SlideShare a Scribd company logo
The Internet Architecure Board
The internet architecture board (IAB) is the
committee responsible for supervising the technical
and engineering development of the internet. The
IAB committee is appointed by the Internet Society
(ISOC), which is an international organization whose
mission is to encourage Internet usage. The Internet
Society has more than 100 organizational and more
than 28,000 individual members in over 80 chapters
around the world.
Originally IAB was founded by the United States
Department of Defense's ‘Defense Advanced
Research Projects Agency’ that is responsible for
development of new technology for use by the
US military. In 1979, it was named Internet
Configuration Control Board. Its name was
changed to Internet Advisory Board in 1984 and
internet Activities Board in 1986. In January 1992,
it became Internet Architecture Board under
ISOC.
ITFT - Web security
Web Security
The web security is required to protect the web sites from
unauthorized access, information disclosure and data
theft. Security on the web can be ensured using the
following mechanism:
Encryption:
• It is the process of translating data into a secret code
that cannot be easily understood by the unauthorized
people. Encryption is the best technique of achieving
data security. A secret key or password is needed to read
an encrypted data. Unencrypted data is referred as plain
text while encrypted data is called cipher text.
There are two types of encryption:
• Asymmetric encryption or public - key encryption
• Symmetric encryption
Asymmetric Encryption
• This type of encryption makes use of two keys- a private
key and a public key. The private key also known as
secret key is available to the recipient of the data only
whereas the knowledge of public key is known to all.
• For instance, when Robert wants to send a message to
Jane, he uses Jane’s public key to encrypt the message.
Jane then uses her private key to decrypt the message.
In asymmetric encryption, there is a relation between
the public key and private keys in a way that for the
encryption of the messages only the public key can be
used and for the decryption, only corresponding private
key can be used.
Asymmetric
• To use asymmetric encryption, there must be a
way for people to discover other public keys. The
typical technique is to use digital certificates (also
known simply as certificates). A certificate is a
package of information that identifies a user or a
server, and contains information such as the
organization name, the organization that issued
the certificate, the user's e-mail address and
country, and the user's public key.
ITFT - Web security
Symmetric Encryption
• It is a type of encryption where the same key is
used to encrypt and decrypt the data. The
sender of the information encrypts the data
using the shared keys and the receiver decrypts
the information using the same key.
ITFT - Web security
Secure Sockets Layer(SSL)
Netscape developed this protocol to transmit
private data through the web. Data is encrypted
in SSL with the use of two keys, private key and
public key.
Secure HTTP: It is a protocol for transmitting data
securely over the world wide web. S-HTTP and
SSL help each other to transmit the information
securely. A connection between the client and a
server is created by SSL, over which data of any
amount can be securely sent.
•
Secure HTTP
• Another protocol for transmitting data securely over
the World Wide Web is Secure HTTP (S-HTTP)
• . Whereas SSL creates a secure connection between a
client and a server, over which any amount of data
can be sent securely, S-HTTP is designed to transmit
individual messages securely. SSL and S-HTTP,
therefore, can be seen as complementary rather than
competing tech.
• Both protocols have been approved by the Internet
Engineering Task Force (IETF) as a standard.
Firewall
• Firewalls are often used to prevent unauthorized
users on the web from accessing private networks.
• The private networks are used and maintained by the
companies to exchange business information. All the
messages that enter or leave the private network go
through the firewall. Each message is examined by
the firewall and the ones that do not fulfill the
security criteria specified, are blocked.
ITFT - Web security
Security of the Web servers
It is possible to protect web servers from the
risks that can affect information security through
good security practices. Following are the practices
that can be adopted to secure the web servers:
Remove all unnecessary services from your web
server because an unnecessary service can become a
possibility of unauthorized access.
Remote server administration should be
avoided until and unless it is done using a secured
connection or password.
Cont…
The number of individuals who access the web
server should be limited.
All the server updates should be done through
intranet.
We should have intrusion detection software
(IDS) installed on web servers which inspects all the
network activities and identifies the suspicious
activities that may indicate an unauthorized access to
the web server.

