SlideShare a Scribd company logo
1 of 13
Download to read offline
TRANSPORT
LAYER
SECURITY
01
02
Introduction
What is TLS?
What does TLS do?
Why do we need it?
The Purpose of TLS
Difference between TLS &SSL
How does TLS work?
How to detect secure connections?
Transport Layer Security, or TLS, is a widely adopted security
protocol designed to facilitate privacy and data security for
communications over the Internet. A primary use case of TLS is
encrypting the communication between web applications and
servers, such as web browsers loading a website. TLS can also
be used to encrypt other communications such as email,
messaging, and voice over IP (VoIP).
TLS was proposed by the Internet Engineering Task Force.
03
What Is TLS ?
04
What does TLS do?
Encryption
Authentication
Integrity
There are three main components to what the TLS protocol accomplishes:
Encryption: hides the data being transferred to third parties.
Authentication: ensures that the parties exchanging information are who they claim to be.
Integrity: verifies that the data has not been forged or tampered with.
05
Why do we need it?
TLS ensures that no third party may get access to tamper with any message.
The Purpose of TLS :-
T L S e n c r y p t i o n h e l p s p r o t e c t w e b a p p l i c a t i o n s a g a i n s t d a t a t a m p e r i n g a n d
e a v e s d r o p p i n g a n d i s b e c o m i n g s t a n d a r d p r a c t i c e f o r m o s t w e b s i t e s . S S L / T L S
p r o t o c o l s w e r e d e v e l o p e d t o r e s p o n d t o t h e i n c r e a s i n g n u m b e r o f s e c u r i t y
t h r e a t s a n d t h e n e e d f o r e n c r y p t i o n f r o m b o t h c l i e n t a n d s e r v e r e n d s .
T L S i s i n p l a c e t o h e l p p r o t e c t u s e r p r i v a c y a n d s e c u r i t y . W i t h o u t T L S ,
s e n s i t i v e i n f o r m a t i o n t r a n s f e r r e d o v e r t h e i n t e r n e t s u c h a s l o g i n c r e d e n t i a l s ,
p e r s o n a l i n f o r m a t i o n , a n d c r e d i t c a r d n u m b e r s a r e v u l n e r a b l e t o t h e f t . I t
w o u l d a l s o b e p o s s i b l e f o r u n k n o w n t h i r d p a r t i e s t o m o n i t o r e m a i l s , b r o w s i n g
h a b i t s , a n d d i r e c t m e s s a g e c o r r e s p o n d e n c e .
06
I n a d d i t i o n t o p r o t e c t i n g i n d i v i d u a l u s e r i n f o r m a t i o n , T L S a l s o h e l p s
p r o t e c t w e b a p p l i c a t i o n s a g a i n s t d a t a b r e a c h e s a n d d i s t r i b u t e d d e n i a l -
o f - s e r v i c e ( D D o S ) a t t a c k s . D a t a b r e a c h e s a n d D D o S a t t a c k s c a n p r o v e
t o b e i n c r e d i b l y c o s t l y t o o r g a n i z a t i o n s o f a l l s i z e s a n d c a n a l s o c a u s e
i r r e p a r a b l e d a m a g e t o c o n s u m e r t r u s t . E n s u r i n g t h a t w e b b r o w s e r s a r e
u s i n g T L S i s a n e a s y w a y t o a m p l i f y s e c u r i t y a n d h e l p p r o t e c t b o t h u s e r
a n d o r g a n i z a t i o n a l p r i v a c y .
M o s t b r o w s e r s t o d a y s u p p o r t T L S b y d e f a u l t . F o r i n s t a n c e , G o o g l e
C h r o m e a c t i v e l y w a r n s u s e r s a g a i n s t n o n - H T T P S w e b s i t e s . I n t u r n , u s e r s
a r e a l s o b e c o m i n g s a v v i e r a b o u t w e b s i t e s e c u r i t y a n d c h e c k i n g f o r
s e c u r e d a t a t r a n s f e r p r o t o c o l s . B y i n s i s t i n g o n m a n d a t o r y u s e o f T L S i n
a l l w e b - b a s e d c o m m u n i c a t i o n s , o r g a n i z a t i o n s a n d i n d i v i d u a l s c a n h e l p
e n s u r e a s h a r e d b a s i c l e v e l o f p r o t e c t i o n f o r w e b - b a s e d a c t i v i t y .
07
08
DIFFERENCE
BETWEEN TLS AND SSL ?
TLS evolved from a previous encryption protocol called Secure Sockets Layer (SSL), which was
developed by Netscape.
TLS version 1.0 actually began development as SSL version 3.1, but the name of the protocol
was changed before publication in order to indicate that it was no longer associated with
Netscape.
Because of this history, the terms TLS and SSL are sometimes used interchangeably.
09
How Does TLS Work?
TLS security is designed to use encryption from both client and server ends to help ensure a
secure connection between two or more communicating applications, guarantee
interoperability between devices, and operate with relative efficiency.
Client-server communication begins by indicating whether communications will proceed with
or without TLS protocols. The client can specify a TLS connection in a variety of ways. For
instance, the client might use a port number that supports the types of encryptions used in TLS
communications. Another potential method is to make a protocol-specific request to switch to
a TLS connection.
1 0
Chrome can display the version.
Click on the padlock icon (on the left of the URL);
A popup appears, which contains some details, including the protocol version
(e.g. "the connection uses TLS 1.0")(verified on version 21.0.1180.82).
How to detect
secure connections?
11
Presented By :
ADNANI DEV
IU1983830001
12
Any Questions?
13
Be Safe From
Noval Corona Virus
#StayAtHome
#BeSafe

