Chap5_3 Flashcards
Secure Electronic Transactions
SET
An open encryption and security specification.
Protect credit card transaction on the Internet.
Companies involved:
MasterCard, Visa, IBM, Microsoft, Netscape, RSA, Terisa and
Verisign
Not a payment system
Set of security protocols and formats
SET
Services
Provides a secure communication channel in a transaction.
Provides trust by the use of X.509v3 digital certificates.
Ensures privacy.
SET
Complexity
Specifications defined in 3 books
Total is 971 pages versus SSL specifications in 63 pages
Dual Signature
Merchant does NOT need to know the customer’s credit
card number
Bank does NOT need to know the customer’s order
Extra protection in terms of privacy by keeping these
two items separate
However, the two items must be linked in a way that can
be used to resolve disputes if necessary
Objective: link two messages that are intended for two
different recipients
Order info (OI) to the merchant
Payment info (PI) to the bank
Slide 11
TRUE
Purchase Request
Purchase request exchange: Initiate Request Initiate Response Purchase Request Purchase Respons
Slide 19
TRUE
Slide 20
TRUE
Secure-HTTP (SHTTP)
Developed by Enterprise Integration Technologies (EIT) Inc.
A security-enhanced extension of the Hypertext Transfer
Protocol
S-HTTP works at the application level, encrypting the
contents of messages relayed between a browser and a
server using RSA’s system of public/private key algorithm
pairs
S-HTTP is designed for flexibility, allowing client and server
to negotiate the strength and type of encryption to be used
S-HTTP also authenticates the identity of both client and
server by using digital signatures
Verifies the integrity of the data by using Message
Authentication Code (MAC)
SSL and S-HTTP
Same: Cryptographic principles (digital envelopes, signed
certificates, message digests)
Different:
S-HTTP designed to work with the Web protocols only
SSL is a lower-level protocol that can be used to encrypt many
types of network connections
Different:
S-HTTP was initially available in a modified version of NCSA
Mosaic that users had to purchase
SSL was incorporated into a freeware browser
S-HTTP sank into oblivion
SSL rapidly became the predominant secure protocol on the Web
SSL and S-HTTP are not mutually exclusive. Because they
operate on different levels, the protocols could be layered
to “double-encrypt” the data
Basic Concepts of SNMP
Most widely used standard is Simple Network
Management Protocol (SNMP), published in 1988
SNMPv1 had very basic security
SNMPv3 has a more extensive set of security features
Key elements of network management: Management station Management agent Management information base Network Management protocol: Get, Set and Notify
Management station:
Typically stand alone device
Provides interface to human network manager
Management agent:
Is on hosts, bridges, routers, etc.
Responds to requests by management station, responds to
actions, provides unsolicited information
Management information base (MIB):
Collection of objects (resources in the network)
Standardized across systems of particular class (ex. bridges)
Network Management protocol
Links management stations with agents
SNMP is the protocol for managing TCP/IP networks
SNMP Key Capabilities
Get: Enables management station to retrieve the value
of objects at the agent
Set: Enables management station to set the value of
objects at the agent
Notify: Enables an agent to notify the management
station of significant events, also called Trap –an
unsolicited message (reporting an alarm condition)
SNMP Operates over
UDP
SSH SSH is a protocol for secure remote login and other secure network
services over an insecure network. It consists of three major
components:
SSH operates over TCP
In its simplest mode of operation, it connects to a
server, negotiates a shared secret key using Diffie
Hellman, then begins encrypting the session (typically
using the Blowfish cipher).
A username and password are passed over the
encrypted session and, if authenticated, the server
starts a command shell over the encrypted session.
In its simplest use, SSH represents a more secure
alternative to TELNET