More Related Content

PPTX
6 security
PPTX
Network security
PPTX
Introduction to Network Security
PPTX
Ethical hacking ppt
PPTX
Security Mechanisms
PPTX
Internet security
PPTX
Internet security
PPTX
Presentation1 new (1) (1)cf
6 security
Network security
Introduction to Network Security
Ethical hacking ppt
Security Mechanisms
Internet security
Internet security
Presentation1 new (1) (1)cf

What's hot (20)

PPTX
Secure communication in Networking
PPTX
Cyber security
PPTX
Computer hacking
PPTX
Network security & cryptography
PPSX
Hacking
PPTX
Infocrimeppt
PPTX
Computer security and privacy
PPTX
Introduction to Information Security
PPTX
Cyber security
PPT
Ethical Hacking
PPT
TYPES OF HACKING
PPTX
Cyber crime and security
PDF
Ethical hacking & Information Security
PPTX
Internet Issues (How to Deal on Internet Security)
PPTX
Presentation on Cyber Security
PPTX
Computer Hacking - An Introduction
PPTX
Hacking and its types V2
PPT
Tutorial 09 - Security on the Internet and the Web
 
ODP
Ethical hacking ppt
Secure communication in Networking
Cyber security
Computer hacking
Network security & cryptography
Hacking
Infocrimeppt
Computer security and privacy
Introduction to Information Security
Cyber security
Ethical Hacking
TYPES OF HACKING
Cyber crime and security
Ethical hacking & Information Security
Internet Issues (How to Deal on Internet Security)
Presentation on Cyber Security
Computer Hacking - An Introduction
Hacking and its types V2
Tutorial 09 - Security on the Internet and the Web
 
Ethical hacking ppt
Ad

Viewers also liked (20)

PDF
Cambio Tecnologico
PDF
Catálogo 2015
PPT
De ber de compu
PDF
Educacion infantil
DOC
La pequeña comunidad y el medio ambiente
PPTX
Elaboracion de paquetes turísticos
PPT
Fiche 918
PDF
PPS
Digital & Análogo
PDF
Tahini tahini sp-final_(cover_-_a4)
PDF
Sintesis informativa 31 08 2015
PPT
A Case of Chorea following ASV
PDF
LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...
PDF
Despertar hombre
PDF
What do limitation periods for sanctions in antitrust
PDF
Concepto educar-clase
PPT
Amore y viajes lenguaje
PDF
Turismo
PPT
AP Collegeboard Research
DOCX
Algebra lineal unidad iv y v
Cambio Tecnologico
Catálogo 2015
De ber de compu
Educacion infantil
La pequeña comunidad y el medio ambiente
Elaboracion de paquetes turísticos
Fiche 918
Digital & Análogo
Tahini tahini sp-final_(cover_-_a4)
Sintesis informativa 31 08 2015
A Case of Chorea following ASV
LA PROPIEDAD EN LA CONSTITUCIÓN COLOMBIANA DE 1991. SUPERANDO LA TRADICIÓN DE...
Despertar hombre
What do limitation periods for sanctions in antitrust
Concepto educar-clase
Amore y viajes lenguaje
Turismo
AP Collegeboard Research
Algebra lineal unidad iv y v
Ad

Similar to ITFT - Web security (20)

PPTX
Computer Security Essentials.pptx
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PDF
PPTX
Computer Introduction (Data Encryption)-Lecture05
PPTX
ebusiness digital,E business signature .
PPT
Securing E-Commerce Networks Presentation.ppt
PPTX
Chapter 2 System Security.pptx
PPTX
TOPIC7.pptx
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
DOC
Network security
PDF
International Refereed Journal of Engineering and Science (IRJES)
PPT
Implementing an improved security for collin’s database and telecommuters
PPT
Information Security Audit and Analysis Module
PPTX
Encryption by fastech
PPTX
Internet Security
PPTX
CyberSecurityPPT_V3_1.pptx Awerness cyber
PPTX
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
PPTX
Cybersecurity about Phishing and Secutity awareness
Computer Security Essentials.pptx
Fundamental Concept of Cryptography in Computer Security
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Computer Introduction (Data Encryption)-Lecture05
ebusiness digital,E business signature .
Securing E-Commerce Networks Presentation.ppt
Chapter 2 System Security.pptx
TOPIC7.pptx
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Network security
International Refereed Journal of Engineering and Science (IRJES)
Implementing an improved security for collin’s database and telecommuters
Information Security Audit and Analysis Module
Encryption by fastech
Internet Security
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
Cybersecurity about Phishing and Secutity awareness

More from Blossom Sood (9)

