SlideShare a Scribd company logo
7
Most read
19
Most read
22
Most read
Web Security & SSL
Akhil Nadh PC
17203101
Mtech - 2017 ( IS )
NIT Jalandhar
Web Security and SSL - Secure Socket Layer
 Web Security, also known as “Cybersecurity” involves protecting that
information by preventing, detecting, and responding to attacks
Web Security: Terminologies
 Hacker
 Viruses
 Worms
 Trojan horses
 Ransomware
 KeyLoggers
 Firewalls
Web Security: Aspects
 Privacy
 Integrity
 Authentication
Web Security: Issues
<? php
mail(“recipient@yahoo.com”, ”Hi from Bill Gates”, ”Hi, I am
Bill gates” , "From: billgates@microsoft.com");
?>
From: billgates@microsoft.com
To: recipient@yahoo.com
Subject: Hi from Bill Gates
Hi, I am Bill gates
Web Security: Issues
 Malicious websites
 SPAM
 Phishing
 DDOS
How will you provide your customers safe
and secure environment on your website ?
SSL (Secure Socket Layer)
 Transport Layer Security Protocol
 Used to secure data between two
machines
 Online ID card ensures who they are
You May Know SSL
Pad Lock Browser bar turning Green https
Without SSL
Lets Fully Understand How SSL Works.
Bob is Business Owner He Owns bobsbike.biz
He wants people to be safe visiting his
Website
 He need to apply for SSL Certificate From Web Hosting company or
purchase online from third party Certificate Authority
[ VeriSign , GeoTrust , Comodo , Digicert ]
 Suppose He calls VeriSign
• Research Company
• Check the references
• and postively determine they are who they are
SSL
• Assures Identity
• Encrypt data to and fro
When Customer internet browser connect with BOB Server
• Check SSL is Valid
• What type of Encryption and Scrabling they use
Now , Bob does not have to worry about loosing customers due to
Performance Issues
Now , When Customer places Orders
 Sensitive Info is secured with SSL Certificate
 Assured Safe and Legitimate Website
Customer Gets the Bike
Bob gets the Payment
Attacker gets NOTHING..!
SSL (Secure Socket Layer)
 transport layer security service
 originally developed by Netscape
 version 3 designed with public input
 uses TCP to provide a reliable end-to-end service
 SSL has two layers of protocols
 SSL Record Protocol
 Handshake Protocol
 Change Cipher Spec Protocol
 Alert Protocol
 HTTP
Two important SSL concepts
 SSL Session:
 is an association between a client and a server.
 created by the Handshake Protocol.
 define a set of cryptographic security parameters which can be shared among multiple
connections.
 are used to avoid the expensive negotiation of new security parameters for each
connection
 SSL Connection
 A connection is a transport that provides a suitable type of service.
 are peer-to-peer relationships
 are transient.
 Every connection is associated with one session.
SSL Architecture
SSL Handshake Protocol
 allows server & client to:
 authenticate each other
 to negotiate encryption & MAC algorithms
 to negotiate cryptographic keys to be used
 comprises a series of messages in phases
1. Establish Security Capabilities
2. Server Authentication and Key Exchange
3. Client Authentication and Key Exchange
4. Finish
Web Security and SSL - Secure Socket Layer
Thank You

More Related Content

What's hot (20)

An introduction to X.509 certificates
An introduction to X.509 certificates
Stephane Potier
 
Electronic mail security
Electronic mail security
Dr.Florence Dayana
 
Web security
Web security
Padam Banthia
 
Digital Signature
Digital Signature
Mohamed Talaat
 
Cryptography ppt
Cryptography ppt
OECLIB Odisha Electronics Control Library
 
Pgp
Pgp
Reham Maher El-Safarini
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Ipsec
Ipsec
Rupesh Mishra
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Cryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
NETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Email security presentation
Email security presentation
SubhradeepMaji
 
Digital certificates
Digital certificates
Simmi Kamra
 
Email security
Email security
Ahmed EL-KOSAIRY
 
Firewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Cryptography
Cryptography
subodh pawar
 
Network Security
Network Security
MAJU
 
Secure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Encryption And Decryption
Encryption And Decryption
NA
 

Similar to Web Security and SSL - Secure Socket Layer (20)

What is TLS/SSL?
What is TLS/SSL?
Shehzad Imran
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
Sequere socket Layer
Sequere socket Layer
Raghavendra Rao
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SonukumarRawat
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx
MARIA401634
 
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
jayewi2029
 
Web Security
Web Security
Dr.Florence Dayana
 
SecureSocketLayer.ppt
SecureSocketLayer.ppt
PranavUndre1
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
BGSBU Rajouri
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__ssl
Mainak Goswami
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4
limsh
 
