SlideShare a Scribd company logo
1 of 21
HTTP
 VS
HTTPS
FLOW :
ο‚— What is Internet.
ο‚— OSI Model & TCP/IP Model.
ο‚— HTTP Protocol.
ο‚— HTTPS Protocol.
ο‚— Conclusion.
INTERNET
ο‚— Want to meet new people, do exciting
  things, shop at convenience, explore new world?
  Want to stay at home too? You can do
  simultaneously , when you go online.

ο‚— The Internet is a global system of interconnected
  computer networks

ο‚— WWW, email, social networking, file
  transfer, online
  chat, commerce, teleconferencing, VoIP, video
  on demand etc.

ο‚— Internet is tangible network of computers
  sharing/exchanging information with the help of
  PROTOCOLS.
Internet Protocols
ο‚— Protocol is a form of etiquette. Prescribed guide for conduct or action

ο‚— Computers have to know in advance exactly how information is to be
  exchanged and precisely what the format will be

ο‚— Internet Protocols are the standards ,designed to specify how computers
  interact and exchange messages over internet.

ο‚— Protocols usually specifies:
                ο‚— The format of the messages.
                ο‚— How to handle errors.


ο‚— To simplify the design and implementation of protocols, designers have
  decided to design a set of protocols, each has different responsibilities
  instead of one protocol responsible for all forms of communication.
OSI MODEL
                    Layer          Function
                    Application    Provides services directly to an
                                   application program
                    Presentation   Presentation of information to
                                   user in a format that the user
                                   will understand
                    Session        Controls the user to user
Lower Layer                        dialogue – its direction and
connects one node                  synchronization
to another          Transport      Raises the quality of service
                                   provided by the network to the
                                   level required by user

                    Layer          Function
                    Network        Choosing the next node in the
                                   network & the link to it.
                                   packages output with the
                                   correct network address
                                   information.
                    Data Link      Controls the flow of messages
                                   on the chosen link
                    Physical       Connecting to the physical
                                   medium that provides the link
TCP/IP Model
ο‚— This model is a condensed version
  of the OSI model and only has
  four layers.

ο‚— TCP/IP Protocols are considered to
  be standards around which the
  internet has been developed. The
  OSI model however is a
  "generic, protocol- independent
  standard.”
HTTP
ο‚— HTTP stands for Hypertext
  Transfer Protocol.
ο‚— HTTP provides a set of rules and
  standards that govern how
  information is transmitted on
  the World Wide Web.
ο‚— Computers on the World Wide
  Web use the HyperText Transfer
  Protocol to talk with each other
ο‚— http://www.google.co.in


ο‚— The first part of an address
  (URL) of a site on the
  Internet, signifying a document
  written in Hypertext Markup
  Language (HTML).
ο‚— HTTP is a client-server protocol by which two machines communicate using a
    reliable, connection-oriented transport service such as the TCP.

        ο‚—   A browser is an HTTP client because it sends requests to an HTTP server (Web server), which
            then sends responses back to the client

        ο‚—   An HTTP server is a program that sits listening on a machine's port for HTTP requests.

        ο‚—   The standard (and default) port for HTTP servers to listen on is 80, though they can use any
            port.

ο‚— HTTP can be "implemented on top of any other protocol on the Internet, or on
    other networks.β€œ

ο‚—   HTTP only presumes a reliable transport; any protocol that provides such
    guarantees can be used.” e.g.TCP.
ο‚— HTTP is stateless. The lifetime of a connection corresponds to a single
  request-response sequence

      ο‚—   An HTTP client opens a tcp/ip connection to the server via a
          socket, transmits a request for a document, then waits for a reply from the
          server. Once the request-response sequence is completed, the socket is
          closed.

      ο‚—   There is no "memory" between client connections.

      ο‚—   The pure HTTP server implementation treats every request as if it was
          brand-new.