More Related Content

What's hot

Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisManjushree Mashal
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 

What's hot (20)

Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Key management
Key managementKey management
Key management
 
Email security
Email securityEmail security
Email security
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
IP Security
IP SecurityIP Security
IP Security
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Https
HttpsHttps
Https
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 

Similar to Transport layer security

Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingMehrdad Jingoism
 
1Terrorism is highly d e p e n d e n t o n c a s h f.docx
1Terrorism is highly d e p e n d e n t o n  c a s h  f.docx1Terrorism is highly d e p e n d e n t o n  c a s h  f.docx
1Terrorism is highly d e p e n d e n t o n c a s h f.docxeugeniadean34240
 
Breezeway rivulet park
Breezeway   rivulet parkBreezeway   rivulet park
Breezeway rivulet parkJohn Latham
 
Scanned by CamScannerLr1I n a h i g h l y c o m pe.docx
Scanned by CamScannerLr1I n  a  h i g h l y c o m pe.docxScanned by CamScannerLr1I n  a  h i g h l y c o m pe.docx
Scanned by CamScannerLr1I n a h i g h l y c o m pe.docxkenjordan97598
 
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSE
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSEANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSE
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSEDami Ben-Omotehinse, LLM (UCL)
 
Scanned by CamScanner6 8i d e a s o r w o r ds , b u t.docx
Scanned by CamScanner6  8i d e a s  o r  w o r ds ,  b u t.docxScanned by CamScanner6  8i d e a s  o r  w o r ds ,  b u t.docx
Scanned by CamScanner6 8i d e a s o r w o r ds , b u t.docxkenjordan97598
 
Presentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptxPresentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptxEbba Ossiannilsson
 
Allora USA - Get Best Sinks and Faucets
Allora USA - Get Best Sinks and FaucetsAllora USA - Get Best Sinks and Faucets
Allora USA - Get Best Sinks and FaucetsAlloraUSAblogs
 
Cryptocurrency: The Pros and Cons
Cryptocurrency: The Pros and ConsCryptocurrency: The Pros and Cons
Cryptocurrency: The Pros and ConsAdam Bellefontaine
 
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamCYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamUniversity of Hertfordshire
 
Towards Exemplary Moodle Courses at YSJU
Towards Exemplary Moodle Courses at YSJUTowards Exemplary Moodle Courses at YSJU
Towards Exemplary Moodle Courses at YSJUPhil Vincent
 
Castlepollard Community College Coding Workshop
Castlepollard Community College Coding WorkshopCastlepollard Community College Coding Workshop
Castlepollard Community College Coding WorkshopLucy Payne
 
Scanned by CamScannerO n e o f S w ia liz e ď s e x .docx
Scanned by CamScannerO n e  o f  S w ia liz e ď  s  e x .docxScanned by CamScannerO n e  o f  S w ia liz e ď  s  e x .docx
Scanned by CamScannerO n e o f S w ia liz e ď s e x .docxanhlodge
 
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...BOMBDIGGITY, LLC
 

Similar to Transport layer security (20)

Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
1Terrorism is highly d e p e n d e n t o n c a s h f.docx
1Terrorism is highly d e p e n d e n t o n  c a s h  f.docx1Terrorism is highly d e p e n d e n t o n  c a s h  f.docx
1Terrorism is highly d e p e n d e n t o n c a s h f.docx
 
SkyLaw Celebrates its 10-Year Anniversary
SkyLaw Celebrates its 10-Year AnniversarySkyLaw Celebrates its 10-Year Anniversary
SkyLaw Celebrates its 10-Year Anniversary
 
Breezeway rivulet park
Breezeway   rivulet parkBreezeway   rivulet park
Breezeway rivulet park
 
Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...Technology as essential market infrastructure: building trusted and world-lea...
Technology as essential market infrastructure: building trusted and world-lea...
 
