information Security © 2006 Eric Vanderburg
  • 7. Email vulnerabilities • Several e-mail vulnerabilities can be exploited by attackers: – Malware – Spam – Hoaxes • SMTP relay attacks allow spammers to send thousands of e-mail messages to users Information Security © 2006 Eric Vanderburg
  • 8. Email vulnerabilities • SPAM – 30 billion daily e-mail messages are spam – 25% of users say the ever-increasing volume of spam has reduced their overall use of e-mail – 52% of users indicate spam has made them less trusting of e-mail in general – 70% of users say spam has made being online unpleasant or annoying – Use a backlist of spammers to block any e-mail that originates from their e-mail addresses – Bayesian filtering – words found in the SPAM bin help define other SPAM messages. Information Security © 2006 Eric Vanderburg
  • 9. Internet vulnerabilities • Buffer overflow attacks are common ways to gain unauthorized access to Web servers • Both file names and aliases must be protected if 8.3 aliases are not disabled. Incorrect permissions could be applied. • Dynamic content can also be used by attackers – Repurposed programming - using programming tools in ways more harmful than originally intended (Javascript, ActiveX) Information Security © 2006 Eric Vanderburg
  • 10. JavaScript • Provides client side dynamic content • Virtual Machine (VM) - a Java interpreter • JavaScript code is downloaded onto the user’s computer within the HTML code – defense mechanisms: • Cannot read or write to the file system • No networking capabilities – problems: • Can capture and send user information without the user’s knowledge or authorization • Security is through browser. It does not protect code that executes outside a browser. Information Security © 2006 Eric Vanderburg
  • 11. Java Applet • Separate program downloaded with but separate from the HTML • Sandbox - Surrounds program and keeps it away from private data and other resources on a local computer • Signed or unsigned Information Security © 2006 Eric Vanderburg
  • 12. ActiveX • Standard for information sharing between programs • Installed when referenced by a web page • Do not run in a sandbox. Has full access to the OS • Signed or unsigned – only proves source but not safety • Only run on Windows • Set per computer instead of per user • ActiveX controls as a whole are either disabled or enabled in IE Information Security © 2006 Eric Vanderburg
  • 13. Cookies • Stores information from a web site – Sessions – Saved logon • • • • • • Very small (4KB) Has an expiration date First party cookie – A site’s own cookie Third party cookie – Another site’s cookie Disable third party cookie access Many sites require cookies so disabling them will change your online experience but disallowing sites Information Security © 2006 Eric Vanderburg
  • 14. CGI (Common Gateway Interface) • CGI script – program code that adheres to CGI rules. – Used for communicating with other server software via web pages. – CGI on the server must be set to not execute remote code statements Information Security © 2006 Eric Vanderburg
  • 15. Web security • SSL (Secure Sockets Layer)- v3.0 latest – Disable versions 1 & 2 • TLS (Transport Layer Security) – v1.0 is approximately the same as SSL3.0 • PCT (Personal Communications Technology) – Microsoft technology with longer keys and a better algorithm than SSL. (Not popular) • Application layer protocol so it can run on top of any network but it must be integrated with the program to work. Information Security © 2006 Eric Vanderburg
  • 16. SSL / TLS / PCT Steps 1. 2. 3. 4. 5. 6. Client sends a ClientHello message specifying the list of cipher suites, compression methods and the highest protocol version it supports. Server receives the ClientHello and sends a ServerHello, where selections are made from available suites, compression, and versions. Client and server exchange certificates (depending on the selected public key cipher) The server can request a certificate from the client, so that the connection can be mutually authenticated. Master secret (a common secret used for generating other keys) is negotiated using Diffie-Hellman exchange, or by encrypting a secret with a public key (if using mutual authentication). Data is sent encrypted with a key generated from the master secret and the selected cipher suite. When the connection is terminated a hash of all the exchanged data seen by both parties is sent for verification. Information Security © 2006 Eric Vanderburg
  • 17. FORTEZZA • Information security system based on a PC Card security token. • Each individual who is authorized to see protected information is issued a Fortezza card that stores private keys and other data needed to gain access. • Wide in use in Government and Military applications • Latest version is FORTEZZA Plus Information Security © 2006 Eric Vanderburg
  • 18. HTTP & SSL • HTTPS - HTTP over SSL/TLS – secures individual messages instead • SSL/TLS secures the entire communication between client and server • Port 443 Information Security © 2006 Eric Vanderburg
  • 19. Chatting • IM (Instant Message) • Server contains list of users and their buddies • When connected, a user’s IP & port are sent to all their buddies. • Direct connections can be established to send messages without involving the server. • Most chat programs can log chats (optional) which are stored locally. Google Talk stores chat logs on the server. • Data sent through IM could be malicious (pictures, programs, video, music) Information Security © 2006 Eric Vanderburg
  • 20. Acronyms • CGI, Common Gateway Interface • CAN-SPAM, Controlling the Assault of Non Solicited Pornography and Marketing Act of 2003 • IM, Instant Messaging • IMAP, Internet Mail Access Protocol • MIME, Multipurpose Internet Mail Extensions • PCT, Personal Communications Technology • POP, Post Office Protocol • PGP, Pretty Good Privacy • S/MIME, Secure Multipurpose Internet Mail Extensions • SSL, Secure Sockets Layer • SMTP, Simple Mail Transfer Protocol • TLS, Transport Layer Security • VM, Virtual Machine Information Security © 2006 Eric Vanderburg