      ο‚—   Http pages are stored on your computer and internet caches. The pages load
          faster, but they are stored on systems that you potentially don't have control
          over.eg: ISP's caching proxy
How HTTP Works
ο‚— HTTP Server is implemented by Apache HTTP Server Β· Microsoft IIS Β·
  Jigsaw Β· Zope etc.
ο‚— Each client-server transaction, whether a request or a
  response, consists of three main parts
   ο‚— A response or request line
   ο‚— Header information
   ο‚— The body
Advantages of HTTP
ο‚— Platform independent- Allows Straight cross platform porting.


ο‚— No Runtime support required to run properly.


ο‚— Usable over Firewalls! Global applications possible.


ο‚— Not Connection Oriented- No network overhead to create and
  maintain session state and information.
HTTP Limitations

Security Concerns
   ο‚— Privacy
         ο‚—   Anyone can see content

   ο‚— Integrity
         ο‚—   Someone might alter content. HTTP is insecure since no encryption methods are used.
             Hence is subject to man in the middle and eavesdropping of sensitive information.

   ο‚— Authentication
         ο‚—   Not clear who you are talking with. Authentication is sent in the clear β€” Anyone who
             intercepts the request can determine the username and password being used.



ο‚— Stateless - Need State management techniques to maintain the
  information across multiple request-response cycles.
HTTPS
ο‚— HTTPS stands for Hypertext
  Transfer Protocol over Secure
  Socket Layer, or HTTP over SSL.

ο‚— SSL acts like a sub layer under
  regular HTTP application
  layering.

ο‚— HTTPS encrypts an HTTP
  message prior to transmission
  and decrypts a message upon
  arrival.
ο‚— HTTPS by default uses port 443 as opposed to the standard HTTP port
  of 80.

ο‚— URL's beginning with HTTPS indicate that the connection between
  client and browser is encrypted using SSL
  e.g.: https://login.yahoo.com/config/login_verify2?&.src=ym

ο‚— SSL transactions are negotiated by means of a key based encryption
  algorithm between the client and the server, this key is usually either
  40 or 128 bits in strength (the higher the number of bits the more
  secure the transaction).
ο‚— Need SSL if…
      ο‚—   you have an online store or accept online orders and credit cards
      ο‚—   you offer a login or sign in on your site
      ο‚—   you process sensitive data such as address, birth date, license, or ID numbers
      ο‚—   you need to comply with privacy and security requirements

  Certification Authority (CA) is an entity that issues digital certificates for use
  by other parties. It is an example of a trusted third party.
   e.g. VeriSign, Thwate, Geotrust etc

ο‚— Ability to connect to server via HTTP secure consists of:
      ο‚—    Generating key
      ο‚—    Generating certificate signing request
      ο‚—    Generating self signed certificate
      ο‚—    Certificate Authority signed certificate
      ο‚—    Configuring web server.
SSL Diagram
ο‚—   When any modern browser is installed, it is sent with
    several CA issuer certificates. These issuer certificates
    contain a public key for the issuer, among other
    information.

ο‚—   When a web designer decides to use SSL he needs to
    purchase a certificate that is signed using the CA's
    private key.

ο‚—   The web browser starts a connection to an HTTPS site.
    Along with this request the client sends all supported
    encryption schemes.

ο‚—   As a response to the browser's connection request, the
    Server sends a copy of the certificate from step 2. Along
    with this transmission is the server's answer to the
    encryption negotiation.

ο‚—   Once a certificate is downloaded, the signature of the
    certificate (that was signed using the CA's private key) is
    checked using the CA's public key (installed in the
    browser in step 1.

ο‚—   The connection succeeds, the client can now download
    and upload to the web site with the security of
    encryption.
SSL Handshake
ο‚— A HTTP-based SSL connection is always initiated by the client using a
  URL starting with https:// instead of with http://.
ο‚— At the beginning of an SSL session, an SSL handshake is performed
ο‚— This handshake produces the cryptographic parameters of the session.
ο‚— Simplified Overview:
How SSL Overcomes HTTP Security Concerns

ο‚— Secure Sockets Layer technology protects your Web site and makes it
  easy for your Web site visitors to trust you in three essential ways:

   ο‚— Privacy
     ο‚— An SSL Certificate enables encryption of sensitive information during online
        transactions.


