Website security upgrade, HTTPS is the "correct opening method" of web pages, website server upgrade

1 year ago (2023-12-26) Chief Editor
6 minutes
three hundred and seventeen
zero

I believe you are not unfamiliar with these experiences. When you browse the web, you will be inserted into a small window of the "Dragon Slaughter" game advertising; Obviously, the file decompression software is downloaded, and when downloaded locally, it becomes anti-virus, browser, and player software; The webpage link you clicked was an official website of an enterprise, but the one you opened was a Macau gaming website

These phenomena are actually related to network traffic hijacking, and behind them is a war without gunsmoke. In the development history of the Internet for more than 30 years, the defense war around HTTP has never stopped.

HTTP world of "streaking"

In 1982, the term Internet first appeared in the definition of human society.

In 1993, in the United States on the other side of the ocean, "Internet" began to grow like weeds without warning, and Internet companies such as Netscape and Yahoo were born successively.

At that time, the Internet was based on the underlying protocol HTTP. Everything was transmitted in clear text, and information flowed freely like a vast ocean. This grand occasion was undoubtedly breathtaking.

However, in the world of HTTP plaintext transmission, all transmitted data, including personal information, email passwords, bank accounts and other confidential data are "naked", which makes it easy for "bad guys" to steal.

Moreover, in the past 30 years, hijacking web traffic has always been a favorite of hackers from all walks of life. HTTP protocol allows traffic to be controlled by hackers at will during transmission.

In the face of unscrupulous hacker intrusion, Internet companies are obviously unwilling to wait for death.

Encrypted SSL protocol

In 1994, NetScape designed version 1.0 of the SSL protocol (Secure Sockets Layer), but it was not released. Its basic idea is to use data encryption technology to ensure that data is not intercepted or eavesdropped during the transmission between the client and the server.

However, the SSL 2.0 version released by Netscape was soon found to have serious vulnerabilities. It was not until 1996 that the SSL 3.0 version passed the verification. Since then, it has been widely used. More and more Internet companies have joined the ranks of the SSL protocol.

In 1999, the Internet standardization organization ISOC took over from NetScape and released the upgraded version of SSL TLS 1.0.

In 2006 and 2008, TLS was upgraded twice, namely TLS 1.1 and TLS 1.2. At present, mainstream browsers have implemented TLS 1.2 support.

The emergence of SSL/TLS protocol mainly solves the three major risks of HTTP:

(1) All information is encrypted and cannot be eavesdropped by a third party.

(2) It has a verification mechanism. Once it is tampered with, the communication parties will immediately find out.

(3) Equipped with identity certificate to prevent identity from being impersonated

In fact, we will find that the display of some web addresses has changed from Http://to Https://. The extra letter "S" means that the web page uses the SSL protocol, which can be encrypted for transmission and ensure the security of its information data.

In short, HTTPS=HTTP+SSL. With the blessing of SSL, HTTPS is more secure than the HTTP protocol.

So, how does HTTPS play a role in website encryption transmission?

CA organization and certificate of "notarization"

HTTPS uses the SSL protocol to convert plaintext into ciphertext through encryption and transfer it between the client and the server, which is like a delivered "cryptographic information". Encryption and decryption require the sender and receiver to exchange a common key.

Of course, there is also a very important premise that "password intelligence" must be transmitted to "the right person".

For example, if I prove to a stranger that "I am me", the other person may not believe me. But if I take out my ID card, the other party can immediately confirm that "I am me". The reason is very simple. The ID card is an authentication document issued by the national law enforcement agency, which has authority and credibility.

Similarly, in the Internet world, there is also such an authoritative "notary" role, whose full name is "Certificate Authority", or CA organization for short. The SSL authentication documents issued by it are called "SSL certificates".

The SSL certificate issued by the authoritative CA organization is similar to the passport of the Internet world. It can be deployed to the website server to achieve the identity authentication and information encryption transmission of the website.

At present, the mainstream CA organizations in the world include Symantec, GeoTrust, DigiCert, Thawte, GlobalSign, RapidSSL, etc.

In China, there are 43 CA institutions that have obtained the establishment permit of the Ministry of Industry and Information Technology and can provide digital certificates. Among them, Tianwei Integrity is the first CA certification institution approved by the Ministry of Industry and Information Technology of China, and the only CA certification institution directly authorized by DigiCert/Symantec in China, with the highest industry access standards.

Whether for enterprises or individual users, installing SSL certificates issued by authoritative CA organizations and accessing HTTPS encrypted websites are the "correct way to open websites".

Editor in charge: Liu Tingting

This article is written by: Chief Editor Published on Software Development of Little Turkey , please indicate the source for reprinting: //hongchengtech.cn/blog/3227.html
Kuke_WP editor
author

Related recommendations

1 year ago (2024-02-20)

Multi store system management - store management design, how to do multi store system design scheme

Store management is an important part of the e-commerce platform. The platform administrator manages store information, goods, orders, settlement methods and other contents through the store management function. The author of this paper analyzes the design of store management in multi merchant system management. Let's have a look. 1、 Introduction The store management is an important part of the e-commerce platform. The platform administrator manages the store through
seven hundred and twenty-two
one
1 year ago (2024-02-19)

Sitecore: What major functions does a high-quality and powerful content management system need to have?

An appropriate content management system (CMS) is an urgent task for enterprises to maintain competitiveness through digital upgrading and transformation. Now 90% of enterprise website building and development uses CMS, which can easily create excellent customer experience in all channels, help enterprises attract new customers, retain old customers and turn existing customers into loyal customers, expand market share and increase revenue
three hundred and seventy-eight
zero
1 year ago (2024-02-18)

The combination and application of content management system and marketing technology, and the combination and application of content management system and marketing technology

B2B content marketing hopes to deliver valuable content to customers at their own stage in a timely manner during their purchase journey. Such as brand and solution related content in the cognitive stage, industry cases in the consideration stage and user confidence building stage, in-depth service introduction in the purchase stage, etc. These contents include images, videos, web pages, white papers
three hundred and seventeen
zero
1 year ago (2024-02-18)

In the second quarter, 648 websites were interviewed by the national network information system according to law, 56 websites were suspended from updating, and the spirit of the national network information work conference was ppt

According to the data released by "Cybertrust China", in the second quarter, the national Cybertrust system continued to strengthen administrative law enforcement, standardize administrative law enforcement, and investigate and deal with all kinds of illegal cases according to law. Original title: In the second quarter, 648 websites were interviewed by the national online trust system in accordance with the law, 56 websites were suspended from updating, and the TechWeb news on July 30 was released according to "online trust China"
three hundred and eleven
zero
1 year ago (2024-02-17)

Introduction and recommendation of ten free cms website building systems, and ten free defective software

It is particularly important to choose a easy-to-use cms website building system for website management and maintenance. We will choose different website building systems according to different website types, but the load, security, ease of use, versatility and subsequent development of the program are all basic criteria for everyone to choose a website building system. According to the webmaster station ranking and aleax ranking, the top 1
three hundred and seventy-six
zero
1 year ago (2024-02-17)

What are the advantages of Shanghai cms website?, How to build a website for cms

Original title: What are the benefits of building a website by Shanghai cms? Before the advent of cms, we usually found a website production company to carry out customized development. It can also be said that in fact, these website production companies also have their own formed website construction system, but it is not available for users to download. What we are talking about now is a website construction system that can be downloaded to build websites
three hundred and twenty-two
one

comment

0 people have participated in the review

Scan code to add WeChat

contact us

WeChat: Kuzhuti
Online consultation: