SlideShare a Scribd company logo
1 of 33
SSL:
What it is, How to do it, &
Why you should care
WordCamp Chicago 2017
Hello!
A bit about me…
@jessicacgardner
1.
SSL: What it is
HTTP Review
HTTPS
The 3 main things
◎Authentication and Verification
◎Privacy/Data Encryption
◎Data Integrity
Jargon & Acronyms
◎SSL – Secure Socket Layer
◎TLS – Transport Layer Security
◎HTTPS – Hypertext Transfer Protocol Secure
◎PKI – Public Key Infrastructure
◎CA – Certificate Authority
◎CSR – Certificate Signing Request
Image: https://thenocman.com/ssl-certificates/
Image: https://www.codeproject.com/Articles/326574/An-Introduction-to-Mutual-SSL-Authentication
2.
Why you should care
Who Needs It?
◎E-Commerce– PCI Compliance
◎Entertainment- DRM
◎Market Research
◎Productivity
◎Social Media
◎Education/Testing
◎Sensitive Form Data
3.
How to do it
You’ll Need…
Certificate contents
◎Domain name (common name)
◎Public key
◎Owner of certificate (subject)
◎Issuer of certificate (CA)
◎Expiration data
◎Serial number
Types of Certificates
◎Domain Validation – CA checks right of
applicant to use domain name
◎Organization Validation – CA does above +
vets organization
◎Extended Validation – CA does above +
thorough vetting of organization
Self-Signed vs Trusted CA
◎Self-Signed: generally used for testing.
Offers encryption but not validation. Will give
errors.
Trusted Certificate Authorities
◎Client (browser) checks certificate validity
◎OCSP request (Online Certificate Status
Protocol)
◎CRL – Certificate Revocation List
○If revoked, client returns error
○If clear, communications proceed
Let’s Encrypt (Yes, Let’s!)
◎Free, automated, open certificate
◎Non-profit Internet Security Research Group
◎Domain validation
◎No warranty
◎3-month expiry
◎Update Site URL from http:// to https://
◎Force http requests to https
Issues and Caveats
◎Moving a site
◎Cloud Proxy
◎Mixed/Unsecure content
Removing SSL
◎wp-config.php
◎.htaccess
◎Updating site URL (functions.php)
Thanks!
Any questions?
You can find me at:
@jessicacgardner
jessica@btwrx.com
Resources
◎SSL Server Test:
https://www.ssllabs.com/ssltest/
◎Why No Padlock?
https://www.whynopadlock.com/
◎CryptoReport
https://cryptoreport.websecurity.symantec.com/
checker/

More Related Content

What's hot

Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big Data
Vihang Patel
 

What's hot (20)

OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
20180426 legal challenges related to blockchain technology
20180426 legal challenges related to blockchain technology20180426 legal challenges related to blockchain technology
20180426 legal challenges related to blockchain technology
 
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
 
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
 
BOTCHAIN aka The Dark side of Blockchain
BOTCHAIN aka The Dark side of BlockchainBOTCHAIN aka The Dark side of Blockchain
BOTCHAIN aka The Dark side of Blockchain
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Authorization Using JWTs
Authorization Using JWTsAuthorization Using JWTs
Authorization Using JWTs
 
How you can support Bitcoin today | ProvenCrypto
How you can support Bitcoin today | ProvenCryptoHow you can support Bitcoin today | ProvenCrypto
How you can support Bitcoin today | ProvenCrypto
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big Data
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
Particl Project - Privacy Focused Decentralized Applications
Particl Project - Privacy Focused Decentralized ApplicationsParticl Project - Privacy Focused Decentralized Applications
Particl Project - Privacy Focused Decentralized Applications
 
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
 
Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018 Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018
 
Corporate Web Systems
Corporate Web SystemsCorporate Web Systems
Corporate Web Systems
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
What is Cryptocurrency Mining?
What is Cryptocurrency Mining?What is Cryptocurrency Mining?
What is Cryptocurrency Mining?
 
Introduction to Distributed Ledger Technology or Blockchain
Introduction to Distributed Ledger Technology or BlockchainIntroduction to Distributed Ledger Technology or Blockchain
Introduction to Distributed Ledger Technology or Blockchain
 

Similar to SSL: What is it, How to do it, and Why you should care

Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
Nizar Ben Neji
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similar to SSL: What is it, How to do it, and Why you should care (20)

Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Cryptography
CryptographyCryptography
Cryptography
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
2
22
2
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

SSL: What is it, How to do it, and Why you should care