Web Security Part-1 #37



What is web security?

The web security is not safe for every user. Daily we hear about website becoming unavailable because of denial of services attacks, or displaying changed information on their pages. These articles are essential for understanding web security basics. Those articles summarize the most common attacks and explain the countermeasures every web application should implement. Essentially, these articles provide you with the knowledge needed to create better and safe web applications.

 

Different sorts of web security

HTTPS

It is the secure version of HTTPS, the full name of this protocol is Hypertext transfer protocol secure, which is the primary used to send data between a web browser and a website. No one else can access the data, because It uses TSL protocol to encrypt communications, I will explain it at the coming topic.

 

How HTTPS Works

It uses encryption communication protocol, named transport layer security (TLS), was known as secure socket layer (SSL). This encryption uses two keys, one names public key and other one names private key.

Public Key: this shared used to decrypt in information encrypted.

Private Key: this key used to decrypt information encrypted by the public key and it not shared out of the server.

 

TLS

It is the protocol in use and designed to facilities privacy, data security for communication over the internet, the use case of TLS is encrypting the communication between application and servers, emails, messaging, voice by use (VoIP).

 

How TLS Works

Any Application or website to use the TSL it must have to installed the

TLS certification (also known as an “SSL certification”) on the base server, by issued to the person or the organization that own the domain to install it on the base server. It contains very import information about the owner, private and public key to use in decrypt and encrypt the communication this process named TLS handshake steps involved.

Determined the version of the TLS will use during the session.

Authentication the identity of the server by using the TLS certificate.

Generate the session key for use during the session after the handshake process ended.

Comments

Popular posts from this blog

Hacker Directory #49

Programmer Know about following concept #21

You are Founder of Software company #20