SlideShare a Scribd company logo
1 of 16
Download to read offline
The Internet Architecure Board
The internet architecture board (IAB) is the
committee responsible for supervising the technical
and engineering development of the internet. The
IAB committee is appointed by the Internet Society
(ISOC), which is an international organization whose
mission is to encourage Internet usage. The Internet
Society has more than 100 organizational and more
than 28,000 individual members in over 80 chapters
around the world.
Originally IAB was founded by the United States
Department of Defense's ‘Defense Advanced
Research Projects Agency’ that is responsible for
development of new technology for use by the
US military. In 1979, it was named Internet
Configuration Control Board. Its name was
changed to Internet Advisory Board in 1984 and
internet Activities Board in 1986. In January 1992,
it became Internet Architecture Board under
ISOC.
Web Security
The web security is required to protect the web sites from
unauthorized access, information disclosure and data
theft. Security on the web can be ensured using the
following mechanism:
Encryption:
• It is the process of translating data into a secret code
that cannot be easily understood by the unauthorized
people. Encryption is the best technique of achieving
data security. A secret key or password is needed to read
an encrypted data. Unencrypted data is referred as plain
text while encrypted data is called cipher text.
There are two types of encryption:
• Asymmetric encryption or public - key encryption
• Symmetric encryption
Asymmetric Encryption
• This type of encryption makes use of two keys- a private
key and a public key. The private key also known as
secret key is available to the recipient of the data only
whereas the knowledge of public key is known to all.
• For instance, when Robert wants to send a message to
Jane, he uses Jane’s public key to encrypt the message.
Jane then uses her private key to decrypt the message.
In asymmetric encryption, there is a relation between
the public key and private keys in a way that for the
encryption of the messages only the public key can be
used and for the decryption, only corresponding private
key can be used.
Asymmetric
• To use asymmetric encryption, there must be a
way for people to discover other public keys. The
typical technique is to use digital certificates (also
known simply as certificates). A certificate is a
package of information that identifies a user or a
server, and contains information such as the
organization name, the organization that issued
the certificate, the user's e-mail address and
country, and the user's public key.
Symmetric Encryption
• It is a type of encryption where the same key is
used to encrypt and decrypt the data. The
sender of the information encrypts the data
using the shared keys and the receiver decrypts
the information using the same key.
Secure Sockets Layer(SSL)
Netscape developed this protocol to transmit
private data through the web. Data is encrypted
in SSL with the use of two keys, private key and
public key.
Secure HTTP: It is a protocol for transmitting data
securely over the world wide web. S-HTTP and
SSL help each other to transmit the information
securely. A connection between the client and a
server is created by SSL, over which data of any
amount can be securely sent.
•
Secure HTTP
• Another protocol for transmitting data securely over
the World Wide Web is Secure HTTP (S-HTTP)
• . Whereas SSL creates a secure connection between a
client and a server, over which any amount of data
can be sent securely, S-HTTP is designed to transmit
individual messages securely. SSL and S-HTTP,
therefore, can be seen as complementary rather than
competing tech.
• Both protocols have been approved by the Internet
Engineering Task Force (IETF) as a standard.
Firewall
• Firewalls are often used to prevent unauthorized
users on the web from accessing private networks.
• The private networks are used and maintained by the
companies to exchange business information. All the
messages that enter or leave the private network go
through the firewall. Each message is examined by
the firewall and the ones that do not fulfill the
security criteria specified, are blocked.
Security of the Web servers
It is possible to protect web servers from the
risks that can affect information security through
good security practices. Following are the practices
that can be adopted to secure the web servers:
Remove all unnecessary services from your web
server because an unnecessary service can become a
possibility of unauthorized access.
Remote server administration should be
avoided until and unless it is done using a secured
connection or password.
Cont…
The number of individuals who access the web
server should be limited.
All the server updates should be done through
intranet.
We should have intrusion detection software
(IDS) installed on web servers which inspects all the
network activities and identifies the suspicious
activities that may indicate an unauthorized access to
the web server.

