1
Remarks on Internet and Java Security Spring 99 2
Abstract of CPS616 Java and Internet Security Presentation 3
Some Reference Material 4
Some General Issues I 5
Some General Issues II 6
Need for Security in Commerce - I 7
Need for Security in Commerce - II 8
Structure of Internet and Security-I 9
Structure of Internet and Security-II 10
Structure of Internet and Security-III 11
A PKZIP Anecdote 12
Downloading Software is Dangerous? 13
The Moldavia Pornographic Phone Scam 14
An Early Netscape DNS Bug 15
Tempest and Control Zones 16
Military Security Levels 17
Firewalls and Gateways - I 18
Firewalls and Gateways II 19
Encrypted Tunnels 20
The Great Clipper Controversy 21
Export Restrictions on Cryptography 22
Denial of Service versus "Attacks" 23
Combining Denial of Service with more Malicious Attack 24
Comments on Denial of Service 25
Some Attacking Concepts 26
Naïve way Viruses Spread themselves 27
Introduction to Cryptography 28
Breaking an Encryption Scheme 29
Types of Cryptographic Function 30
Security Uses of Cryptography 31
Secret Key Cryptography 32
Uses of Secret Key Cryptography 33
Secret Key Authentication 34
Message Integrity with Secret Key Cryptography 35
Public Key Cryptography 36
Insecure Link Transmission with Public Key Cryptography 37
Authentication with public key Cryptography 38
Digital Signatures and Public Key Cryptography 39
Use of Digital Signatures with public key Cryptography 40
Hash and Message Digests 41
Some Math Behind Secret Key Cryptography 42
Some Math behind RSA Algorithm -I 43
Some Math behind RSA Algorithm -II 44
Certificate Authorities 45
Review of Certificate Process 46
Sample Certificate from Netscape 47
VeriSign Digital ID's or Certificates - I 48
VeriSign Digital ID's or Certificates - II 49
VeriSign's Description of Digital ID's 50
VeriSign's Description of Certificate Revocation I 51
VeriSign's Description of Certificate Revocation II 52
The Java Security Model 53
Sandbox mechanism 54
What can applets do - I? 55
What can applets do - II? 56
What can applets do - III? 57
The Byte Code Verifier 58
Byte Code Verification 59
Why is type checking important! 60
Applet Class Loader 61
Going beyond the Sandbox: History of Java Security Models 62
Going beyond the Sandbox-2 63
Going beyond the Sandbox-3 64
JDK 1.2 Security Model 65
JAVA Fine-grained Access Control-1 66
JAVA Fine-grained Access Control-2 67
JAVA Fine-grained Access Control-3 68
JAVA Fine-grained Access Control-4 69
JAVA Fine-grained Access Control-5 70
JAVA Fine-grained Access Control-6 71
JAVA Fine-grained Access Control-7 72
Java Security-Related Tools 73
How to sign Java Code 74
Signing Classes with the Netscape Object Signing Tool 75
Netscape Object Signing Tool -2 76
Netscape Object Signing Tool -3 77
Signing Java Applets with Microsoft's Authenticode 78
Microsoft's Authenticode 2 79
Signing Code with Sun's JDK 1.1.x 80
Signing Code with Sun's JDK 1.1.x-2 81
Signing Code with Sun's JDK 1.1.x-3 82
Browsing Signed Applets 83
The Java Authentication Framework 84
The Java Authentication Framework-2 85
Signing Code with Sun's Java 2 86
Signing Code with Sun's Java 2-II 87
Signing Code with Sun's Java 2-III 88
Signing Code with Sun's Java 2-IV 89
Some Comparisons of Sign Tools 90
Some Comparisons of Sign Tools - 2 91
Secure Electronic Transaction SET 92
Electronic Shopping Experience - I 93
Electronic Shopping Experience - II 94
Features of SET - I 95
Features of SET - II 96
SET Encryption Summary 97
Sample SET Cryptography Use 98
Sample SET Cryptography Steps 2 to 5 99
Sample SET Cryptography Step 6 100
Sample SET Cryptography Steps 7-10 101
Structure of Public Key System in SET 102
Features of Public Key System in SET - I 103
Features of Public Key System in SET - II 104
Cardholder Registration Process in SET 105
Merchant Registration Process in SET 106
Purchase Request Process in SET 107
Payment Authorization and Capture Processes in SET 108
SSL and S/MIME 109
SSL from Netscape I 110
SSL from Netscape II 111
SSL from Netscape III 112
Netscape's Description of S/MIME 113
Generating Certificates on Unix-1 114
Generating Certificates on Unix-2 115
Sample Certificate and primary Key 116
Secure Server Example-NPAC Grading System-1 117
Secure Server Example-NPAC Grading System-2 118
Secure Server Example-NPAC Grading System-3 119
Secure Server Example-NPAC Grading System-4 120
Java Security Manager 121
Java Security Package 122
Java Digital Signatures-1 123
Java Digital Signatures-2 124
Some Other Security Systems 125
KERBEROS 126
KERBEROS - 2 127
SESAME Security System 128
Details on SESAME I 129
Details on SESAME II 130
The GSS-API Security Interface 131
Globus System Security Policy and Requirements -- Overview 132
Further Properties of Globus Entities 133
Globus Application Requirements 134
Relevant Components of Globus 135
Issues in the Globus Security Model 136
Elements of Globus Security Policy I 137
Elements of Globus Security Policy II 138
Globus Security Functional Requirements - I 139
Globus Security Functional Requirements - II 140
JavaScript Security Model 141
JavaScript Security Issues 142
Same Origin Policy 143
Signed Script Policy-1 144
Signed Script Policy-2 145
Signed Script Policy-3 146
Codebase Principals-1 147
Codebase Principals-2 148
Scripts Signed by Different Principals 149
Principals of Windows and Layers 150
Determining Container Principals 151
Identifying Signed Scripts 152
Using Expanded Privileges 153
Targets 154
Targets-2 155
Importing and Exporting Functions 156
Weaknesses in the JavaScript Model 157
Signing Scripts 158
Signing Scripts-2 159
Signing Scripts-3 160
Signing Scripts-4
Click outside pointer rectangle to move pointer
Click on Pointer to Hide
Click on Pointer + ALT to toggle message hiding
Click on Pointer + CNTL to abolish pointer
Click on Pointer + Shift to cycle families
Click outside + Alt is Change Image
Click outside + Control is Double Size
Click outside + Shift is Halve Size
Right Mouse Down on Pointer Toggles Index
Shift Right Mouse aligns top with scrolled Page While With Mouse Down on Current Pointer h hides This Message while m restores i Toggles Index Aligned with Page Top j Toggles Index Aligned with Scrolled View Top a Abolishes Pointer while CNTL-Click restores f cycles through pointer families c cycles through members of a family u increases Size Up and d decreases Down Mouse Up-Down between changes of Pointer to process new option