   ο‚— Integrity.
     ο‚— A Certificate Authority verifies the identity of the certificate owner when it is issued.



   ο‚— Authentication.
     ο‚— Each SSL Certificate contains unique, authenticated information about the certificate
       owner.
Limitations of HTTPS
ο‚— An HTTPS server can only provide one "virtual host" behind a single socket, as
  opposed to multiple ones behind an http socket.
   ο‚— This is because all security negotiation takes place before the HTTP protocol starts &
       hence before the server knows which URL the client is asking for.


ο‚— HTTPS cannot prevent stealing confidential information from the pages
  cached on the browser.
   ο‚—    Since in SSL data is encrypted only during transmission on the network, it is in clear
       text in the browser memory


ο‚— HTTPS is slightly slower than HTTP.
   ο‚— HTTPS adds computational overhead as well as network overhead.
Conclusion
ο‚— The HTTP network protocol is fundamental to the way the World Wide
  Web works, and the encryption involved in HTTPS adds an essential
  layer if confidential information or sensitive data are to be exchanged
  over the public internet.

ο‚— Hence, If a website ever asks you to enter your credit card
  information, you should automatically look to see if the web address
  begins with https://. If it doesn't, there's no way you're going to enter
  sensitive information like a credit card number! 
Thank You

More Related Content

What's hot

Proxy Server
Proxy ServerProxy Server
Proxy Serverguest095022
Β 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
Β 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
Β 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
Β 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerNishant Pahad
Β 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Shimona Agarwal
Β 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation Lana Dujanovic
Β 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) RochakSrivastava3
Β 
Http Introduction
Http IntroductionHttp Introduction
Http IntroductionAkshay Dhole
Β 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
Β 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
Β 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
Β 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
Β 
Http protocol
Http protocolHttp protocol
Http protocolArpita Naik
Β 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash AlgorithmVishakha Agarwal
Β 

What's hot (20)

Proxy Server
Proxy ServerProxy Server
Proxy Server
Β 
Https
HttpsHttps
Https
Β 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Β 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
Β 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Β 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Β 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Β 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Β 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Β 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
Β 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
Β 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
Β 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
Β 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Β 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
Β 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Β 
Cia security model
Cia security modelCia security model
Cia security model
Β 
Http protocol
Http protocolHttp protocol
Http protocol
Β 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
Β 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
Β 

Similar to Http Vs Https .

Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxtodd401
Β 
application layer
application layerapplication layer
application layerBishalWosti1
Β 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
Β 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
Β 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
Β 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01mdmohinuddin8
Β 
1 web technologies
1 web technologies1 web technologies
1 web technologiesJalpesh Vasa
Β 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp portssujanakumari1
Β 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4limsh
Β 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptxAbshar Fatima
Β 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
Β 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommercepriyanka Garg
Β 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
Β 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
Β 

Similar to Http Vs Https . (20)

Ssl https
Ssl httpsSsl https
Ssl https
Β 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Β 
internet protocol
internet protocolinternet protocol
internet protocol
Β 
application layer
application layerapplication layer
application layer
Β 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
Β 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
Β 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
Β 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Β 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
Β 
1 web technologies
1 web technologies1 web technologies
1 web technologies
Β 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp ports
Β 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4
Β 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Β 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
Β 
App layer
App layerApp layer
App layer
Β 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
Β 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
Β 
Api 101
Api 101Api 101
Api 101
Β 
Ports and services
Ports and servicesPorts and services
Ports and services
Β 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
Β 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Β 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Β 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Β 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
Β 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Β 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Β 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
Β 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Β 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Β 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Β 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
Β 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
Β 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
Β 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Β 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Β 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Β 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Β 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Β 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Β 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Β 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Β 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Β 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Β 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Β 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Β 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Β 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Β 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Β 

Http Vs Https .

