Web Security: Dr. H.R. Chennamma

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Web Security

Dr. H.R. Chennamma


Asst. Professor, Dept. of MCA
SJCE, Mysore - 6

13/03/2015 1
Challenges for Web Security
• Casual and untrained (in security matters)
users are common clients for web-based
services.
• The short history of the Web is filled with
examples of new and upgraded systems, that
are vulnerable to a variety of security attacks.
• Reputations can be damaged and money can
be lost if the Web servers are subverted.
Web Security Threats
Two types of security threats:
• Passive attacks
• Active attacks

Another way to classify Web security threats is in


terms of the location of the threat:
• Web Server
• Web Browser
• Network traffic between browser and server
Location of Security Facilities in TCP/IP
Transport- Layer Security
In fact, it uses the security for the application layer,
which uses the services of TCP as a connection-
oriented protocol
UDP and E-mail applications cannot benefit from the
transport layer security.

Two protocols are used to provide security:


– Secure Sockets Layer (SSL) Protocol
– Transport Layer Security (TLS) protocol
SSL Architecture
SSL is designed to make use of TCP to provide a
reliable end-to-end secure service.

SSL is not a single protocol but rather two layers


of protocols.
SSL Record Protocol
It provides two services for SSL Connections:

• Confidentiality
• Message Integrity
SSL Record Protocol

You might also like