SlideShare a Scribd company logo
SECURE SOCKET LAYER
Furqon Mauladani
Overview of secure socket layer.
Pro and cons of secure socket layer.
How Does the
Internet Work?
THE ILLUSTRATION OF ACCESSING WEBSITE
THE ILLUSTRATION OF ACCESSING WEBSITE
(Cont.)
Using a device to submit information on internet
in order to reach a remote service.
THE ILLUSTRATION OF ACCESSING WEBSITE
(Cont.)
But the internet is composed of a multitude of
devices allowing interconnectivity.
THE ILLUSTRATION OF ACCESSING WEBSITE
(Cont.)
Each device sends traffic along, following routing
tables that may change over time.
What is the threat
on internet?
SNIFFING
Process of
monitoring and
capturing all the
packets passing
through a given
network using
sniffing tools (e.g.
Wireshark).
WHAT IS THE RISK WHEN YOUR ID IS
BREACHED
Login with
your ID
Login with
stolen ID
from you
Hello!
Fulan
Hello!
Fulan
WHAT IS THE RISK WHEN YOUR ID IS
BREACHED (Cont.)
Getting all of your
formation
=
How Does Secure
Socket Layer Work?
SECURE SOCKET LAYER
ENCRYPTION & DECRYPTION
Encryption is converting readable data to
unreadable data.
Decryption is converting unreadable data to
readable data.
ENCRYPTION & DECRYPTION
OLDEN DAYS
The used pattern is substitute into the next letter.
ENCRYPTION & DECRYPTION
MODERN DAYS
Combination hardware/software and math
formula.
+
SSL ON THE WEBSITE
HTTPS = HTTP + Secure Socket Layer
HTTP = HyperText Transfer Protocol
THE WEBPAGE WITHOUT SSL
THE WEBPAGE WITH SSL
SSL CERTIFICATE
SNIFFING ATTACK ON THE HTTPS WEBPAGE
What is Pros and
Cons Secure of
Socket Layer?
ADVANTAGE OF SSL
 Trust – Giving your visitors a sense of trust
when green address bar/lock displayed in the
browser.
 Verification – Identified who you are by visitor.
 Confidentiality – Guarantee privacy of data.
 Search Engine Optimization (SEO) – Google
using whether or not a server uses SSL as a
ranking.
DISADVANTAGE OF SSL
 Performance – The encrypted/decrypted
process by the server leads to take more server
resources than without that process.
 Cost – The SSL providers need to set up a
trusted infrastructure and validate your identity.
Secure Socket Layer

More Related Content

PPTX
Wifi hacking
PPT
Wifi Security
PPTX
WLAN Attacks and Protection
PPTX
Tor the onion router
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
PPTX
Computer security 7.pptx
PPTX
WIFI Hacking
Wifi hacking
Wifi Security
WLAN Attacks and Protection
Tor the onion router
Cracking WPA/WPA2 with Non-Dictionary Attacks
Computer security 7.pptx
WIFI Hacking

What's hot (20)

PPTX
Attack presentation
PPT
How to hack wireless internet connections using aircrack-ng
PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
PDF
Security Onion - Introduction
PDF
Firewall traversals
PDF
WPA2 Hole196 Vulnerability FAQs
PDF
Digital self defense
PDF
Advanced Wi-Fi pentesting
PPTX
Wireless hacking
PPTX
Encryption and decryption in TOR
PDF
Security Onion: Watching for Leeks
PDF
Database Firewall with Snort
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PDF
Wireless Hacking
PPTX
Vpn presnt
PPTX
LAN's by Group 1
PDF
Sns en-sn160 w-datasheet-201702
PDF
Network Security Applications
PDF
A tutorial showing you how to crack wifi passwords using kali linux!
Attack presentation
How to hack wireless internet connections using aircrack-ng
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Security Onion - Introduction
Firewall traversals
WPA2 Hole196 Vulnerability FAQs
Digital self defense
Advanced Wi-Fi pentesting
Wireless hacking
Encryption and decryption in TOR
Security Onion: Watching for Leeks
Database Firewall with Snort
Understanding WiFi Security Vulnerabilities and Solutions
Wireless Hacking
Vpn presnt
LAN's by Group 1
Sns en-sn160 w-datasheet-201702
Network Security Applications
A tutorial showing you how to crack wifi passwords using kali linux!
Ad

Similar to Secure Socket Layer (20)

