Cross-Cutting Concerns Flashcards
What is HTTPS?
End-to-end security based on TLS
Give the seven protocols/policies that increase Web security.
- HTTPS
Simple Access Authentication (run over HTTPS):
* Basic Authentication
* HTTP Digest Access Authentication
Authorisation and Identity:
* OAuth 2.0 (Authorisation)
* OpenID Connect (Authentication)
- Same-Origin Policy
- Cross-Origin Resource Sharing (CORS) protocol
What three considerations should be made for Web security regardless of protocols/policies employed.
- Many more attacks possible
- Formal methods are required to prove correctness of protocols.
- The browser has become a very sophisticated software system, subject to many potential attacks
Discuss Scalability in Web Security.
Protocols have become more involved!
* HTTPS setup costs
* OAUTH interactions
* Preflight requests for Cross-Origin Resource Sharing
Give the six governing bodies (governance) of Web security.
- W3C World Wide Web Consortium
- IETF
- OpenID
- WhatWG
- EU privacy laws (Cookie Law)
- CAs and browser developers
Describe two ways in which the web layer is self-describable in relation to Web security.
- WWW-Authenticate header
- Use of OPTIONS and HEAD to query service for CORS and Security