  • 2. FLOW : ο‚— What is Internet. ο‚— OSI Model & TCP/IP Model. ο‚— HTTP Protocol. ο‚— HTTPS Protocol. ο‚— Conclusion.
  • 3. INTERNET ο‚— Want to meet new people, do exciting things, shop at convenience, explore new world? Want to stay at home too? You can do simultaneously , when you go online. ο‚— The Internet is a global system of interconnected computer networks ο‚— WWW, email, social networking, file transfer, online chat, commerce, teleconferencing, VoIP, video on demand etc. ο‚— Internet is tangible network of computers sharing/exchanging information with the help of PROTOCOLS.
  • 4. Internet Protocols ο‚— Protocol is a form of etiquette. Prescribed guide for conduct or action ο‚— Computers have to know in advance exactly how information is to be exchanged and precisely what the format will be ο‚— Internet Protocols are the standards ,designed to specify how computers interact and exchange messages over internet. ο‚— Protocols usually specifies: ο‚— The format of the messages. ο‚— How to handle errors. ο‚— To simplify the design and implementation of protocols, designers have decided to design a set of protocols, each has different responsibilities instead of one protocol responsible for all forms of communication.
  • 5. OSI MODEL Layer Function Application Provides services directly to an application program Presentation Presentation of information to user in a format that the user will understand Session Controls the user to user Lower Layer dialogue – its direction and connects one node synchronization to another Transport Raises the quality of service provided by the network to the level required by user Layer Function Network Choosing the next node in the network & the link to it. packages output with the correct network address information. Data Link Controls the flow of messages on the chosen link Physical Connecting to the physical medium that provides the link
  • 6. TCP/IP Model ο‚— This model is a condensed version of the OSI model and only has four layers. ο‚— TCP/IP Protocols are considered to be standards around which the internet has been developed. The OSI model however is a "generic, protocol- independent standard.”
  • 7. HTTP ο‚— HTTP stands for Hypertext Transfer Protocol. ο‚— HTTP provides a set of rules and standards that govern how information is transmitted on the World Wide Web. ο‚— Computers on the World Wide Web use the HyperText Transfer Protocol to talk with each other ο‚— http://www.google.co.in ο‚— The first part of an address (URL) of a site on the Internet, signifying a document written in Hypertext Markup Language (HTML).
  • 8. ο‚— HTTP is a client-server protocol by which two machines communicate using a reliable, connection-oriented transport service such as the TCP. ο‚— A browser is an HTTP client because it sends requests to an HTTP server (Web server), which then sends responses back to the client ο‚— An HTTP server is a program that sits listening on a machine's port for HTTP requests. ο‚— The standard (and default) port for HTTP servers to listen on is 80, though they can use any port. ο‚— HTTP can be "implemented on top of any other protocol on the Internet, or on other networks.β€œ ο‚— HTTP only presumes a reliable transport; any protocol that provides such guarantees can be used.” e.g.TCP.
  • 9. ο‚— HTTP is stateless. The lifetime of a connection corresponds to a single request-response sequence ο‚— An HTTP client opens a tcp/ip connection to the server via a socket, transmits a request for a document, then waits for a reply from the server. Once the request-response sequence is completed, the socket is closed. ο‚— There is no "memory" between client connections. ο‚— The pure HTTP server implementation treats every request as if it was brand-new. ο‚— Http pages are stored on your computer and internet caches. The pages load faster, but they are stored on systems that you potentially don't have control over.eg: ISP's caching proxy
  • 10. How HTTP Works ο‚— HTTP Server is implemented by Apache HTTP Server Β· Microsoft IIS Β· Jigsaw Β· Zope etc. ο‚— Each client-server transaction, whether a request or a response, consists of three main parts ο‚— A response or request line ο‚— Header information ο‚— The body
  • 11. Advantages of HTTP ο‚— Platform independent- Allows Straight cross platform porting. ο‚— No Runtime support required to run properly. ο‚— Usable over Firewalls! Global applications possible. ο‚— Not Connection Oriented- No network overhead to create and maintain session state and information.
