Who can you trust on the Internet?

Why use the Internet

Disintermediation - the good and the bad

Unique Security Requirements

The Web’s Effect on Security

The Web’s Effect on Security

The Web: A Common Interface to Multiple Systems

Points of vulnerability

Likely points of attack

Likely points of attack

Tools that help us secure our systems

Encryption for confidentiality and integrity

Authentication

Kerberos

Secure Sockets Layer (and TLS)

Trust models for certification

The future of system compromise

Attacking the client

Protecting the client

Today’s security deployment

Focus on Authorization

Integrating security services

ID and Audit relation to GAA-API

The future of secure computing