170 likes | 287 Views
Think your network is safe using the default protocols? Think again. Wong Tuck Wah Independent Security Professional, CISSP. Feed the Fishes. Go Toilet. Cosmetics Patchup. Check Email. Shake Legs. Read Newspaper. Go Pantry. Summon into boss room. Tidy Desktop. Networking.
E N D
Think your network is safe using the default protocols? Think again Wong Tuck Wah Independent Security Professional, CISSP
Feed the Fishes Go Toilet Cosmetics Patchup Check Email Shake Legs Read Newspaper Go Pantry Summon into boss room Tidy Desktop Networking What is the1stthing you will do when you reach office ? Gossip Meeting Tune in to 90.5FM Staring at Ceiling Charge Battery Tea Break Internet Surfing Starts Working Call Girlfriend Face Politics Take a Nap
Web Server Popeye Protocol Analyzer Olive Bluto Without Popeye is sending a mail to Olive Encryption
Objectives • What Is Certificate? • Usage of Certificates • Public Key Infrastructure • What Is Certificate Authority • Selection of CA • CA Hierarchy • Certificate Enrolment Process • Conclusions
What Is Certificate? • Verifies the identity of a user, computer, or program • Contains information about the issuer and the subject • Is signed by a CA
DigitalSignatures Smart Card Logon EncryptingFile System SecureE-mail InternetAuthentication SoftwareCode Signing Software Restriction Policy IP Security 802.1x Usage of Certificates
Certificate and CAManagement Tools Certification Authority Certificate and CRLDistribution Points Certificate Template Digital Certificate Certificate Revocation List Public Key-EnabledApplications and Services Public Key Infrastructure
What Is Certificate Authority • Verifies the identity of a certificate requestor • Issues certificates • Manages certificate revocation
Selection of CA • Self-Hosted Root vs Commercial Root CA • Reputation • Cost • Flexibility • Expertise
Selection of CA Stand-Alone CA Enterprise CA • Typically used for offline CAs • Typically used to issue certificates • AD is mandatory • AD is optional • Web-based and MMCenrolment • Web-based enrolment only • Certificate requests issued or denied based on the certificate template • Certificate requests issued or denied by a certificate manager
CA Hierarchy Stand-alone and kept offline Root CA Policy CA Issuing CA
Bank Shop Enrolment Customers Data Revocation Data Enrolment Transaction using credit Credit Card Enrolment Process
Bank Shop Customers Data Certificate Data Revocation Data Revocation List CA Server Transaction using credit Transaction using certificate Certificate Enrolment Process Enrolment Enrolment
Web Server Popeye Protocol Analyzer Olive Bluto With Popeye is sending a mail to Olive Encryption
Conclusions • Internet Protocols are NOT secured by design • Contents are usually transmitted in CLEAR text • Certificates can be used to alleviate the situation