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
lixir25483
 
SSL
SSL
Badrul Alam bulon
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
Secure Socket Layer.pptx
Secure Socket Layer.pptx
Jenish Prajapati
 
Web Security
Web Security
Dipika Bambhaniya
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Monodip Singha Roy
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SonukumarRawat
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx
MARIA401634
 
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
jayewi2029
 
SecureSocketLayer.ppt
SecureSocketLayer.ppt
PranavUndre1
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
BGSBU Rajouri
 
Understanding transport-layer_security__ssl
Understanding transport-layer_security__ssl
Mainak Goswami
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4
limsh
 
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
lixir25483
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
Ad

More from Akhil Nadh PC (8)

Introduction to Computer basics for students
Introduction to Computer basics for students
Akhil Nadh PC
 
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
High Secure Password Authentication System
High Secure Password Authentication System
Akhil Nadh PC
 
Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.
Akhil Nadh PC
 
Linux Basic Networking Command
Linux Basic Networking Command
Akhil Nadh PC
 
Introduction to python programming [part 1]
Introduction to python programming [part 1]
Akhil Nadh PC
 
Introduction to Information Channel
Introduction to Information Channel
Akhil Nadh PC
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
Akhil Nadh PC
 
Introduction to Computer basics for students
Introduction to Computer basics for students
Akhil Nadh PC
 
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
High Secure Password Authentication System
High Secure Password Authentication System
Akhil Nadh PC
 
Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.
Akhil Nadh PC
 
Linux Basic Networking Command
Linux Basic Networking Command
Akhil Nadh PC
 
Introduction to python programming [part 1]
Introduction to python programming [part 1]
Akhil Nadh PC
 
Introduction to Information Channel
Introduction to Information Channel
Akhil Nadh PC
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
Akhil Nadh PC
 
Ad

Recently uploaded (20)

FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
GEOGRAPHY-Study Material [ Class 10th] .pdf
GEOGRAPHY-Study Material [ Class 10th] .pdf
SHERAZ AHMAD LONE
 
Analysis of Quantitative Data Parametric and non-parametric tests.pptx
Analysis of Quantitative Data Parametric and non-parametric tests.pptx
Shrutidhara2
 
LDMMIA Spring Ending Guest Grad Student News
LDMMIA Spring Ending Guest Grad Student News
LDM & Mia eStudios
 
What is FIle and explanation of text files.pptx
What is FIle and explanation of text files.pptx
Ramakrishna Reddy Bijjam
 
SPENT QUIZ NQL JR FEST 5.0 BY SOURAV.pptx
SPENT QUIZ NQL JR FEST 5.0 BY SOURAV.pptx
Sourav Kr Podder
 
Ray Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big Cycle
Dadang Solihin
 
Exploring Ocean Floor Features for Middle School
Exploring Ocean Floor Features for Middle School
Marie
 
How to Create an Event in Odoo 18 - Odoo 18 Slides
How to Create an Event in Odoo 18 - Odoo 18 Slides
Celine George
 
Black and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdf
AnnasofiaUrsini
 
BUSINESS QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 9 SEPTEMBER 2024
BUSINESS QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 9 SEPTEMBER 2024
Quiz Club of PSG College of Arts & Science
 
Publishing Your Memoir with Brooke Warner
Publishing Your Memoir with Brooke Warner
Brooke Warner
 
THERAPEUTIC COMMUNICATION included definition, characteristics, nurse patient...
THERAPEUTIC COMMUNICATION included definition, characteristics, nurse patient...
parmarjuli1412
 
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
 
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
TechSoup
 
MATERI PPT TOPIK 4 LANDASAN FILOSOFIS PENDIDIKAN
MATERI PPT TOPIK 4 LANDASAN FILOSOFIS PENDIDIKAN
aditya23173
 
Rai dyansty Chach or Brahamn dynasty, History of Dahir History of Sindh NEP.pptx
Rai dyansty Chach or Brahamn dynasty, History of Dahir History of Sindh NEP.pptx
Dr. Ravi Shankar Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18
Celine George
 
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
Arshad Shaikh
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
FEBA Sofia Univercity final diplian v3 GSDG 5.2025.pdf
ChristinaFortunova
 
GEOGRAPHY-Study Material [ Class 10th] .pdf
GEOGRAPHY-Study Material [ Class 10th] .pdf
SHERAZ AHMAD LONE
 
Analysis of Quantitative Data Parametric and non-parametric tests.pptx
Analysis of Quantitative Data Parametric and non-parametric tests.pptx
Shrutidhara2
 
LDMMIA Spring Ending Guest Grad Student News
LDMMIA Spring Ending Guest Grad Student News
LDM & Mia eStudios
 
What is FIle and explanation of text files.pptx
What is FIle and explanation of text files.pptx
Ramakrishna Reddy Bijjam
 
