Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

4.01 How Web Pages Work.
SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Topics in this presentation: The Web and how it works Difference between Web pages and web sites Web browsers and Web servers HTML purpose and structure.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
Website Publishing. Publishing Basics Early Web Sites Obtain a Domain Name IP Address (Internet Protocol Address) – A number that uniquely identifies.
Session 11: Security with ASP.NET
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Internet-Based Client Access
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Lectures and Practicals Mon 8-10 SC1222 TUE SC1222 Office: SC Website: mis.csit.sci.tsu.ac.th/kanida.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
WHAT IS A WEBSITE AND HOW TO GET YOUR BUSINESS ONLINE Anna Gabali – 30/07/ MKLC.
 Internet network of connected computer › No company owns the internet › Purpose is to share information  World Wide Web (Web) one of the ways information.
Monitor Mouse Keyboard Cursor Icons Web Browsers Valley Oaks Uses Google Chrome.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Website Design and Construction Services and Standards.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
4.01 How Web Pages Work.
4.01 How Web Pages Work.
TOPIC: HTTPS (Security protocol)
Setting and Upload Products
4.01 How Web Pages Work.
Virtual Private Network (VPN)
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
CISC103 Web Development Basics: Web site:
Secure Sockets Layer (SSL)
Some bits on how it works
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
BY GAWARE S.R. DEPT.OF COMP.SCI
How to Check if a site's connection is secure ?
Topic 1: Data, information, knowledge and processing
Aplikasi Jaringan.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Internet Protocol Mr. Paulk.
CISC103 Web Development Basics: Web site:
Topic 5: Communication and the Internet
Web Site Development.
الفصل الثالث عشر الانترنت والاتصالات
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
File Operations Access Permissions.
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Part of Chapter 1 Key Concepts Networks
Secure Socket Layer (SSL) Transport Layer Security (TLS)
Protocols 2 Key Revision Points.
Certificate Revocation
Transport Layer Security (TLS)
Building Security into Your System
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
4.01 How Web Pages Work.
Electronic Payment Security Technologies
Information Retrieval and Web Design
4.01 How Web Pages Work.
The Internet and Electronic mail
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Cryptography and Network Security
Presentation transcript:

Communication protocols 2

HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond

HTTPS: when sending confidential information over the internet the web server uses a protocol called HTTP over SSL Secure Sockets Layer.

Digital certificates: to certify the identity of the website your browser is communicating with. But they can be fake

How HTTPS works The browser checks the site’s certification The web server and your browser determine the encryption types that they can both use to understand each other Your browser and the web server send each other unique codes to use when encrypting the information being send Your browser and the web server start talking to each other using the encryption

Explain how encryption help to keep data secure Turing data into a secret code using a key. Only someone with the key can read the data

Which one of these protocols would be used to upload a podcast to a blog? HTTP SMS POP IMAP