Secure Computing SSL Scanner Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Elementy urządzeń bezpieczeństwa Secure Computing SSL Scanner. Secure Sockets Layer (SSL) Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 22
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
1
Understanding SSL
Regardless of where you access the Internet from, the connection between your Web browser and any other point can be
routed through dozens of independent systems. Through snooping, spoofing, and other forms of Internet eavesdropping,
unauthorized people can steal credit card numbers, PIN numbers, personal data, and other confidential information.
Client
Non-Secure Request
Secure SSL Request
Handshake/
Encryption
Server/
Web Applications
HTTP
IMAP
FTP
SSH
etc.
HTTP
IMAP
FTP
SSH
etc.
Secure
Sockets
Layer
Secure
Sockets
Layer
TCP/IP
Figure 1 – Non-Secure Transmission Request vs. Secure SSL Transmission Request
The Secure Sockets Layer (SSL) protocol was developed to transfer information privately and securely across the Internet. SSL
is layered beneath application protocols such as HTTP, SMTP, and FTP and above the connection protocol TCP/IP. It is used by
the HTTPS access method. Figure 1 illustrates the difference between a non-secure HTTP request and a secure SSL request.
Transport Layer Security (TLS) is the successor of Secure Sockets Layer (SSL); they are both cryptographic protocols that
provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging,
and other data transfers. There are slight differences between SSL and TLS, but the protocol remains substantially the same.
Who Uses SSL?
SSL is the de facto standard for encrypted and authenticated communications between clients and servers on the Internet.
Virtually all online purchases and browser-based monetary transactions that occur on the Internet are secured by SSL.
However, SSL is not just limited to securing e-commerce transactions; the following are a few other examples of SSL use:
Financial institutions implement SSL to secure the transmission of PIN numbers and other confidential account information.>-
Insurance companies implement SSL to secure transmission of confidential policy information.>-
Organizations who have established Business-to-Business (B2B) extranets implement SSL to secure transactions between the >-
company and its partners, suppliers, and customers.
Private organizations implement SSL in their intranets to confidentially transfer information to and from employees.>-
Email providers implement SSL to secure webmail for users.>-
This document provides an overview of SSL technology and offers examples of Blue Coat solutions for
increasing the security, performance, and scalability of SSL traffic over the Web.
Technology Primer: Secure Sockets Layer (SSL)
Przeglądanie stron 0
1 2 3 4 5 6 ... 21 22

Podsumowanie treści

Strona 1 - Understanding SSL

1Understanding SSLRegardless of where you access the Internet from, the connection between your Web browser and any other point can be routed through

Strona 2 - SSL Transactions

10Securing Outsourced Applications ExampleMore and more critical services are being provided by partners, often over the Internet and secured by SSL.

Strona 3 - SSL Crypto Algorithms

11and signed logs off to a secure server to ensure audit-ability. Without these robust policy features, combined with automatic website categorization

Strona 4 - The Cost of Encryption

12InternetSSLSSLSSLSSLWeb ApplicationsCorporate HeadquartersData CenterWAN Optimization “Concentrator” SSL Proxy• Application Acceleration• Malware Pr

Strona 5 - SSLSSL SSLSSL

13Securing and Optimizing WAN Traffic ExampleA Blue Coat ProxySG used for SSL WAN optimization acts as the SSL proxy allowing branch office workers secu

Strona 6

14When used in WAN optimization, the ProxySG is used similarly to a regular proxy, and works as follows:The client makes a request for a service, whic

Strona 7

15Figure 12 illustrates the Blue Coat ProxySG Reverse HTTPS Solution.InternetSSLSSLUsersCorporate HeadquartersReverse HTTPS Proxy• Web Server Accelera

Strona 8 - Client-Proxy Connection

16Web Server Acceleration ExampleInternetUsersWeb ServersBlue CoatServer AcceleratorWith SSL100s of HTTPSConnections TerminateAt AcceleratorIntranetFi

Strona 9 - Internetintranet

17Dedicated CDN Application ExampleCoreBackboneUsersWeb ServersBlue CoatServer AcceleratorWith SSLCacheable ObjectsRetrieved fromNearest ServersIntran

Strona 10 - Internet

18How Secure is the ProxySG Itself?The Blue Coat ProxySG has its own, patented, operating system known as SGOS (secure gateway operating system). SGOS

Strona 11

19IT can once again gain control over their WAN links, accelerating the good and denying the bad, regardless of SSL encryption. No matter how your use

Strona 12

2How It WorksWhen a client and server communicate, SSL ensures that the connection is private and secure by providing authentication, encryption, and

Strona 13 - Internal

20EncryptThe translation of data, a secret code. Encryption is the most effective way to achieve data security. Unencrypted data is called plain text,

Strona 14

21ISPShort for Internet Service Provider. A company that provides connection and services on the Internet, such as remote dial-in access, DSL connecti

Strona 15

Web Server AcceleratorsA system that services Web servers by offloading TCP/IP connections, responding to Web Client requests, replicating the Web cont

Strona 16

3Figure 2 illustrates an SSL transaction:The handshake begins when a client connects to an SSL-enabled server, requests a secure connection, and prese

Strona 17 - Backbone

4For instance the cipher suite “RSA-RC4-MD5” means that RSA certificates are used for both authentication and key exchange, while RC4 is used as the bu

Strona 18 - Conclusion

5InternalUsersSpywarePhishingVirusesIntellectual Property Rogue AppsWormsBusiness AppsCorporateNetworkExternalAppsActive Server PagesInternetSSLSSL SS

Strona 19 - Glossary

6InternetSSLSSLSSLSSLSSLSSLSSLSSLUsersWeb ApplicationsCorporate HeadquartersWeb ServerData CenterWAN Optimization “Concentrator” SSL Proxy• Applicatio

Strona 20

7Blue Coat ProxySGs are the industry’s only solutions designed specifically for securing, accelerating and scaling SSL traffic to internal as well as ex

Strona 21

8When the SSL forward proxy is used to intercept HTTPS traffic, it can also:Optionally cache HTTPS content.>-Apply HTTP-based authentication mechani

Strona 22 - Web Server Accelerators

9Perhaps surprisingly, remote application performance actually improves as a result of the acceleration techniques of compression, caching, and HTTP o

Komentarze do niniejszej Instrukcji

Brak uwag