SPENT QUIZ NQL JR FEST 5.0 BY SOURAV.pptx
SPENT QUIZ NQL JR FEST 5.0 BY SOURAV.pptx
Sourav Kr Podder
 
Ray Dalio How Countries go Broke the Big Cycle
Ray Dalio How Countries go Broke the Big Cycle
Dadang Solihin
 
Exploring Ocean Floor Features for Middle School
Exploring Ocean Floor Features for Middle School
Marie
 
How to Create an Event in Odoo 18 - Odoo 18 Slides
How to Create an Event in Odoo 18 - Odoo 18 Slides
Celine George
 
Black and White Illustrative Group Project Presentation.pdf (1).pdf
Black and White Illustrative Group Project Presentation.pdf (1).pdf
AnnasofiaUrsini
 
Publishing Your Memoir with Brooke Warner
Publishing Your Memoir with Brooke Warner
Brooke Warner
 
THERAPEUTIC COMMUNICATION included definition, characteristics, nurse patient...
THERAPEUTIC COMMUNICATION included definition, characteristics, nurse patient...
parmarjuli1412
 
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreau’s Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
 
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
TechSoup
 
MATERI PPT TOPIK 4 LANDASAN FILOSOFIS PENDIDIKAN
MATERI PPT TOPIK 4 LANDASAN FILOSOFIS PENDIDIKAN
aditya23173
 
How to Manage Upselling of Subscriptions in Odoo 18
How to Manage Upselling of Subscriptions in Odoo 18
Celine George
 
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
PEST OF WHEAT SORGHUM BAJRA and MINOR MILLETS.pptx
Arshad Shaikh
 
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
Energy Balances Of Oecd Countries 2011 Iea Statistics 1st Edition Oecd
razelitouali
 

Web Security and SSL - Secure Socket Layer

  • 1. Web Security & SSL Akhil Nadh PC 17203101 Mtech - 2017 ( IS ) NIT Jalandhar
  • 3.  Web Security, also known as “Cybersecurity” involves protecting that information by preventing, detecting, and responding to attacks
  • 4. Web Security: Terminologies  Hacker  Viruses  Worms  Trojan horses  Ransomware  KeyLoggers  Firewalls
  • 5. Web Security: Aspects  Privacy  Integrity  Authentication
  • 6. Web Security: Issues <? php mail(“[email protected]”, ”Hi from Bill Gates”, ”Hi, I am Bill gates” , "From: [email protected]"); ?> From: [email protected] To: [email protected] Subject: Hi from Bill Gates Hi, I am Bill gates
  • 7. Web Security: Issues  Malicious websites  SPAM  Phishing  DDOS
  • 8. How will you provide your customers safe and secure environment on your website ?
  • 9. SSL (Secure Socket Layer)  Transport Layer Security Protocol  Used to secure data between two machines  Online ID card ensures who they are
  • 10. You May Know SSL Pad Lock Browser bar turning Green https
  • 12. Lets Fully Understand How SSL Works. Bob is Business Owner He Owns bobsbike.biz He wants people to be safe visiting his Website
  • 13.  He need to apply for SSL Certificate From Web Hosting company or purchase online from third party Certificate Authority [ VeriSign , GeoTrust , Comodo , Digicert ]  Suppose He calls VeriSign
  • 14. • Research Company • Check the references • and postively determine they are who they are
  • 15. SSL • Assures Identity • Encrypt data to and fro
  • 16. When Customer internet browser connect with BOB Server • Check SSL is Valid • What type of Encryption and Scrabling they use Now , Bob does not have to worry about loosing customers due to Performance Issues
  • 17. Now , When Customer places Orders  Sensitive Info is secured with SSL Certificate  Assured Safe and Legitimate Website
  • 18. Customer Gets the Bike Bob gets the Payment Attacker gets NOTHING..!
  • 19. SSL (Secure Socket Layer)  transport layer security service  originally developed by Netscape  version 3 designed with public input  uses TCP to provide a reliable end-to-end service  SSL has two layers of protocols  SSL Record Protocol  Handshake Protocol  Change Cipher Spec Protocol  Alert Protocol  HTTP
  • 20. Two important SSL concepts  SSL Session:  is an association between a client and a server.  created by the Handshake Protocol.  define a set of cryptographic security parameters which can be shared among multiple connections.  are used to avoid the expensive negotiation of new security parameters for each connection  SSL Connection  A connection is a transport that provides a suitable type of service.  are peer-to-peer relationships  are transient.  Every connection is associated with one session.
  • 22. SSL Handshake Protocol  allows server & client to:  authenticate each other  to negotiate encryption & MAC algorithms  to negotiate cryptographic keys to be used  comprises a series of messages in phases 1. Establish Security Capabilities 2. Server Authentication and Key Exchange 3. Client Authentication and Key Exchange 4. Finish