tailieunhanh - Lecture Network security: Chapter 30 - Dr. Munam Ali Shah
The topic discussed in this chapter are: Secure Socket Layer (SSL), three SSL-specific protocols that use the SSL Record Protocol, integrating SSL/TLS with HTTP => HTTPS, HTTPS and SSH. This chapter you would be able to present an understanding of how web security is achieved through different protocols; you would be able demonstrate knowledge about SSH, HTTPS, TLS etc. | Network Security Lecture 30 Presented by: Dr. Munam Ali Shah Part 3 Internet Security (Last lecture of last Part) Summary of the Previous Lecture We had a discussion about following topics Email Security Pretty Good Privacy Why PGP is famous PGP Operating Message generation Message Reception Internet Mail Architecture Email Threats Outlines of today’s lecture Secure Socket Layer (SSL) Architecture Connection Session Record Protocol Service Record Protocol operation Three SSL-specific protocols that use the SSL Record Protocol SSL Change Cipher Spec Protocol Alert Protocol Handshake Protocol Integrating SSL/TLS with HTTP HTTPS HTTPS and SSH Objectives You would be able to present an understanding of how web security is achieved through different protocols. You would be able demonstrate knowledge about SSH, HTTPS, TLS etc. Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats integrity confidentiality denial . | Network Security Lecture 30 Presented by: Dr. Munam Ali Shah Part 3 Internet Security (Last lecture of last Part) Summary of the Previous Lecture We had a discussion about following topics Email Security Pretty Good Privacy Why PGP is famous PGP Operating Message generation Message Reception Internet Mail Architecture Email Threats Outlines of today’s lecture Secure Socket Layer (SSL) Architecture Connection Session Record Protocol Service Record Protocol operation Three SSL-specific protocols that use the SSL Record Protocol SSL Change Cipher Spec Protocol Alert Protocol Handshake Protocol Integrating SSL/TLS with HTTP HTTPS HTTPS and SSH Objectives You would be able to present an understanding of how web security is achieved through different protocols. You would be able demonstrate knowledge about SSH, HTTPS, TLS etc. Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats integrity confidentiality denial of service authentication need added security mechanisms 6 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats as shown briefly above, and in detail in Stallings Table . These can be described as passive attacks including eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted; and active attacks including impersonating another user, altering messages in transit between client and server, and altering information on a Web site. The web needs added security mechanisms to address these threats. Web Traffic Security Approaches A number of approaches to providing Web security are possible. The various approaches that have been considered are similar in the services they provide and, to some extent, in the mechanisms that they use, but they differ with .
đang nạp các trang xem trước