NSC Topic 3 Web Security
NSC Topic 3 Web Security
NSC Topic 3 Web Security
Topic 3:
Web Security
Topic 3 – Lecture 1:
Web Security and IPSEC
Learning Outcomes
By the end of this topic students will be able to:
• Explain the concept of web security with SSL/TLS
• Demonstrate applying for and deploying a Digital
Certificate
Web Security
• The Web presents us with some security issues that
may not be present in other networks:
- Two-way systems
- Multiple types of communication
- Importance to business
- Complex software
- Multiple connections to a server
- Untrained users
Two-way Systems
• The Web works on a client-server model that allows
communication in both directions:
- Server sends files to clients
- Clients send files to servers
Importance to Business
• Used to supply corporate information
• Used to supply product/service information
• Used for business transactions including financial
transactions
- banking, online shops, ordering systems, etc.
• If web servers are compromised, there may be very
serious consequences to a business.
- Loss of money & trade
- Loss of reputation
Complex Software
• Servers are relatively easy to set up and configure.
• It is simple to create web content.
- Even complex looking web applications are often
simple to create
• This simplicity is made possible by complex
underlying software.
• Complex software often has undetected security
holes.
- You can be sure that someone will detect them!
Multiple Connections
• The Web works because there are multiple
connections to a server.
• Different servers are connected to each other.
• What happens if a server is subverted and a
malicious attacker gains control?
- How many clients will be affected?
- How many other servers will be affected?
• An attack could have widespread consequences.
10
Untrained Users
• The Web is used by many, many clients with no
training or understanding of security issues.
- How many people surf the Internet without antivirus
software?
- Add in the people who have out of date virus
definitions
• Many people do not have the tools or knowledge to
deal with threats on the Web.
• These same people will be interacting with servers
around the world.
11
Traffic Security
• Maintaining the security of a server as a piece of
hardware is not fundamentally different to general
computer security.
12
13
TCP
IP/IPSec
14
SSL or TLS
TCP
IP
15
IP Security (IPSec)
• Provides security services at the IP layer for other
TCP/IP protocols and applications to use
16
17
18
19
IPSec Applications
• Securing a company’s Virtual Private network
(VPN) over the Internet
20
IPSec Advantages
• Can be applied to a firewall or router and apply to
all traffic across that boundary
• It is transparent to applications.
21
Topic 3 – Lecture 2:
SSL/TLS and HTTPS
22
23
SSL Architecture
• SSL uses TCP to provide a reliable and secure end-
to-end service.
24
SSL Architecture
SSL Handshake SSL Change Cipher SSL Alert HTTP
Protocol Spec Protocol Protocol
TCP
IP
25
SSL Connections
• A connection is a transport* that provides a suitable
service.
• SSL connections are peer-to-peer relationships.
• These SSL connections are transient.
- They only last for a certain length of time.
• Each connection is associated with a session.
26
SSL Sessions
• A session in SSL is an association between a client
and a server.
• Such sessions are created by the SSL Handshake
Protocol.
• A session defines the security parameters.
• A session may be shared by multiple connections.
- Allows the same settings to be used by many
connections without the need for repeatedly sending
the security parameters
27
• Transmitted data:
- Fragmented into manageable blocks
- Compressed (optional)
- Encrypted
- Header added and transmitted in a TCP segment
28
29
30
31
32
33
34
Messages
• The series of messages are initiated by the client.
• The first phase establishes the security credentials.
• The second phase involves authenticating the
server and exchanging keys.
• The third phase involves authentication the client
and exchanging keys.
• The fourth phase is completing the exchange.
35
HTTPS
• HTTP over SSL/TLS
• Used to create secure communications between a
Web browser and Web server
• Built into modern browsers
• Requires server to support HTTPS communication
- For example, at the time of writing, the Google
search engine does not support connections via
HTTPS
36
37
38
SSL Advantages
• It is independent of the applications once a
connection has been created.
- After the initiating handshake, it acts as a secure
tunnel through which you can send almost anything.
39
SSL Disadvantages
• The extra security comes with extra processing
overhead.
• This overhead is largely at the server end.
• Means communications using SSL/TLS are a
slower than those without it
- Some sources suggest that HTTPS communication
can be up to three time slower than HTTP.
- With modern browsers, servers and connection
speeds, this should not cause significant problems.
40
SSL/TLS Broken
• September 2011 - appears SSL/TLS
cryptography has been broken by researchers
41
References
• Stallings, W. (2010). Cryptography and Network
Security: Principles and Practice. Pearson
Education.
• Thomas, S.A. (2000). SSL & TLS Essentials:
Securing the Web. Wiley.
42
Any Questions?
43