More Related Content

What's hot

Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyKiran Patil
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityRubal Sagwal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingjustyogesh
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySubramanian VE
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 

What's hot (20)

Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Hacking
HackingHacking
Hacking
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Viewers also liked

Viewers also liked (20)

Cambio Tecnologico
Cambio TecnologicoCambio Tecnologico
Cambio Tecnologico
 
Catálogo 2015
Catálogo 2015Catálogo 2015
Catálogo 2015
 
De ber de compu
De ber de compuDe ber de compu
De ber de compu
 
Educacion infantil
Educacion infantilEducacion infantil
Educacion infantil
 
La pequeña comunidad y el medio ambiente
La pequeña comunidad y el medio ambienteLa pequeña comunidad y el medio ambiente
La pequeña comunidad y el medio ambiente
 
Elaboracion de paquetes turísticos
Elaboracion de paquetes turísticosElaboracion de paquetes turísticos
Elaboracion de paquetes turísticos
 
Fiche 918
Fiche 918Fiche 918
Fiche 918
 
Informe
InformeInforme
Informe
 
Digital & Análogo
Digital & AnálogoDigital & Análogo
Digital & Análogo
 
Tahini tahini sp-final_(cover_-_a4)
Tahini tahini sp-final_(cover_-_a4)Tahini tahini sp-final_(cover_-_a4)
Tahini tahini sp-final_(cover_-_a4)
 
Sintesis informativa 31 08 2015
Sintesis informativa 31 08 2015Sintesis informativa 31 08 2015
Sintesis informativa 31 08 2015
 
A Case of Chorea following ASV
A Case of Chorea following ASVA Case of Chorea following ASV
A Case of Chorea following ASV
 
LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...
LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...
LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...
 
Despertar hombre
Despertar hombreDespertar hombre
Despertar hombre
 
What do limitation periods for sanctions in antitrust
What do limitation periods for sanctions in antitrustWhat do limitation periods for sanctions in antitrust
What do limitation periods for sanctions in antitrust
 
Concepto educar-clase
Concepto educar-claseConcepto educar-clase
Concepto educar-clase
 
Amore y viajes lenguaje
Amore y viajes lenguajeAmore y viajes lenguaje
Amore y viajes lenguaje
 
Turismo
TurismoTurismo
Turismo
 
AP Collegeboard Research
AP Collegeboard ResearchAP Collegeboard Research
AP Collegeboard Research
 
Algebra lineal unidad iv y v
Algebra lineal unidad iv y vAlgebra lineal unidad iv y v
Algebra lineal unidad iv y v
 

Similar to ITFT - Web security

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionAlireza Ghahrood
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptDimpyJindal4
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionSejahtera Affif
 

Similar to ITFT - Web security (20)

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Sw2
Sw2Sw2
Sw2
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Network security
Network securityNetwork security
Network security
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 

More from Blossom Sood

ITFT - Trends in it
ITFT - Trends in itITFT - Trends in it
ITFT - Trends in itBlossom Sood
 
ITFT - Search engine
ITFT - Search engineITFT - Search engine
ITFT - Search engineBlossom Sood
 
ITFT - Number system
ITFT - Number systemITFT - Number system
ITFT - Number systemBlossom Sood
 
ITFT - Java Coding
ITFT - Java CodingITFT - Java Coding
ITFT - Java CodingBlossom Sood
 
ITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating SystemITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating SystemBlossom Sood
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorerBlossom Sood
 

More from Blossom Sood (9)

ITFT- Dbms
ITFT- DbmsITFT- Dbms
ITFT- Dbms
 
ITFT - Trends in it
ITFT - Trends in itITFT - Trends in it
ITFT - Trends in it
 
ITFT - Search engine
ITFT - Search engineITFT - Search engine
ITFT - Search engine
 
ITFT - Oops
ITFT - OopsITFT - Oops
ITFT - Oops
 
ITFT - Number system
ITFT - Number systemITFT - Number system
ITFT - Number system
 
