SlideShare uma empresa Scribd logo
1 de 20
HTTP vs. HTTPS, Do You Really
Need HTTPS?
A closer look at why HTTPS is the ideal way
to serve your website
• HTTP is the now 15-year-old protocol on which the world wide web was built.
HTTP stands for “hypertext transfer protocol” and offers a method of data
communication for the Internet.
• The problem with HTTP connections is that they are unsecured. This means that
any data transferred with the HTTP protocol is out in the open-it means that it can
be intercepted and even manipulated by third parties.
• To combat this, SSL or Secure Sockets Layer was created. SSL is a protocol for
encrypting communication so that it can no longer be seen or affected by third
parties.
• As SSL evolved it was replaced by TLS, or Transport Layer Security. Both
accomplish the same goal, TLS is just a more secure way of encrypting that
information.
• The rise of SSL/TLS gave way to HTTPS, also called HTTP over TLS. This is a
secure protocol for communication over the Internet.
• HTTPS is by far superior to HTTP, yet many around the web have yet to adopt
the protocol.
• In this article we will look at some of the reasons you should start using HTTPS
and also address some myths and misconceptions about HTTPS.
Myth: HTTPS is Slower
• One of the biggest reasons that website have failed to adopt the HTTPS protocol is that there is a
belief among many around the web that HTTPS is slower.
• Speed is everything on the Internet, having a delay in load times can be seen as a major problem
by many web hosts and site operators.
• Fortunately, this is a myth. HTTPS is actually much faster than HTTP.
• But don’t take our word for it, there are numerous websites you can go to that test this theory
and prove our point.
• Our favorite is HTTPvsHTTPS.com. Upon running the test three times on our 85 mbps connection
the site loaded 82% faster using the HTTPS protocol than it did via the HTTP protocol.
• This is just one example, and results may vary based on connection speed and a range of
other factors, but the idea that HTTP is somehow a faster protocol is absolute myth.
HTTPS Improves Google Search Rankings
• Serving your website over HTTPS offers more than just a secure connection for you and
your site’s visitors.
• It also can increase your Google search rankings. Google, which is typically pretty tight-
lipped about its search algorithm, announced back in 2014 that it would start using
HTTPS as a ranking signal.
• Google is one of the biggest names in the web industry, a titan if you will, and this is a
clear nod from it that Secure Socket Layer and serving your website over HTTPS is of
increasing importance.
• Especially with the advent of HTTP/2, the successor to HTTP, which requires an
encrypted connection in order to work.
• But back to the SEO benefits that HTTPS and SSL/TLS can provide, every boost you can give your
business when it comes to your search rankings is integral to your success. No, having an
encrypted connection won’t replace the need for regular dynamic content and running a good site.
• But it could be the difference between page one and page two. And that has a major impact on
both your bottom line and your business’ reputation.
Encryption Protects Your Website from Attacks
• There are a couple kinds of attacks that can occur over HTTP that are simply not
possible using the HTTPS protocol.
• One of them is the MITM (Man in the Middle) attack. During the MITM two
parties that think they are directly communicating are having that
communication intercepted and either stolen or altered.
• As you can imagine, this can be disastrous, especially if your website and its
visitors are exchanging personal information or financial information.
• However, with an encrypted connection this kind of attack is easily prevented.
• The other kind of attack, or perhaps more appropriately, interference, is content injection. Have
you ever noticed that when you access the Internet on an airplane, that airline’s ads appear all
over the web pages you visit? That’s an example of content injection.
• During content injection, websites served over HTTP can have content injected by anyone in the
chain of custody. This means ads or other content can make their way on to your website without
your consent. Or in other words, the integrity of your website is being affected by a third party.
• Content injection can also be malicious. Whether it be a malicious piece of code or some other sort
of content that’s being injected, a third party can easily affect your website over the HTTP
protocol.
Enabling HTTPS with SSL
• In order to enable HTTPS, you must first purchase an SSL/TLS certificate. But before we get to that, a bit of
background. SSL is actually outmoded; it’s just become the colloquial term for TLS at this point.
• So you’re not really purchasing an SSL certificate anymore, you’re purchasing a TLS certificate – it’s just that most
CA’s and re-sellers still refer to it as SSL.
• Now back to enabling HTTPS. The first step is to purchase an SSL/TLS certificate. Then it’s just a matter of
installing the certificate properly and configuring your server to enable it.
• Some servers will refer to it as “enabling SSL,” others refer to it as “enabling HTTPS.” Either way, you need to
configure your server so that your entire website – every single page, not just login and checkout screens – is
served on HTTPS.
• This is the only way to see the full benefit of SSL/TLS, and also the only way to get an SEO boost from it.
• After that communication to and from your website is secure and can make use of the
HTTP/2 protocol as that becomes more widely adopted.
• But it all starts with selecting the right SSL/TLS certificate for your needs.
Mobile Security with HTTPS
• HTTPS also protects traffic on mobile devices. This is extremely important as
more and more people are using their phones to surf the Internet and make e-
commerce purchases.
• The good news is that the vast majority of SSL/TLS certificates are mobile
friendly, meaning that once you purchase one, install it and configure your server
correctly, you’re good to go on mobile devices.
• But what about apps? Well, both Apple and Google, two of the leaders in the mobile phone industry, are pushing
mobile apps towards encryption by default.
• Apple has App Transport Security on its iOS, while Google has the usesCleartextTraffic manifest attribute on
Android.
• Apple’s ATS is pushing towards encryption a little harder as its default setting is to have encryption on, while
on the Android platform it’s not.
• But both are making a clear indication that HTTPS is becoming the standard.
Types of SSL Security
• So by now it’s become obvious that encryption is a must, the future of the
Internet is largely contingent upon it. But what type of SSL/TLS certificate is
right for you?
• There are three basic types of SSL/TLS certificate
• Domain Validation
• Organization Validation
• Extended Validation.
• All three offer the same level of encryption. But there are some fairly sizable
differences beyond just that.
Domain Validation SSL
• Domain Validation certificates are perfect for small non-e-commerce websites
like blogs and personal sites.
• They simply require you to prove ownership over the domain and you can
encrypt.
• In fact, some companies have even begun to offer no-frills, encryption only DV
certificates for free.
Organization Validation SSL
• Above that are Organization Validation SSL/TLS certificates.
• These offer a degree of business authentication, meaning that the Certificate Authority
that’s issuing it will vet your company to ensure that it is indeed legitimate.
• The downside to OV certs is that the visual indicators are nearly identical to EV certs
and often people miss the vital details that come with having your business
authenticated.
• These certificates are good for larger enterprise businesses that already have
outstanding reputations.
Extended Validation SSL
• The top-of-the-line SSL/TLS certificates are Extended Validation.
• These require the most vetting but also unlock the most obvious visual indicators a
green address bar with your organization’s name in it.
• These certificates offer an ideal level of business authentication, come with the best
trust seals – another visual indicator of SSL encryption – and are often packaged with
other high-end security products to make them a better value.
• They’re also proven to increase conversions and ultimately will pay for themselves.
Conclusion
• The Internet is on the precipice of a huge shift from HTTP to HTTP/2. With it, will come
new requirements for websites to display properly. Soon, websites being served over
HTTP will receive browser warnings about being unsecured. This will dissuade
potential traffic from visiting and will have adverse effects on your website.
• The only way to avoid this and stay ahead of the changes is to encrypt and start serving
your site over the HTTPS protocol. This may sound like a lot, but really it’s as simple as
purchasing or acquiring an SSL/TLS certificate, installing it correctly and configuring
your server to use HTTPS.
• The choice is yours – and it should be an obvious one.
Important Resources
• Real time SSL certificate checker tool
• How crucial a trust seal to influence e-Commerce business ROI
• Cyber Attacks and SSL Security
For More Information on HTTPS
Blog: cheapsslsecurity.com/blog
Facebook: CheapSSLSecurities
Twitter: SSLSecurity
Google Plus: +Cheapsslsecurity

Mais conteúdo relacionado

Mais procurados

Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 

Mais procurados (20)

SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual Authentication
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Basics of ssl
Basics of sslBasics of ssl
Basics of ssl
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Email security
Email securityEmail security
Email security
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Digital signature
Digital signatureDigital signature
Digital signature
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 

Semelhante a HTTP vs HTTPS, Do You Really Need HTTPS?

Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
guestb2ed5f
 
Let's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How? - WC PuneLet's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How? - WC Pune
Nancy Thanki
 

Semelhante a HTTP vs HTTPS, Do You Really Need HTTPS? (20)

Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
Important Things To Know In SEO
Important Things To Know In SEOImportant Things To Know In SEO
Important Things To Know In SEO
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
Ssl pinning and hsts header
Ssl pinning and hsts headerSsl pinning and hsts header
Ssl pinning and hsts header
 
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of BlacklistingShift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
 
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
 
WordPress and SSL
WordPress and SSLWordPress and SSL
WordPress and SSL
 
Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy server
 
HTTPS
HTTPSHTTPS
HTTPS
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
 
Maximizing SPDY and SSL Performance (June 2014)
Maximizing SPDY and SSL Performance (June 2014)Maximizing SPDY and SSL Performance (June 2014)
Maximizing SPDY and SSL Performance (June 2014)
 
Improve your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdfImprove your site’s credibility on SERPs with an SSL certificate.pdf
Improve your site’s credibility on SERPs with an SSL certificate.pdf
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 
Let's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How? - WC PuneLet's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How? - WC Pune
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Http vs https
Http vs httpsHttp vs https
Http vs https
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 

Mais de CheapSSLsecurity

Mais de CheapSSLsecurity (20)

What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurityTLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
 
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH ErrorHow to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
 
Apache Server: Common SSL Errors and Troubleshooting Guide
Apache Server: Common SSL Errors and Troubleshooting GuideApache Server: Common SSL Errors and Troubleshooting Guide
Apache Server: Common SSL Errors and Troubleshooting Guide
 
Multi Domain Wildcard Features explained by CheapSSLsecurity
Multi Domain Wildcard Features explained by CheapSSLsecurityMulti Domain Wildcard Features explained by CheapSSLsecurity
Multi Domain Wildcard Features explained by CheapSSLsecurity
 
Various Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and KeytoolVarious Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and Keytool
 
What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
Understanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by SymantecUnderstanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by Symantec
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains SecurityThawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to know
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerceWhy Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
 

Último

Último (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

HTTP vs HTTPS, Do You Really Need HTTPS?

  • 1. HTTP vs. HTTPS, Do You Really Need HTTPS?
  • 2. A closer look at why HTTPS is the ideal way to serve your website • HTTP is the now 15-year-old protocol on which the world wide web was built. HTTP stands for “hypertext transfer protocol” and offers a method of data communication for the Internet. • The problem with HTTP connections is that they are unsecured. This means that any data transferred with the HTTP protocol is out in the open-it means that it can be intercepted and even manipulated by third parties.
  • 3. • To combat this, SSL or Secure Sockets Layer was created. SSL is a protocol for encrypting communication so that it can no longer be seen or affected by third parties. • As SSL evolved it was replaced by TLS, or Transport Layer Security. Both accomplish the same goal, TLS is just a more secure way of encrypting that information. • The rise of SSL/TLS gave way to HTTPS, also called HTTP over TLS. This is a secure protocol for communication over the Internet. • HTTPS is by far superior to HTTP, yet many around the web have yet to adopt the protocol. • In this article we will look at some of the reasons you should start using HTTPS and also address some myths and misconceptions about HTTPS.
  • 4. Myth: HTTPS is Slower • One of the biggest reasons that website have failed to adopt the HTTPS protocol is that there is a belief among many around the web that HTTPS is slower. • Speed is everything on the Internet, having a delay in load times can be seen as a major problem by many web hosts and site operators. • Fortunately, this is a myth. HTTPS is actually much faster than HTTP. • But don’t take our word for it, there are numerous websites you can go to that test this theory and prove our point. • Our favorite is HTTPvsHTTPS.com. Upon running the test three times on our 85 mbps connection the site loaded 82% faster using the HTTPS protocol than it did via the HTTP protocol.
  • 5. • This is just one example, and results may vary based on connection speed and a range of other factors, but the idea that HTTP is somehow a faster protocol is absolute myth.
  • 6. HTTPS Improves Google Search Rankings • Serving your website over HTTPS offers more than just a secure connection for you and your site’s visitors. • It also can increase your Google search rankings. Google, which is typically pretty tight- lipped about its search algorithm, announced back in 2014 that it would start using HTTPS as a ranking signal. • Google is one of the biggest names in the web industry, a titan if you will, and this is a clear nod from it that Secure Socket Layer and serving your website over HTTPS is of increasing importance. • Especially with the advent of HTTP/2, the successor to HTTP, which requires an encrypted connection in order to work.
  • 7. • But back to the SEO benefits that HTTPS and SSL/TLS can provide, every boost you can give your business when it comes to your search rankings is integral to your success. No, having an encrypted connection won’t replace the need for regular dynamic content and running a good site. • But it could be the difference between page one and page two. And that has a major impact on both your bottom line and your business’ reputation.
  • 8. Encryption Protects Your Website from Attacks • There are a couple kinds of attacks that can occur over HTTP that are simply not possible using the HTTPS protocol. • One of them is the MITM (Man in the Middle) attack. During the MITM two parties that think they are directly communicating are having that communication intercepted and either stolen or altered. • As you can imagine, this can be disastrous, especially if your website and its visitors are exchanging personal information or financial information. • However, with an encrypted connection this kind of attack is easily prevented.
  • 9. • The other kind of attack, or perhaps more appropriately, interference, is content injection. Have you ever noticed that when you access the Internet on an airplane, that airline’s ads appear all over the web pages you visit? That’s an example of content injection. • During content injection, websites served over HTTP can have content injected by anyone in the chain of custody. This means ads or other content can make their way on to your website without your consent. Or in other words, the integrity of your website is being affected by a third party. • Content injection can also be malicious. Whether it be a malicious piece of code or some other sort of content that’s being injected, a third party can easily affect your website over the HTTP protocol.
  • 10. Enabling HTTPS with SSL • In order to enable HTTPS, you must first purchase an SSL/TLS certificate. But before we get to that, a bit of background. SSL is actually outmoded; it’s just become the colloquial term for TLS at this point. • So you’re not really purchasing an SSL certificate anymore, you’re purchasing a TLS certificate – it’s just that most CA’s and re-sellers still refer to it as SSL. • Now back to enabling HTTPS. The first step is to purchase an SSL/TLS certificate. Then it’s just a matter of installing the certificate properly and configuring your server to enable it. • Some servers will refer to it as “enabling SSL,” others refer to it as “enabling HTTPS.” Either way, you need to configure your server so that your entire website – every single page, not just login and checkout screens – is served on HTTPS. • This is the only way to see the full benefit of SSL/TLS, and also the only way to get an SEO boost from it.
  • 11. • After that communication to and from your website is secure and can make use of the HTTP/2 protocol as that becomes more widely adopted. • But it all starts with selecting the right SSL/TLS certificate for your needs.
  • 12. Mobile Security with HTTPS • HTTPS also protects traffic on mobile devices. This is extremely important as more and more people are using their phones to surf the Internet and make e- commerce purchases. • The good news is that the vast majority of SSL/TLS certificates are mobile friendly, meaning that once you purchase one, install it and configure your server correctly, you’re good to go on mobile devices.
  • 13. • But what about apps? Well, both Apple and Google, two of the leaders in the mobile phone industry, are pushing mobile apps towards encryption by default. • Apple has App Transport Security on its iOS, while Google has the usesCleartextTraffic manifest attribute on Android. • Apple’s ATS is pushing towards encryption a little harder as its default setting is to have encryption on, while on the Android platform it’s not. • But both are making a clear indication that HTTPS is becoming the standard.
  • 14. Types of SSL Security • So by now it’s become obvious that encryption is a must, the future of the Internet is largely contingent upon it. But what type of SSL/TLS certificate is right for you? • There are three basic types of SSL/TLS certificate • Domain Validation • Organization Validation • Extended Validation. • All three offer the same level of encryption. But there are some fairly sizable differences beyond just that.
  • 15. Domain Validation SSL • Domain Validation certificates are perfect for small non-e-commerce websites like blogs and personal sites. • They simply require you to prove ownership over the domain and you can encrypt. • In fact, some companies have even begun to offer no-frills, encryption only DV certificates for free.
  • 16. Organization Validation SSL • Above that are Organization Validation SSL/TLS certificates. • These offer a degree of business authentication, meaning that the Certificate Authority that’s issuing it will vet your company to ensure that it is indeed legitimate. • The downside to OV certs is that the visual indicators are nearly identical to EV certs and often people miss the vital details that come with having your business authenticated. • These certificates are good for larger enterprise businesses that already have outstanding reputations.
  • 17. Extended Validation SSL • The top-of-the-line SSL/TLS certificates are Extended Validation. • These require the most vetting but also unlock the most obvious visual indicators a green address bar with your organization’s name in it. • These certificates offer an ideal level of business authentication, come with the best trust seals – another visual indicator of SSL encryption – and are often packaged with other high-end security products to make them a better value. • They’re also proven to increase conversions and ultimately will pay for themselves.
  • 18. Conclusion • The Internet is on the precipice of a huge shift from HTTP to HTTP/2. With it, will come new requirements for websites to display properly. Soon, websites being served over HTTP will receive browser warnings about being unsecured. This will dissuade potential traffic from visiting and will have adverse effects on your website. • The only way to avoid this and stay ahead of the changes is to encrypt and start serving your site over the HTTPS protocol. This may sound like a lot, but really it’s as simple as purchasing or acquiring an SSL/TLS certificate, installing it correctly and configuring your server to use HTTPS. • The choice is yours – and it should be an obvious one.
  • 19. Important Resources • Real time SSL certificate checker tool • How crucial a trust seal to influence e-Commerce business ROI • Cyber Attacks and SSL Security
  • 20. For More Information on HTTPS Blog: cheapsslsecurity.com/blog Facebook: CheapSSLSecurities Twitter: SSLSecurity Google Plus: +Cheapsslsecurity