  • 12. HTTP Limitations Security Concerns ο‚— Privacy ο‚— Anyone can see content ο‚— Integrity ο‚— Someone might alter content. HTTP is insecure since no encryption methods are used. Hence is subject to man in the middle and eavesdropping of sensitive information. ο‚— Authentication ο‚— Not clear who you are talking with. Authentication is sent in the clear β€” Anyone who intercepts the request can determine the username and password being used. ο‚— Stateless - Need State management techniques to maintain the information across multiple request-response cycles.
  • 13. HTTPS ο‚— HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. ο‚— SSL acts like a sub layer under regular HTTP application layering. ο‚— HTTPS encrypts an HTTP message prior to transmission and decrypts a message upon arrival.
  • 14. ο‚— HTTPS by default uses port 443 as opposed to the standard HTTP port of 80. ο‚— URL's beginning with HTTPS indicate that the connection between client and browser is encrypted using SSL e.g.: https://login.yahoo.com/config/login_verify2?&.src=ym ο‚— SSL transactions are negotiated by means of a key based encryption algorithm between the client and the server, this key is usually either 40 or 128 bits in strength (the higher the number of bits the more secure the transaction).
  • 15. ο‚— Need SSL if… ο‚— you have an online store or accept online orders and credit cards ο‚— you offer a login or sign in on your site ο‚— you process sensitive data such as address, birth date, license, or ID numbers ο‚— you need to comply with privacy and security requirements Certification Authority (CA) is an entity that issues digital certificates for use by other parties. It is an example of a trusted third party. e.g. VeriSign, Thwate, Geotrust etc ο‚— Ability to connect to server via HTTP secure consists of: ο‚— Generating key ο‚— Generating certificate signing request ο‚— Generating self signed certificate ο‚— Certificate Authority signed certificate ο‚— Configuring web server.
  • 16. SSL Diagram ο‚— When any modern browser is installed, it is sent with several CA issuer certificates. These issuer certificates contain a public key for the issuer, among other information. ο‚— When a web designer decides to use SSL he needs to purchase a certificate that is signed using the CA's private key. ο‚— The web browser starts a connection to an HTTPS site. Along with this request the client sends all supported encryption schemes. ο‚— As a response to the browser's connection request, the Server sends a copy of the certificate from step 2. Along with this transmission is the server's answer to the encryption negotiation. ο‚— Once a certificate is downloaded, the signature of the certificate (that was signed using the CA's private key) is checked using the CA's public key (installed in the browser in step 1. ο‚— The connection succeeds, the client can now download and upload to the web site with the security of encryption.
  • 17. SSL Handshake ο‚— A HTTP-based SSL connection is always initiated by the client using a URL starting with https:// instead of with http://. ο‚— At the beginning of an SSL session, an SSL handshake is performed ο‚— This handshake produces the cryptographic parameters of the session. ο‚— Simplified Overview:
  • 18. How SSL Overcomes HTTP Security Concerns ο‚— Secure Sockets Layer technology protects your Web site and makes it easy for your Web site visitors to trust you in three essential ways: ο‚— Privacy ο‚— An SSL Certificate enables encryption of sensitive information during online transactions. ο‚— Integrity. ο‚— A Certificate Authority verifies the identity of the certificate owner when it is issued. ο‚— Authentication. ο‚— Each SSL Certificate contains unique, authenticated information about the certificate owner.
  • 19. Limitations of HTTPS ο‚— An HTTPS server can only provide one "virtual host" behind a single socket, as opposed to multiple ones behind an http socket. ο‚— This is because all security negotiation takes place before the HTTP protocol starts & hence before the server knows which URL the client is asking for. ο‚— HTTPS cannot prevent stealing confidential information from the pages cached on the browser. ο‚— Since in SSL data is encrypted only during transmission on the network, it is in clear text in the browser memory ο‚— HTTPS is slightly slower than HTTP. ο‚— HTTPS adds computational overhead as well as network overhead.
  • 20. Conclusion ο‚— The HTTP network protocol is fundamental to the way the World Wide Web works, and the encryption involved in HTTPS adds an essential layer if confidential information or sensitive data are to be exchanged over the public internet. ο‚— Hence, If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://. If it doesn't, there's no way you're going to enter sensitive information like a credit card number! 