ITFT - Java
ITFT - JavaITFT - Java
ITFT - Java
 
ITFT - Java Coding
ITFT - Java CodingITFT - Java Coding
ITFT - Java Coding
 
ITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating SystemITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating System
 
ITFT - Window explorer
ITFT - Window explorerITFT - Window explorer
ITFT - Window explorer
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

ITFT - Web security

  • 1. The Internet Architecure Board The internet architecture board (IAB) is the committee responsible for supervising the technical and engineering development of the internet. The IAB committee is appointed by the Internet Society (ISOC), which is an international organization whose mission is to encourage Internet usage. The Internet Society has more than 100 organizational and more than 28,000 individual members in over 80 chapters around the world.
  • 2. Originally IAB was founded by the United States Department of Defense's ‘Defense Advanced Research Projects Agency’ that is responsible for development of new technology for use by the US military. In 1979, it was named Internet Configuration Control Board. Its name was changed to Internet Advisory Board in 1984 and internet Activities Board in 1986. In January 1992, it became Internet Architecture Board under ISOC.
  • 3.
  • 4. Web Security The web security is required to protect the web sites from unauthorized access, information disclosure and data theft. Security on the web can be ensured using the following mechanism:
  • 5. Encryption: • It is the process of translating data into a secret code that cannot be easily understood by the unauthorized people. Encryption is the best technique of achieving data security. A secret key or password is needed to read an encrypted data. Unencrypted data is referred as plain text while encrypted data is called cipher text. There are two types of encryption: • Asymmetric encryption or public - key encryption • Symmetric encryption
  • 6. Asymmetric Encryption • This type of encryption makes use of two keys- a private key and a public key. The private key also known as secret key is available to the recipient of the data only whereas the knowledge of public key is known to all. • For instance, when Robert wants to send a message to Jane, he uses Jane’s public key to encrypt the message. Jane then uses her private key to decrypt the message. In asymmetric encryption, there is a relation between the public key and private keys in a way that for the encryption of the messages only the public key can be used and for the decryption, only corresponding private key can be used.
  • 7. Asymmetric • To use asymmetric encryption, there must be a way for people to discover other public keys. The typical technique is to use digital certificates (also known simply as certificates). A certificate is a package of information that identifies a user or a server, and contains information such as the organization name, the organization that issued the certificate, the user's e-mail address and country, and the user's public key.
  • 8.
  • 9. Symmetric Encryption • It is a type of encryption where the same key is used to encrypt and decrypt the data. The sender of the information encrypts the data using the shared keys and the receiver decrypts the information using the same key.
  • 10.
  • 11. Secure Sockets Layer(SSL) Netscape developed this protocol to transmit private data through the web. Data is encrypted in SSL with the use of two keys, private key and public key. Secure HTTP: It is a protocol for transmitting data securely over the world wide web. S-HTTP and SSL help each other to transmit the information securely. A connection between the client and a server is created by SSL, over which data of any amount can be securely sent. •
  • 12. Secure HTTP • Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP) • . Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing tech. • Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.
  • 13. Firewall • Firewalls are often used to prevent unauthorized users on the web from accessing private networks. • The private networks are used and maintained by the companies to exchange business information. All the messages that enter or leave the private network go through the firewall. Each message is examined by the firewall and the ones that do not fulfill the security criteria specified, are blocked.
  • 14.
  • 15. Security of the Web servers It is possible to protect web servers from the risks that can affect information security through good security practices. Following are the practices that can be adopted to secure the web servers: Remove all unnecessary services from your web server because an unnecessary service can become a possibility of unauthorized access. Remote server administration should be avoided until and unless it is done using a secured connection or password.
  • 16. Cont… The number of individuals who access the web server should be limited. All the server updates should be done through intranet. We should have intrusion detection software (IDS) installed on web servers which inspects all the network activities and identifies the suspicious activities that may indicate an unauthorized access to the web server.