secure socket layer (ssl) & web security

24
Web Security & SSL Akhil Nadh PC 17203101 Mtech - 2017 ( IS ) NIT Jalandhar

Upload: akhil-nadh-pc

Post on 28-Jan-2018

77 views

Category:

Engineering


5 download

TRANSCRIPT

Page 1: Secure Socket Layer (SSL) & Web Security

Web Security & SSL

Akhil Nadh PC17203101 Mtech - 2017 ( IS )

NIT Jalandhar

Page 2: Secure Socket Layer (SSL) & Web Security
Page 3: Secure Socket Layer (SSL) & Web Security

Web Security, also known as “Cybersecurity” involves protecting that

information by preventing, detecting, and responding to attacks

Page 4: Secure Socket Layer (SSL) & Web Security

Web Security: Terminologies

Hacker

Viruses

Worms

Trojan horses

Ransomware

KeyLoggers

Firewalls

Page 5: Secure Socket Layer (SSL) & Web Security

Web Security: Aspects

Privacy

Integrity

Authentication

Page 6: Secure Socket Layer (SSL) & Web Security

Web Security: Issues

<? phpmail(“[email protected]”, ”Hi from Bill Gates”, ”Hi, I amBill gates” , "From: [email protected]");

?>

From: [email protected]

To: [email protected]

Subject: Hi from Bill GatesHi, I am Bill gates

Page 7: Secure Socket Layer (SSL) & Web Security

Web Security: Issues

Malicious websites

SPAM

Phishing

DDOS

Page 8: Secure Socket Layer (SSL) & Web Security

How will you provide your customers safe and secure environment on your website ?

Page 9: Secure Socket Layer (SSL) & Web Security

SSL (Secure Socket Layer)

Transport Layer Security Protocol Used to secure data between two

machines Online ID card ensures who they are

Page 10: Secure Socket Layer (SSL) & Web Security

You May Know SSL

Pad Lock Browser bar turning Green https

Page 11: Secure Socket Layer (SSL) & Web Security

Without SSL

Page 12: Secure Socket Layer (SSL) & Web Security

Lets Fully Understand How SSL Works.

Bob is Business Owner He Owns bobsbike.bizHe wants people to be safe visiting hisWebsite

Page 13: Secure Socket Layer (SSL) & Web Security

He need to apply for SSL Certificate From Web Hosting company or purchase online from third party Certificate Authority

[ VeriSign , GeoTrust , Comodo , Digicert ]

Suppose He calls VeriSign

Page 14: Secure Socket Layer (SSL) & Web Security

• Research Company • Check the references • and postively determine they are who they are

Page 15: Secure Socket Layer (SSL) & Web Security

SSL• Assures Identity • Encrypt data to and fro

Page 16: Secure Socket Layer (SSL) & Web Security

When Customer internet browser connect with BOB Server• Check SSL is Valid• What type of Encryption and Scrabling they use

Now , Bob does not have to worry about loosing customers due to Performance Issues

Page 17: Secure Socket Layer (SSL) & Web Security

Now , When Customer places Orders Sensitive Info is secured with SSL Certificate

Assured Safe and Legitimate Website

Page 18: Secure Socket Layer (SSL) & Web Security

Customer Gets the BikeBob gets the PaymentAttacker gets NOTHING..!

Page 19: Secure Socket Layer (SSL) & Web Security

SSL (Secure Socket Layer)

transport layer security service

originally developed by Netscape

version 3 designed with public input

uses TCP to provide a reliable end-to-end service

SSL has two layers of protocols

SSL Record Protocol

Handshake Protocol

Change Cipher Spec Protocol

Alert Protocol

HTTP

Page 20: Secure Socket Layer (SSL) & Web Security

Two important SSL concepts

SSL Session:

is an association between a client and a server.

created by the Handshake Protocol.

define a set of cryptographic security parameters which can be shared among multiple connections.

are used to avoid the expensive negotiation of new security parameters for each connection

SSL Connection

A connection is a transport that provides a suitable type of service.

are peer-to-peer relationships

are transient.

Every connection is associated with one session.

Page 21: Secure Socket Layer (SSL) & Web Security

SSL Architecture

Page 22: Secure Socket Layer (SSL) & Web Security

SSL Handshake Protocol

allows server & client to:

authenticate each other

to negotiate encryption & MAC algorithms

to negotiate cryptographic keys to be used

comprises a series of messages in phases

1. Establish Security Capabilities

2. Server Authentication and Key Exchange

3. Client Authentication and Key Exchange

4. Finish

Page 23: Secure Socket Layer (SSL) & Web Security
Page 24: Secure Socket Layer (SSL) & Web Security

Thank You