Untitled-1
Untitled-1Untitled-1
Untitled-1
 
Scanned by CamScannerLr1I n a h i g h l y c o m pe.docx
Scanned by CamScannerLr1I n  a  h i g h l y c o m pe.docxScanned by CamScannerLr1I n  a  h i g h l y c o m pe.docx
Scanned by CamScannerLr1I n a h i g h l y c o m pe.docx
 
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSE
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSEANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSE
ANALYSIS OF SUB-PARTICIPATION AGREEMENTS DAMILOLA BEN-OMOTEHINSE
 
Scanned by CamScanner6 8i d e a s o r w o r ds , b u t.docx
Scanned by CamScanner6  8i d e a s  o r  w o r ds ,  b u t.docxScanned by CamScanner6  8i d e a s  o r  w o r ds ,  b u t.docx
Scanned by CamScanner6 8i d e a s o r w o r ds , b u t.docx
 
Presentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptxPresentation_NVL_Island7juni2022.pptx
Presentation_NVL_Island7juni2022.pptx
 
Allora USA - Get Best Sinks and Faucets
Allora USA - Get Best Sinks and FaucetsAllora USA - Get Best Sinks and Faucets
Allora USA - Get Best Sinks and Faucets
 
portfolio2014_StK-s
portfolio2014_StK-sportfolio2014_StK-s
portfolio2014_StK-s
 
Skyals
SkyalsSkyals
Skyals
 
Cryptocurrency: The Pros and Cons
Cryptocurrency: The Pros and ConsCryptocurrency: The Pros and Cons
Cryptocurrency: The Pros and Cons
 
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue TeamCYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
 
Towards Exemplary Moodle Courses at YSJU
Towards Exemplary Moodle Courses at YSJUTowards Exemplary Moodle Courses at YSJU
Towards Exemplary Moodle Courses at YSJU
 
Castlepollard Community College Coding Workshop
Castlepollard Community College Coding WorkshopCastlepollard Community College Coding Workshop
Castlepollard Community College Coding Workshop
 
Scanned by CamScannerO n e o f S w ia liz e ď s e x .docx
Scanned by CamScannerO n e  o f  S w ia liz e ď  s  e x .docxScanned by CamScannerO n e  o f  S w ia liz e ď  s  e x .docx
Scanned by CamScannerO n e o f S w ia liz e ď s e x .docx
 
PRESS RELEASE UK.pdf
PRESS RELEASE UK.pdfPRESS RELEASE UK.pdf
PRESS RELEASE UK.pdf
 
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...
Lucky 13 List for Leaders Who Want to Engage Employees and Create Brand Ambas...
 

More from DevAdnani

Joker Analysis
Joker AnalysisJoker Analysis
Joker AnalysisDevAdnani
 
Coding principles
Coding principles Coding principles
Coding principles DevAdnani
 
JDBC : Java Database Connectivity
JDBC : Java Database Connectivity JDBC : Java Database Connectivity
JDBC : Java Database Connectivity DevAdnani
 
Amazon Case Study 2021
Amazon Case Study 2021Amazon Case Study 2021
Amazon Case Study 2021DevAdnani
 
Data mining
 Data mining Data mining
Data miningDevAdnani
 
Abstarction & Encapsulation
Abstarction & EncapsulationAbstarction & Encapsulation
Abstarction & EncapsulationDevAdnani
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in osDevAdnani
 
Women entrepreneurship
Women entrepreneurship Women entrepreneurship
Women entrepreneurship DevAdnani
 

More from DevAdnani (8)

Joker Analysis
Joker AnalysisJoker Analysis
Joker Analysis
 
Coding principles
Coding principles Coding principles
Coding principles
 
JDBC : Java Database Connectivity
JDBC : Java Database Connectivity JDBC : Java Database Connectivity
JDBC : Java Database Connectivity
 
Amazon Case Study 2021
Amazon Case Study 2021Amazon Case Study 2021
Amazon Case Study 2021
 
Data mining
 Data mining Data mining
Data mining
 
Abstarction & Encapsulation
Abstarction & EncapsulationAbstarction & Encapsulation
Abstarction & Encapsulation
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
Women entrepreneurship
Women entrepreneurship Women entrepreneurship
Women entrepreneurship
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Transport layer security

