SlideShare a Scribd company logo
1 of 32
Internet Security Basics
Symmetric Encryption
[object Object],[object Object],[object Object]
Alice Bob
[object Object],[object Object],[object Object]
PKI Encryption
 
Important:   These forms the basis for all the internet security protocols.
Alice Bob
 
 
 
PKI Digital Signatures
 
Third PKI-Rule Satisfied.
 
 
First & Third PKI Rule Satisfied. Unique sequence number is used inside the Digital Signatures to prevent interception and replay of the messages.
 
 
Certificates and Certificate Authorities
 
Here’s a trust relationship between a customer, his bank and his credit card company. When he drops a cheque at his bank to pay-off his credit card bill, he is assured that his credit card will be paid.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Carries Bobs Distinguished Name (DN) and his Public Key with other details.   CA will do a lot of physical validations and issue a certificate to Bob. Normally Bob gets that either through email or CA requests him to download it from their web site.
 
You can store the certificate on your file system as a file (.cer), right click and check the properties.  You can check the CAs and trusted parties certificates installed on your browser. Internet Explorer > Tools > Internet Options > Content > Certificates (button)
X.509 v3  Structure of a certificate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Certificate filename extensions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PeopleSoft uses PEM format.

More Related Content

Viewers also liked

Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6HCL Technologies
 
Memory and file system concepts
Memory and file system conceptsMemory and file system concepts
Memory and file system conceptsSatyendra Mohan
 
File system security
File system securityFile system security
File system securityAmmAr mobark
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Friendship
FriendshipFriendship
Friendshipnva216
 
Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'thaidn
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Latches and flip flop
Latches and flip flopLatches and flip flop
Latches and flip flopShuaib Hotak
 
File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchysritolia
 
Ee2 chapter12 flip_flop
Ee2 chapter12 flip_flopEe2 chapter12 flip_flop
Ee2 chapter12 flip_flopCK Yang
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed ComputingChandan Padalkar
 
Basic Mathematics 3 5 Presentation
Basic Mathematics   3 5 PresentationBasic Mathematics   3 5 Presentation
Basic Mathematics 3 5 PresentationDavid Radcliffe
 
Computer network Component introduction
 Computer network Component introduction Computer network Component introduction
Computer network Component introductionAshutosh Kumaar
 

Viewers also liked (18)

Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
Flip Flop
Flip FlopFlip Flop
Flip Flop
 
Memory and file system concepts
Memory and file system conceptsMemory and file system concepts
Memory and file system concepts
 
File system security
File system securityFile system security
File system security
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Friendship
FriendshipFriendship
Friendship
 
Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Latches and flip flop
Latches and flip flopLatches and flip flop
Latches and flip flop
 
File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchy
 
Ee2 chapter12 flip_flop
Ee2 chapter12 flip_flopEe2 chapter12 flip_flop
Ee2 chapter12 flip_flop
 
Oral communication
Oral communicationOral communication
Oral communication
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Basic Mathematics 3 5 Presentation
Basic Mathematics   3 5 PresentationBasic Mathematics   3 5 Presentation
Basic Mathematics 3 5 Presentation
 
Computer network Component introduction
 Computer network Component introduction Computer network Component introduction
Computer network Component introduction
 

Similar to Internet Security Basics

X 509 Certificates How And Why In Vb.Net
X 509 Certificates How And Why In Vb.NetX 509 Certificates How And Why In Vb.Net
X 509 Certificates How And Why In Vb.NetPuneet Arora
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Netwax Lab
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdfaminasouyah
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...MongoDB
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 

Similar to Internet Security Basics (20)

X 509 Certificates How And Why In Vb.Net
X 509 Certificates How And Why In Vb.NetX 509 Certificates How And Why In Vb.Net
X 509 Certificates How And Why In Vb.Net
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
1205 bhat pdf-ssl
1205 bhat pdf-ssl1205 bhat pdf-ssl
1205 bhat pdf-ssl
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104
 
Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)Cisco iso based CA (certificate authority)
Cisco iso based CA (certificate authority)
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdf
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 

Internet Security Basics