PPT
Security system wireless technology
PPT
Security Enhancements using Routers and Switches
PDF
Comprehensive Guide On Network Security
PPTX
6,7- Infrastructure Security for - P2.pptx
PPT
Wireless Device and Network level security
PPTX
Virtual Private Network (VPN)
PPTX
Iot(security)
PDF
Network Security - Defense Through Layered Information Security
PDF
Security and identity management on WebRTC
PDF
WebRTC Security
PDF
International Journal of Computer Science and Security Volume (1) Issue (3)
PDF
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
PPT
Hacking
PDF
Research Inventy : International Journal of Engineering and Science
PPTX
Firewall ppt
PDF
RAZORPOINT SECURITY GLOSSARY
PPTX
Iot Security
PPTX
IoT Security Risks and Challenges
PPTX
Firewall security in computer network
PPT
謝續平
Security system wireless technology
Security Enhancements using Routers and Switches
Comprehensive Guide On Network Security
6,7- Infrastructure Security for - P2.pptx
Wireless Device and Network level security
Virtual Private Network (VPN)
Iot(security)
Network Security - Defense Through Layered Information Security
Security and identity management on WebRTC
WebRTC Security
International Journal of Computer Science and Security Volume (1) Issue (3)
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Hacking
Research Inventy : International Journal of Engineering and Science
Firewall ppt
RAZORPOINT SECURITY GLOSSARY
Iot Security
IoT Security Risks and Challenges
Firewall security in computer network
謝續平
Ad

More from Institut Teknologi Sepuluh Nopember Surabaya (18)

PPTX
How Easy to Automate Application Deployment on AWS
PPTX
How to deploy your Apps in serverless-way using App Engine.pptx
PPTX
Keamanan Komputer [Pengantar Keamanan Komputer]
PPTX
Keamanan Komputer [Keamanan Komunikasi dan Jaringan]
PPTX
Keamanan Komputer [Sistem Manajemen Keamanan Informasi]
PPTX
Sistem Penunjang Keputusan [Analytical Hierarchy Process]
PPTX
Sistem Penunjang Keputusan [Simple Additive Weighting]
PPTX
Sistem Penunjang Keputusan [Sistem Penunjang Keputusan Kelompok]
PPTX
Sistem Penunjang Keputusan [Simulasi Monte Carlo]
PPTX
Sistem Penunjang Keputusan [Teori Pengambilan Keputusan]
PPTX
Sistem Penunjang Keputusan [Konsep dan Permodelan Sistem Penunjang Keputusan]
PPTX
Sistem Penunjang Keputusan [Sistem Penunjang Manajemen]
PPTX
Sistem Penunjang Keputusan [Pengantar]
PPTX
Perancangan SMKI Berdasarkan SNI ISO/IEC 27001:2013 dan SNI ISO/IEC 27005:201...
DOCX
UAS Analisa Sistem Keputusan MTI
DOCX
Pengembangan Sistem Informasi CRM pada Perusahaan Penerbangan PT.XXX untuk Pe...
DOCX
Review dan Translate Paper "Risk Ranking for Tunnelling Construction Projects...
How Easy to Automate Application Deployment on AWS
How to deploy your Apps in serverless-way using App Engine.pptx
Keamanan Komputer [Pengantar Keamanan Komputer]
Keamanan Komputer [Keamanan Komunikasi dan Jaringan]
Keamanan Komputer [Sistem Manajemen Keamanan Informasi]
Sistem Penunjang Keputusan [Analytical Hierarchy Process]
Sistem Penunjang Keputusan [Simple Additive Weighting]
Sistem Penunjang Keputusan [Sistem Penunjang Keputusan Kelompok]
Sistem Penunjang Keputusan [Simulasi Monte Carlo]
Sistem Penunjang Keputusan [Teori Pengambilan Keputusan]
Sistem Penunjang Keputusan [Konsep dan Permodelan Sistem Penunjang Keputusan]
Sistem Penunjang Keputusan [Sistem Penunjang Manajemen]
Sistem Penunjang Keputusan [Pengantar]
Perancangan SMKI Berdasarkan SNI ISO/IEC 27001:2013 dan SNI ISO/IEC 27005:201...
UAS Analisa Sistem Keputusan MTI
Pengembangan Sistem Informasi CRM pada Perusahaan Penerbangan PT.XXX untuk Pe...
Review dan Translate Paper "Risk Ranking for Tunnelling Construction Projects...

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
advance database management system book.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
IGGE1 Understanding the Self1234567891011
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Trump Administration's workforce development strategy
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
UNIT III MENTAL HEALTH NURSING ASSESSMENT
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Indian roads congress 037 - 2012 Flexible pavement
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Complications of Minimal Access Surgery at WLH
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
advance database management system book.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Practical Manual AGRO-233 Principles and Practices of Natural Farming
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
What if we spent less time fighting change, and more time building what’s rig...
IGGE1 Understanding the Self1234567891011
Paper A Mock Exam 9_ Attempt review.pdf.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Trump Administration's workforce development strategy

Secure Socket Layer