PDF
ITFT- Dbms
PDF
ITFT - Trends in it
PDF
ITFT - Search engine
PDF
ITFT - Oops
PDF
ITFT - Number system
PDF
ITFT - Java
PDF
ITFT - Java Coding
PDF
ITFT - DOS - Disk Operating System
PDF
ITFT - Window explorer
ITFT- Dbms
ITFT - Trends in it
ITFT - Search engine
ITFT - Oops
ITFT - Number system
ITFT - Java
ITFT - Java Coding
ITFT - DOS - Disk Operating System
ITFT - Window explorer

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Classroom Observation Tools for Teachers
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction to Building Materials
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
advance database management system book.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Final Presentation General Medicine 03-08-2024.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
What if we spent less time fighting change, and more time building what’s rig...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Classroom Observation Tools for Teachers
Unit 4 Skeletal System.ppt.pptxopresentatiom
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction to Building Materials
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Cell Types and Its function , kingdom of life
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
advance database management system book.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
A systematic review of self-coping strategies used by university students to ...
Final Presentation General Medicine 03-08-2024.pptx

ITFT - Web security

  • 1. The Internet Architecure Board The internet architecture board (IAB) is the committee responsible for supervising the technical and engineering development of the internet. The IAB committee is appointed by the Internet Society (ISOC), which is an international organization whose mission is to encourage Internet usage. The Internet Society has more than 100 organizational and more than 28,000 individual members in over 80 chapters around the world.
  • 2. Originally IAB was founded by the United States Department of Defense's ‘Defense Advanced Research Projects Agency’ that is responsible for development of new technology for use by the US military. In 1979, it was named Internet Configuration Control Board. Its name was changed to Internet Advisory Board in 1984 and internet Activities Board in 1986. In January 1992, it became Internet Architecture Board under ISOC.
  • 4. Web Security The web security is required to protect the web sites from unauthorized access, information disclosure and data theft. Security on the web can be ensured using the following mechanism:
  • 5. Encryption: • It is the process of translating data into a secret code that cannot be easily understood by the unauthorized people. Encryption is the best technique of achieving data security. A secret key or password is needed to read an encrypted data. Unencrypted data is referred as plain text while encrypted data is called cipher text. There are two types of encryption: • Asymmetric encryption or public - key encryption • Symmetric encryption
  • 6. Asymmetric Encryption • This type of encryption makes use of two keys- a private key and a public key. The private key also known as secret key is available to the recipient of the data only whereas the knowledge of public key is known to all. • For instance, when Robert wants to send a message to Jane, he uses Jane’s public key to encrypt the message. Jane then uses her private key to decrypt the message. In asymmetric encryption, there is a relation between the public key and private keys in a way that for the encryption of the messages only the public key can be used and for the decryption, only corresponding private key can be used.
  • 7. Asymmetric • To use asymmetric encryption, there must be a way for people to discover other public keys. The typical technique is to use digital certificates (also known simply as certificates). A certificate is a package of information that identifies a user or a server, and contains information such as the organization name, the organization that issued the certificate, the user's e-mail address and country, and the user's public key.
  • 9. Symmetric Encryption • It is a type of encryption where the same key is used to encrypt and decrypt the data. The sender of the information encrypts the data using the shared keys and the receiver decrypts the information using the same key.
  • 11. Secure Sockets Layer(SSL) Netscape developed this protocol to transmit private data through the web. Data is encrypted in SSL with the use of two keys, private key and public key. Secure HTTP: It is a protocol for transmitting data securely over the world wide web. S-HTTP and SSL help each other to transmit the information securely. A connection between the client and a server is created by SSL, over which data of any amount can be securely sent. •
  • 12. Secure HTTP • Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP) • . Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing tech. • Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.
  • 13. Firewall • Firewalls are often used to prevent unauthorized users on the web from accessing private networks. • The private networks are used and maintained by the companies to exchange business information. All the messages that enter or leave the private network go through the firewall. Each message is examined by the firewall and the ones that do not fulfill the security criteria specified, are blocked.
  • 15. Security of the Web servers It is possible to protect web servers from the risks that can affect information security through good security practices. Following are the practices that can be adopted to secure the web servers: Remove all unnecessary services from your web server because an unnecessary service can become a possibility of unauthorized access. Remote server administration should be avoided until and unless it is done using a secured connection or password.
  • 16. Cont… The number of individuals who access the web server should be limited. All the server updates should be done through intranet. We should have intrusion detection software (IDS) installed on web servers which inspects all the network activities and identifies the suspicious activities that may indicate an unauthorized access to the web server.