SlideShare uma empresa Scribd logo
1 de 34
HTTPS and YOU
What is HTTP?
(or, how does the Internet work?)
How HTTP works
HTTP request
I want to see a webpage
nytimes.com/index.html
How HTTP works
HTTP request
HTTP Response
Here’s the content of index.html
Why is HTTP insecure?
Request data is unencrypted, and
servers don’t need to provide their
identity over HTTP
HTTP is unencrypted. The data can be
read by any intermediary.
HTTP request
Insecure wifi
Attacker can read the user’s
HTTP request and response.
“Hmm, looks like Eric is
interested in Twitter stock…”
I want to see a
webpage
nytimes.com/twitter-
stock-plummets/
HTTP is unencrypted. The data can be
read by any intermediary.
HTTP request
Insecure wifi
I wonder what a jorf is…
Log into my
WordPress site with
my username “eric”
and my password
“jorf”
HTTP request
I want to see a webpage
nytimes.com/index.html
An attacker can catch the
request (DNS Spoofing, etc)
HTTP doesn’t require server identification.
Any intermediary can spoof a request.
HTTP request
The attacker returns spoofed content of index.html
which says Russia bombed the U.S.
HTTP Response
HTTP doesn’t require server identification.
Any intermediary can spoof a request.
What security does HTTPS provide?
All data in the request is encrypted,
except the delivery address.
HTTPS request
Send to 182.23.194.39
Fwu3489fehu9fr93wehufu9ef89y3
hu9efhiufhr803
(encrypted request data)
I want to see a
webpage
nytimes.com/index.ht
ml
All data in the request is encrypted,
except the delivery address.
HTTPS request
Send to 212.39.10.88
sdfj83jof83hfajnksdc83hud08duh3
8dhe8y38h383
(encrypted response data)
HTTPS response
Here’s the
content of
index.html
HTTPS request
HTTPS is encrypted. The data can’t be
read by any intermediary.
Insecure wifi
Attacker can eavesdrop on the
encrypted conversation, but
doesn’t understand it.
Log into my
WordPress site with
my username “eric”
and my password
“jorf”
Send to 182.23.194.39
Fwu3489fehu9fr9ufu9ef89
y3hu9efhiufhr803
(encrypted request data)
I want to see a
webpage
nytimes.com/index.html
The attacker can’t spoof
the server’s identification.
HTTPS requires server identification.
An intermediary can’t spoof a request.
HTTPS request
Only the server with valid identification
can respond to the request.
HTTPS requires server identification.
An intermediary can’t spoof a request.
HTTPS request
HTTPS request
“What if I don’t care about security?”
“What if I don’t care about security?”
• Google gives an SEO boost for HTTPS sites.
“What if I don’t care about security?”
• Google gives an SEO boost for HTTPS sites.
• Your site can be faster on HTTPS with HTTP/2,
which requires HTTPS.
“What if I don’t care about security?”
• Google gives an SEO boost for HTTPS sites.
• Your site can be faster on HTTPS with HTTP/2,
which requires HTTPS.
• New browser features and APIs limited to
HTTPS sites.
What is HTTPS not?
Try logging into a
WordPress site as “eric”
with password “a”
HTTPS does not protect from brute
force attacks.
Now try logging into a
WordPress site as “eric”
with password “b”
HTTPS does not protect from brute
force attacks.
How does HTTPS work?
How does HTTPS work?
A server needs an SSL certificate and a private
key.
During the HTTPS handshake…
Server sends SSL certificate.
An SSL certificate includes a digital signature to
identify the server, and a public key to assist
with encryption.
Browser and server negotiate
encryption with private/public key
encryption
Certificate Authority (CA).
A trusted organization.
How can a server provide
identity?
I really am nytimes.com,
not some middle-man
hacker!
Certificate Authority verifies a
server.
I really am nytimes.com,
not some middle-man
hacker! Yes, we verified you
are.
After verification, a Certificate
Authority provides an SSL certificate.
Here’s an SSL
certificate.
The digital signature proves that
the CA created the certificate.
Browsers trust SSL certificates
created by specific Certificate
Authorities.

Mais conteúdo relacionado

Mais procurados

Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
Stefan Achtsnit
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
Derek Perkins
 

Mais procurados (20)

Using OAuth with PHP
Using OAuth with PHPUsing OAuth with PHP
Using OAuth with PHP
 
Token Based Authentication Systems with AngularJS & NodeJS
Token Based Authentication Systems with AngularJS & NodeJSToken Based Authentication Systems with AngularJS & NodeJS
Token Based Authentication Systems with AngularJS & NodeJS
 
JSON Web Token
JSON Web TokenJSON Web Token
JSON Web Token
 
2016 pycontw web api authentication
2016 pycontw web api authentication 2016 pycontw web api authentication
2016 pycontw web api authentication
 
Json web token api authorization
Json web token api authorizationJson web token api authorization
Json web token api authorization
 
JWT Authentication with AngularJS
JWT Authentication with AngularJSJWT Authentication with AngularJS
JWT Authentication with AngularJS
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
muCon 2016: Authentication in Microservice Systems By David Borsos
muCon 2016: Authentication in Microservice Systems By David BorsosmuCon 2016: Authentication in Microservice Systems By David Borsos
muCon 2016: Authentication in Microservice Systems By David Borsos
 
第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
 
20190516 web security-basic
20190516 web security-basic20190516 web security-basic
20190516 web security-basic
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
 
What the Heck is OAuth and Open ID Connect? - UberConf 2017
What the Heck is OAuth and Open ID Connect? - UberConf 2017What the Heck is OAuth and Open ID Connect? - UberConf 2017
What the Heck is OAuth and Open ID Connect? - UberConf 2017
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Micro Web Service - Slim and JWT
Micro Web Service - Slim and JWTMicro Web Service - Slim and JWT
Micro Web Service - Slim and JWT
 
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
 

Destaque

The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...
Angelo State University
 

Destaque (8)

The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...
 
рисинка
рисинкарисинка
рисинка
 
Commodore 64 Mon Amour
Commodore 64 Mon AmourCommodore 64 Mon Amour
Commodore 64 Mon Amour
 
Let's go HTTPS
Let's go HTTPSLet's go HTTPS
Let's go HTTPS
 
Refactoring to a Single Page Application
Refactoring to a Single Page ApplicationRefactoring to a Single Page Application
Refactoring to a Single Page Application
 
Single-Page Application Design Principles 101
Single-Page Application Design Principles 101Single-Page Application Design Principles 101
Single-Page Application Design Principles 101
 
The road to Ember.js 2.0
The road to Ember.js 2.0The road to Ember.js 2.0
The road to Ember.js 2.0
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?
 

Semelhante a HTTPS and YOU

How the SSL/TLS protocol works (very briefly) How to use HTTPS
How the SSL/TLS protocol works  (very briefly) How to use HTTPSHow the SSL/TLS protocol works  (very briefly) How to use HTTPS
How the SSL/TLS protocol works (very briefly) How to use HTTPS
whj76337
 
The Identity Problem of the Web and how to solve it
The Identity Problem of the Web and how to solve itThe Identity Problem of the Web and how to solve it
The Identity Problem of the Web and how to solve it
Bastian Hofmann
 
Crossing the Boundaries of Web Applications with OpenSocial
Crossing the Boundaries of Web Applications with OpenSocialCrossing the Boundaries of Web Applications with OpenSocial
Crossing the Boundaries of Web Applications with OpenSocial
Bastian Hofmann
 

Semelhante a HTTPS and YOU (20)

How the SSL/TLS protocol works (very briefly) How to use HTTPS
How the SSL/TLS protocol works  (very briefly) How to use HTTPSHow the SSL/TLS protocol works  (very briefly) How to use HTTPS
How the SSL/TLS protocol works (very briefly) How to use HTTPS
 
The Identity Problem of the Web and how to solve it
The Identity Problem of the Web and how to solve itThe Identity Problem of the Web and how to solve it
The Identity Problem of the Web and how to solve it
 
Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!Firesheep & HTTPS, Explained!
Firesheep & HTTPS, Explained!
 
Crossing the Boundaries of Web Applications with OpenSocial
Crossing the Boundaries of Web Applications with OpenSocialCrossing the Boundaries of Web Applications with OpenSocial
Crossing the Boundaries of Web Applications with OpenSocial
 
Important Things To Know In SEO
Important Things To Know In SEOImportant Things To Know In SEO
Important Things To Know In SEO
 
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
HTTPS: What, Why and How (SmashingConf Freiburg, Sep 2015)
 
Simple Principles for Website Security
Simple Principles for Website SecuritySimple Principles for Website Security
Simple Principles for Website Security
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use cases
 
Technical SEO
Technical SEOTechnical SEO
Technical SEO
 
An Introduction to OpenID
An Introduction to OpenIDAn Introduction to OpenID
An Introduction to OpenID
 
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
 
HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??HTTP VS. HTTPS: WHICH IS BETTER??
HTTP VS. HTTPS: WHICH IS BETTER??
 
HTTP Services & REST API Security
HTTP Services & REST API SecurityHTTP Services & REST API Security
HTTP Services & REST API Security
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 
Intrigue Core: Scaling Assessment Automation
Intrigue Core: Scaling Assessment AutomationIntrigue Core: Scaling Assessment Automation
Intrigue Core: Scaling Assessment Automation
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
HTTPS
HTTPSHTTPS
HTTPS
 
Building Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and PaillierBuilding Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and Paillier
 
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

HTTPS and YOU

  • 2. What is HTTP? (or, how does the Internet work?)
  • 3. How HTTP works HTTP request I want to see a webpage nytimes.com/index.html
  • 4. How HTTP works HTTP request HTTP Response Here’s the content of index.html
  • 5. Why is HTTP insecure?
  • 6. Request data is unencrypted, and servers don’t need to provide their identity over HTTP
  • 7. HTTP is unencrypted. The data can be read by any intermediary. HTTP request Insecure wifi Attacker can read the user’s HTTP request and response. “Hmm, looks like Eric is interested in Twitter stock…” I want to see a webpage nytimes.com/twitter- stock-plummets/
  • 8. HTTP is unencrypted. The data can be read by any intermediary. HTTP request Insecure wifi I wonder what a jorf is… Log into my WordPress site with my username “eric” and my password “jorf”
  • 9. HTTP request I want to see a webpage nytimes.com/index.html An attacker can catch the request (DNS Spoofing, etc) HTTP doesn’t require server identification. Any intermediary can spoof a request.
  • 10. HTTP request The attacker returns spoofed content of index.html which says Russia bombed the U.S. HTTP Response HTTP doesn’t require server identification. Any intermediary can spoof a request.
  • 11. What security does HTTPS provide?
  • 12. All data in the request is encrypted, except the delivery address. HTTPS request Send to 182.23.194.39 Fwu3489fehu9fr93wehufu9ef89y3 hu9efhiufhr803 (encrypted request data) I want to see a webpage nytimes.com/index.ht ml
  • 13. All data in the request is encrypted, except the delivery address. HTTPS request Send to 212.39.10.88 sdfj83jof83hfajnksdc83hud08duh3 8dhe8y38h383 (encrypted response data) HTTPS response Here’s the content of index.html
  • 14. HTTPS request HTTPS is encrypted. The data can’t be read by any intermediary. Insecure wifi Attacker can eavesdrop on the encrypted conversation, but doesn’t understand it. Log into my WordPress site with my username “eric” and my password “jorf” Send to 182.23.194.39 Fwu3489fehu9fr9ufu9ef89 y3hu9efhiufhr803 (encrypted request data)
  • 15. I want to see a webpage nytimes.com/index.html The attacker can’t spoof the server’s identification. HTTPS requires server identification. An intermediary can’t spoof a request. HTTPS request
  • 16. Only the server with valid identification can respond to the request. HTTPS requires server identification. An intermediary can’t spoof a request. HTTPS request HTTPS request
  • 17. “What if I don’t care about security?”
  • 18. “What if I don’t care about security?” • Google gives an SEO boost for HTTPS sites.
  • 19. “What if I don’t care about security?” • Google gives an SEO boost for HTTPS sites. • Your site can be faster on HTTPS with HTTP/2, which requires HTTPS.
  • 20. “What if I don’t care about security?” • Google gives an SEO boost for HTTPS sites. • Your site can be faster on HTTPS with HTTP/2, which requires HTTPS. • New browser features and APIs limited to HTTPS sites.
  • 22. Try logging into a WordPress site as “eric” with password “a” HTTPS does not protect from brute force attacks.
  • 23. Now try logging into a WordPress site as “eric” with password “b” HTTPS does not protect from brute force attacks.
  • 24. How does HTTPS work?
  • 25. How does HTTPS work? A server needs an SSL certificate and a private key.
  • 26. During the HTTPS handshake… Server sends SSL certificate.
  • 27. An SSL certificate includes a digital signature to identify the server, and a public key to assist with encryption.
  • 28. Browser and server negotiate encryption with private/public key encryption
  • 29. Certificate Authority (CA). A trusted organization.
  • 30. How can a server provide identity? I really am nytimes.com, not some middle-man hacker!
  • 31. Certificate Authority verifies a server. I really am nytimes.com, not some middle-man hacker! Yes, we verified you are.
  • 32. After verification, a Certificate Authority provides an SSL certificate. Here’s an SSL certificate.
  • 33. The digital signature proves that the CA created the certificate.
  • 34. Browsers trust SSL certificates created by specific Certificate Authorities.