Web Security Part-1 #37
What is web security?
The web security is not safe for every user. Daily we
hear about website becoming unavailable because of denial of services attacks,
or displaying changed information on their pages. These articles are essential
for understanding web security basics. Those articles summarize the most common
attacks and explain the countermeasures every web application should implement.
Essentially, these articles provide you with the knowledge needed to create
better and safe web applications.
Different sorts of web security
HTTPS
It is the secure
version of HTTPS, the full name of this protocol is Hypertext transfer protocol
secure, which is the primary used to send data between a web browser and a
website. No one else can access the data, because It uses TSL protocol to
encrypt communications, I will explain it at the coming topic.
How HTTPS Works
It uses encryption
communication protocol, named transport layer security (TLS), was known as
secure socket layer (SSL). This encryption uses two keys, one names public key
and other one names private key.
Public Key: this
shared used to decrypt in information encrypted.
Private Key: this
key used to decrypt information encrypted by the public key and it not shared
out of the server.
TLS
It is the protocol
in use and designed to facilities privacy, data security for communication over
the internet, the use case of TLS is encrypting the communication between
application and servers, emails, messaging, voice by use (VoIP).
How TLS Works
Any Application or
website to use the TSL it must have to installed the
TLS certification
(also known as an “SSL certification”) on the base server, by issued to the
person or the organization that own the domain to install it on the base
server. It contains very import information about the owner, private and public
key to use in decrypt and encrypt the communication this process named TLS
handshake steps involved.
Determined the
version of the TLS will use during the session.
Authentication the
identity of the server by using the TLS certificate.
Generate the
session key for use during the session after the handshake process ended.
Comments
Post a Comment
Thanks you
for comment and your suggestion