We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTravon Tarrant
Modified about 1 year ago
By: Hassan Waqar
A PROTOCOL for securely transmitting data via the internet. NETWORK LAYER application. Developed by NETSCAPE.
When a web browser accesses a site secured by an SSL certificate, the following events happen: “SSL Handshake”
Browser (client) asks the server (website) for its identity. Server provides its SSL Certificate. Browser examines validity of the certificate.
If trusted, the browser sends confirmation to server. The web server replies with a digitally-signed message that starts SSL-encrypted exchange of information (“session”).
Uses PUBLIC KEY and PRIVATE KEY to encrypt data. Server sends the public key. Browser (client) checks to ensure it trusts the server.
The private key is used to encrypt information passed to the browser, which can then be decrypted with the public key.
128-bit keys It allows 340,282,366,920,938,463,463,374,607,431,76 8,211,456 unique encryptions codes.
1. Authentication between client and server: cryptographic techniques. 2. Ensuring data integrity. 3. Securing data privacy.
1. Domain Validation (DV) For the domain to approve the CSR. Validate domain owner and what they intend to use the domain for.
2. Organization Validation (OV) “high assurance” certificates ensures the identity of the domain owner aids in identifying potential “phishing” activities.
3. Extended Validation (EV) display the green URL bar promise users the safest possible experience checks the identity and confirms the authenticity.
Admin issues a Certificate Signing Request. CA validates information and issues SSL Certificate Admin installs certificate on the server. Expires within 1 to 3 years.
SSL has more recently known as Transport Layer Security (TLS).
ure_socket_layer.html ure_socket_layer.html Layer Layer
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
What is. Digital Certificate It is an identity.
Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Chapter 17: WEB COMPONENTS By Chuong Vu. Chapter Contents Current Web Components and Concerns Web protocols – SSL/TLS, HTTP/HTTPS, DAP/LDAP, FTP/SFTP.
Encrypting Wireless Data with VPN Techniques. Topics Objectives VPN Overview Common VPN Protocols Conclusion.
Chapter 10 Implementing Electronic Commerce Security Gary Schneider, 2003.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
12/01/ Protection of Information Assets (25%) 3. Protection of Information Assets 3. Protection of Information Assets (25%) Protecting Personal &
INTERNET MARKETING CHAPTER 6 Electronic Payment Systems Pranjoy Arup Das
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Peer-to-peer and agent-based computing Security in Distributed Systems.
The Dirty Little Secret of the Internet Jothy Rosenberg Chief Technology Officer & Co-founder November 2001.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 4: There’s more to it than RACF.
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Introduction to Computer Security. Common Security Terminology Password Cracking Biometrics Public Key Cryptography SSL Man-in-the-Middle Attack Zombies.
An Introduction to Distributed Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Enabling Secure Internet Access with ISA Server. Enabling Secure Access to Internet Resources What Is Secure Access to Internet Resources? –Users can.
BA J. Galván1 SECURITY Needs of security for e-commerce.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Chapter 3 E-Payment Systems eb-course.weebly.com.
Security Controls and Systems in E-Commerce Prof. Mohamed Aly Aboul - Dahab Head of Electronic and communications Engineering Department Arab Academy for.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Intrusion Detection and Intrusion Prevention.
1 A Tutorial on Web Security for E-Commerce. 2 Web Concepts for E-Commerce Client/Server Applications Communication Channels TCP/IP.
Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
Information technology security Fundamentals of Information Technology Session 8.
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Security - Authentication Protocols and Authorisation CS3517 Distributed Systems and Security Lecture 21.
Public Key Infrastructure What can it do for you?.
© 2016 SlidePlayer.com Inc. All rights reserved.