  • 2. 02 Introduction What is TLS? What does TLS do? Why do we need it? The Purpose of TLS Difference between TLS &SSL How does TLS work? How to detect secure connections?
  • 3. Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website. TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). TLS was proposed by the Internet Engineering Task Force. 03 What Is TLS ?
  • 4. 04 What does TLS do? Encryption Authentication Integrity There are three main components to what the TLS protocol accomplishes: Encryption: hides the data being transferred to third parties. Authentication: ensures that the parties exchanging information are who they claim to be. Integrity: verifies that the data has not been forged or tampered with.
  • 5. 05 Why do we need it? TLS ensures that no third party may get access to tamper with any message.
  • 6. The Purpose of TLS :- T L S e n c r y p t i o n h e l p s p r o t e c t w e b a p p l i c a t i o n s a g a i n s t d a t a t a m p e r i n g a n d e a v e s d r o p p i n g a n d i s b e c o m i n g s t a n d a r d p r a c t i c e f o r m o s t w e b s i t e s . S S L / T L S p r o t o c o l s w e r e d e v e l o p e d t o r e s p o n d t o t h e i n c r e a s i n g n u m b e r o f s e c u r i t y t h r e a t s a n d t h e n e e d f o r e n c r y p t i o n f r o m b o t h c l i e n t a n d s e r v e r e n d s . T L S i s i n p l a c e t o h e l p p r o t e c t u s e r p r i v a c y a n d s e c u r i t y . W i t h o u t T L S , s e n s i t i v e i n f o r m a t i o n t r a n s f e r r e d o v e r t h e i n t e r n e t s u c h a s l o g i n c r e d e n t i a l s , p e r s o n a l i n f o r m a t i o n , a n d c r e d i t c a r d n u m b e r s a r e v u l n e r a b l e t o t h e f t . I t w o u l d a l s o b e p o s s i b l e f o r u n k n o w n t h i r d p a r t i e s t o m o n i t o r e m a i l s , b r o w s i n g h a b i t s , a n d d i r e c t m e s s a g e c o r r e s p o n d e n c e . 06
  • 7. I n a d d i t i o n t o p r o t e c t i n g i n d i v i d u a l u s e r i n f o r m a t i o n , T L S a l s o h e l p s p r o t e c t w e b a p p l i c a t i o n s a g a i n s t d a t a b r e a c h e s a n d d i s t r i b u t e d d e n i a l - o f - s e r v i c e ( D D o S ) a t t a c k s . D a t a b r e a c h e s a n d D D o S a t t a c k s c a n p r o v e t o b e i n c r e d i b l y c o s t l y t o o r g a n i z a t i o n s o f a l l s i z e s a n d c a n a l s o c a u s e i r r e p a r a b l e d a m a g e t o c o n s u m e r t r u s t . E n s u r i n g t h a t w e b b r o w s e r s a r e u s i n g T L S i s a n e a s y w a y t o a m p l i f y s e c u r i t y a n d h e l p p r o t e c t b o t h u s e r a n d o r g a n i z a t i o n a l p r i v a c y . M o s t b r o w s e r s t o d a y s u p p o r t T L S b y d e f a u l t . F o r i n s t a n c e , G o o g l e C h r o m e a c t i v e l y w a r n s u s e r s a g a i n s t n o n - H T T P S w e b s i t e s . I n t u r n , u s e r s a r e a l s o b e c o m i n g s a v v i e r a b o u t w e b s i t e s e c u r i t y a n d c h e c k i n g f o r s e c u r e d a t a t r a n s f e r p r o t o c o l s . B y i n s i s t i n g o n m a n d a t o r y u s e o f T L S i n a l l w e b - b a s e d c o m m u n i c a t i o n s , o r g a n i z a t i o n s a n d i n d i v i d u a l s c a n h e l p e n s u r e a s h a r e d b a s i c l e v e l o f p r o t e c t i o n f o r w e b - b a s e d a c t i v i t y . 07
  • 8. 08 DIFFERENCE BETWEEN TLS AND SSL ? TLS evolved from a previous encryption protocol called Secure Sockets Layer (SSL), which was developed by Netscape. TLS version 1.0 actually began development as SSL version 3.1, but the name of the protocol was changed before publication in order to indicate that it was no longer associated with Netscape. Because of this history, the terms TLS and SSL are sometimes used interchangeably.
  • 9. 09 How Does TLS Work? TLS security is designed to use encryption from both client and server ends to help ensure a secure connection between two or more communicating applications, guarantee interoperability between devices, and operate with relative efficiency. Client-server communication begins by indicating whether communications will proceed with or without TLS protocols. The client can specify a TLS connection in a variety of ways. For instance, the client might use a port number that supports the types of encryptions used in TLS communications. Another potential method is to make a protocol-specific request to switch to a TLS connection.
  • 10. 1 0 Chrome can display the version. Click on the padlock icon (on the left of the URL); A popup appears, which contains some details, including the protocol version (e.g. "the connection uses TLS 1.0")(verified on version 21.0.1180.82). How to detect secure connections?
  • 11. 11 Presented By : ADNANI DEV IU1983830001
  • 13. 13 Be Safe From Noval Corona Virus #StayAtHome #BeSafe