SlideShare a Scribd company logo
1 of 13
SSL (Secure Socket Layer)
It provides security on the Internet It allows you to
interact with banks, send passwords and keep
your data safe.
I use it at my job and have set up servers to
use it. It is a valuable tool for any organization
By Joseph Geneva
SSL (and TLS)
How it works.
The risks
Why it matters
How it works in Two pictures
How it all works
[1]
Puzzle Pieces
Swap Pieces
Share secret
Send secret code
Secure data
[2]
Common security risks
Two good ways to test for them
Security online
Not verified
Verified
Test connection
http://www.networking4all.com/en/support/tools/site+check/
Bad connection
Good connection
Certificate Hierarchy
Root controls all certificates
If the chain is broken anywhere, The
certificates issues can be corrupted and
used to fake a secure connection.
[3]
Why care?
How does this relate to our lives,
why does any of this matter?
Where we use it
Bank
Email
Financial aid
SSL
SSL keeps our data secure
and safe. If your not paying
attention your data can be
stolen, and we use it to
protect quite a lot of our data
Works cited
1. Awghost.com. "SSL Certificates – Action Web Group."
2010. Web. 28 Jul 2013. <http://www.awghost.com/ssl.html>
2. Docs.google.com. "Diffie-Hellman.pdf." n.d.. Web. 27 Jul
2013. <https://docs.google.com/viewer?
a=v&pid=sites&srcid=bmV0aXAuY29tfGhvbWV8Z3g6NTA2N
TM0YmNhZjRhZDYzZQ>.
3. Msdn.microsoft.com. "Certificate Hierarchy (Windows)."
2012. Web. 28 Jul 2013. <
http://msdn.microsoft.com/en-us/library/windows/desktop/bb931353(v=vs.85).aspx
>.

More Related Content

Viewers also liked

SXSW Interactive 2014
SXSW Interactive 2014SXSW Interactive 2014
SXSW Interactive 2014CowanDeBaets
 
Smoszewo dalsza historia
Smoszewo dalsza historiaSmoszewo dalsza historia
Smoszewo dalsza historiapzgomaz
 
Honorowy Prezes PZG
Honorowy Prezes PZGHonorowy Prezes PZG
Honorowy Prezes PZGpzgomaz
 
Regulamin konkursu
Regulamin konkursuRegulamin konkursu
Regulamin konkursupzgomaz
 
Powstanie Warszawskie oczami 12 letniego cywila
Powstanie Warszawskie oczami 12 letniego cywilaPowstanie Warszawskie oczami 12 letniego cywila
Powstanie Warszawskie oczami 12 letniego cywilapzgomaz
 
Wiggin dielectric
Wiggin dielectricWiggin dielectric
Wiggin dielectricSaul Wiggin
 
Stefania ulassowa
Stefania ulassowaStefania ulassowa
Stefania ulassowapzgomaz
 
4.τα εικαστικα μασ
4.τα εικαστικα μασ4.τα εικαστικα μασ
4.τα εικαστικα μασvkarab2
 
Delivering Personalized Music Discovery
Delivering Personalized Music DiscoveryDelivering Personalized Music Discovery
Delivering Personalized Music DiscoveryRohan Singh
 
Rocznica
RocznicaRocznica
Rocznicapzgomaz
 
Pluton głuchoniemych żołnierzy
Pluton głuchoniemych żołnierzyPluton głuchoniemych żołnierzy
Pluton głuchoniemych żołnierzypzgomaz
 

Viewers also liked (19)

SXSW Interactive 2014
SXSW Interactive 2014SXSW Interactive 2014
SXSW Interactive 2014
 
Smoszewo dalsza historia
Smoszewo dalsza historiaSmoszewo dalsza historia
Smoszewo dalsza historia
 
Honorowy Prezes PZG
Honorowy Prezes PZGHonorowy Prezes PZG
Honorowy Prezes PZG
 
Kongres
KongresKongres
Kongres
 
Speechfinalslides2
Speechfinalslides2Speechfinalslides2
Speechfinalslides2
 
Regulamin konkursu
Regulamin konkursuRegulamin konkursu
Regulamin konkursu
 
Speechfinalslides
SpeechfinalslidesSpeechfinalslides
Speechfinalslides
 
SXSW Music 2014
SXSW Music 2014SXSW Music 2014
SXSW Music 2014
 
Speechfinalslides3
Speechfinalslides3Speechfinalslides3
Speechfinalslides3
 
Powstanie Warszawskie oczami 12 letniego cywila
Powstanie Warszawskie oczami 12 letniego cywilaPowstanie Warszawskie oczami 12 letniego cywila
Powstanie Warszawskie oczami 12 letniego cywila
 
Wiggin dielectric
Wiggin dielectricWiggin dielectric
Wiggin dielectric
 
LN Case Study
LN Case StudyLN Case Study
LN Case Study
 
Stefania ulassowa
Stefania ulassowaStefania ulassowa
Stefania ulassowa
 
4.τα εικαστικα μασ
4.τα εικαστικα μασ4.τα εικαστικα μασ
4.τα εικαστικα μασ
 
Delivering Personalized Music Discovery
Delivering Personalized Music DiscoveryDelivering Personalized Music Discovery
Delivering Personalized Music Discovery
 
Rocznica
RocznicaRocznica
Rocznica
 
Pluton głuchoniemych żołnierzy
Pluton głuchoniemych żołnierzyPluton głuchoniemych żołnierzy
Pluton głuchoniemych żołnierzy
 
Internet services
Internet servicesInternet services
Internet services
 
Protec cc2
Protec cc2Protec cc2
Protec cc2
 

Similar to Speechslides for class

Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentationAmjad Bhutto
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowCheapSSLsecurity
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure worldGianluca Sartori
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfNeilStark1
 
Is web security part of your annual security audit
Is web security part of your annual security auditIs web security part of your annual security audit
Is web security part of your annual security auditDianne Douglas
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Topics covered by our cyber security assignment help experts
Topics covered by our cyber security assignment help expertsTopics covered by our cyber security assignment help experts
Topics covered by our cyber security assignment help expertsLucyKeith1
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
You are the weakest link
You are the weakest linkYou are the weakest link
You are the weakest linkSergio Dutra
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureBrian Ritchie
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 

Similar to Speechslides for class (20)

Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to know
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure world
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
Is web security part of your annual security audit
Is web security part of your annual security auditIs web security part of your annual security audit
Is web security part of your annual security audit
 
Network Security
Network SecurityNetwork Security
Network Security
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Topics covered by our cyber security assignment help experts
Topics covered by our cyber security assignment help expertsTopics covered by our cyber security assignment help experts
Topics covered by our cyber security assignment help experts
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
You are the weakest link
You are the weakest linkYou are the weakest link
You are the weakest link
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
fucking shit
fucking shitfucking shit
fucking shit
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Speechslides for class