Question

In: Computer Science

From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...

From the security aspect of client/browser, connecting to a secure web site/server,

  1. From the cyber security perspective, what browser features should be examined for valid certificates.
  2. What are the risks of using expired web certificates

Solutions

Expert Solution

Part 1

Here is a very simplified explanation:

  1. Your web browser downloads the web server's certificate, which contains the public key of the web server. This certificate is signed with the private key of a trusted certificate authority.

  2. Your web browser comes installed with the public keys of all of the major certificate authorities. It uses this public key to verify that the web server's certificate was indeed signed by the trusted certificate authority.

  3. The certificate contains the domain name and/or ip address of the web server. Your web browser confirms with the certificate authority that the address listed in the certificate is the one to which it has an open connection.

  4. Your web browser generates a shared symmetric key which will be used to encrypt the HTTP traffic on this connection; this is much more efficient than using public/private key encryption for everything. Your browser encrypts the symmetric key with the public key of the web server then sends it back, thus ensuring that only the web server can decrypt it, since only the web server has its private key.

Note that the certificate authority (CA) is essential to preventing man-in-the-middle attacks. However, even an unsigned certificate will prevent someone from passively listening in on your encrypted traffic, since they have no way to gain access to your shared symmetric key.

Part 2

The following are scenarios that are most likely to follow an expired SSL certificate circumstance:

  • For website-owners, expired certificates are highly capable of increasing the instances of shopping cart abandonment and a subsequent decline in sales and revenue.
  • Whereas, website users put their personal information at risk by carrying out a financial transaction on a site with an expired SSL certificate.

Related Solutions

From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of...
From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of web certificates. Mention 4 certificate issuing companies Mention a security incident (or case study) of exploiting web certificates. From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates?
AWS screenshot of a view of the web browser connection to your web server via the...
AWS screenshot of a view of the web browser connection to your web server via the load balancer (step 5 of this lab document).
what we should do to protect and secure Web Site and Web Application
what we should do to protect and secure Web Site and Web Application
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist? need reference or citation for these questions
In web programming what is the Client-Server model?
In web programming what is the Client-Server model?
In web programming what is the Client-Server model?
In web programming what is the Client-Server model?
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss Web Site Security and also Define and discuss Web Application Security.
Assume a 2.8 MByte file is being uploaded from a client application to a web server....
Assume a 2.8 MByte file is being uploaded from a client application to a web server. Answer the following questions from the perspective of the protocol stack on the client. a. What protocol is in use at the application layer? b. Is this application layer protocol reliable? c. The application layer hands this 2.8 MByte file to the transport layer. What protocol is in use at the transport layer? d. Is this transport layer protocol reliable? e. Is this transport...
Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in...
Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words. Explain how that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks.. Discuss how operationally, the security engineer performs threat and vulnerability assessments to identify security risks, and then regularly updates the security controls identified through those assessments.Examine the tools needed...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT