当前位置:网站首页>Uncover the mystery of SSL and learn how to protect data with SSL
Uncover the mystery of SSL and learn how to protect data with SSL
2022-06-28 04:08:00 【AIwenIPgeolocation】
With the development of Internet , The threat to key data shared by users has had serious consequences , People exchange addresses on the Internet 、 Phone number 、 Credit card number 、 Enterprise secrets and other information , Malicious saboteurs on the network are always waiting for opportunities to spy , Trying to steal these important information . As the country continues to publicize and popularize the law , More and more people are also doubling their awareness of data security , If you are the site owner , Then protect your users' privacy information and sensitive data from cyber criminals A malicious attack It becomes your unshirkable responsibility .
that , This is where SSL The importance of certificates , Next, please follow me from shallow to deep 、 The whole , Slowly uncovering SSl The veil of mystery , Get to know SSL What is it? ? How to protect data security ?
What is? SSL?
SSL(Secure Socket Layer, The condom class ) It is a kind of protocol to protect the transmitted data from the illegal infringement of the network ,SSL A certificate is a digital certificate issued by a certification authority to a web site , Ensure that all information exchanged between the user's web browser and the web server is encrypted . When you submit any sensitive information ,SSL Will encrypt your data , Protect your data from malicious attempts to steal or destroy data , For example, eavesdropping 、 Man in the middle attacks .

SSL How to protect user data and privacy ?
SSL It is to protect data from malicious saboteurs . People use SSL Encrypt and authenticate the data between the client and the server , To protect important data . You can see it on the Internet ,Web The web address of the browser is displayed as “https:” In the form of , There is a lock mark on the front . This indicates that the page has been SSL encryption , Data is very secure , Don't let it out .HTTPS yes HTTP over SSL For short , It means right HTTP Did SSL Handle .

Not installed on SSL On certificate , The information transmission between the user and the server is clear text , Easy to be intercepted by the outside world , And for end users , They are browsing the server , I don't know this server 、 Whether web pages really exist , And if it exists , Whether the information is authentic .
Deploy SSL After certificate , Can be verified by HTTPS Medium SSL Certificate information , Confirm the true identity of the website , Enhance user recognition of correct website information , To prevent users from being cheated by clicking on fake websites 、 adopt SSL Encryption layer , It can also encrypt and decrypt the transmitted data , Ensure the safety of data during transmission , Protect the confidentiality and integrity of data .
at present , On the website HTTPS Encryption deployment SSL Certificates are the most effective network security protection , Compared with traditional HTTP An express agreement ,HTTPS The protocol can ensure the integrity and confidentiality of the transmitted data , Set up an encrypted transmission channel from the client to the web server , Through the triple handshake protocol , Ensure that the user's transmission information is not stolen or tampered with by a third party .

SSL What technologies are used to protect data from infringement ?
While the Internet brings convenience to our life , It also virtually forms a virtual world full of danger , One of the three major hazards is eavesdropping 、 Tampering and impersonation . here ,SSL Can protect data from infringement , Next , Let's have a look , What technologies have it used to resist these infringements .
(1) Using encryption technology to prevent eavesdropping
Eavesdropping should be one of the most understandable violations . If important data is exposed without any processing , So even ordinary people who are not malicious saboteurs will be curious about the contents .SSL Encrypt the communication between client and server , such , Even if outsiders eavesdrop on this information , There is no way to know the specific content .
(2) Message digest technology is used to detect whether the data has been tampered
Tampering refers to the infringement of unauthorized rewriting of data during transmission . Suppose we order goods online , But if the shipping address is changed by the malicious saboteur to his own address , We will not be able to receive the goods .SSL A summary of the information calculated from the data (MD value ) Sent with the data itself , To check whether the data has been tampered with . After the node receives them , Compare the information summary calculated from the data with the added information summary , See if the two are consistent . Because the same calculation is performed on the same data , If the hash value is the same, the data has not been tampered with .

(3) Use digital certificate technology to see through impersonation
Impersonation is an infringement of pretending to be the object of communication . The data sender does not know whether the other party is really the object that he wants to send data , Communication may be hijacked by malicious saboteurs before they know it , And these malicious saboteurs may also pretend to be the party who should have received the data . therefore , If no precautions are taken , It is equivalent to handing over important data to bad people in person . therefore SSL Will use the digital certificate to confirm the identity of the other party , It works by , Ask the other party to provide their own information before sending data , Then verify the identity according to the digital certificate sent by the other party .
SSL There are three types of certificates :
DV SSL certificate : It refers to the simple type that only verifies the ownership of the website domain name SSL certificate , This kind of certificate can only be used to encrypt confidential information of the website , Can't prove the real identity of the website to users .
OV SSL Certificate is Organization Validation SSL Abbreviation , It refers to the standard type that needs to verify the true identity of all units on the website SSL certificate , It can not only encrypt the confidential information of the website , And can prove the true identity of the website to users .
EV SSL yes Extended Validation SSL Abbreviation , It refers to the certificate issued in accordance with the global unified and strict authentication standards SSL certificate , It is the highest security level in the industry SSL certificate .
What we usually use to be formal is DV SSL Certificates and OV SSL certificate , Because these two applications are relatively simple and fast . But this is also their drawback ,DV SSL The certificate is only applicable to personal websites or non e-commerce websites , Because this class only verifies the low end of the domain name ownership SSL The certificate does not need to be verified that it has been abused by various foreign fraudulent websites . If you are worried that the certificate is not secure enough or abused in fraud , stay SSL There is a special operation in the certificate , Can be bound to SSL Certificate binding IP Address . In this way SSL Where the certificate is traceable , Fraud can be prevented .
How to give DVSSL Certificates and OVSSL Certificate binding IP Address ?

DVSSL certificate :
This certificate only needs to be verified IP Administrative rights of address . Support multiple IP Bind together , The issue only requires 30 About minutes .
OVSSL certificate :
This kind of certificate is of the nature of enterprises and other units , In addition to verification IP Beyond the administrative authority of , You also need to verify the identity of the enterprise . Of course, the certificate and the above DVSSL It's different , Issue required 1-3 Working day .
At the same time, the public network IP Address as Internet portal , There are many usage scenarios . As long as there is Internet , Need IP Address . that IP How to protect the security of the address ? for example WEB Website construction ,IP Address It is usually in plain text HTTP Transfer protocol , It's very unsafe , It will lead to data leakage or hijacking in the process of transmission protocol . If our IP Address bound SSL certificate , this IP The address will be encrypted .
So bind the certificate IP Address can contain SSL Misuse of certificates , At the same time, it is equivalent to giving IP The address is covered with a protective umbrella .
I don't know when you are using it SSL Certificate is , Have you ever encountered this SSL Tips that the information is not trusted by the website , At this time, we need to trust and authorize . and The binding IP Address Of SSL The certificate will not be untrusted .

SSL Certificate binding IP Address , It's a win-win situation . On both sides IP Security of address , It can also strengthen SSL Traceability of certificates , Effectively prevent SSL Certificate abuse and fraud . Because we can pass this SSL Of IP Address find out exactly who is using , For illegal SSL The traceability of certificates is more accurate and effective .
Conclusion :
SSL A simple three letter abbreviation , But it contains a lot of working principles and technologies , If you want to see the true face of Lushan Mountain thoroughly , It needs to be studied constantly 、 breakthrough , To bring it to its due value , Good application SSL, In order not to let your user information “ streaking ”.
边栏推荐
- How to modify a se38 editor theme
- 基于arm5718的Shell脚本参数传递的2种方法
- Une seule pile dans l'ordre inverse avec des fonctions récursives et des opérations de pile
- 关于 SY8120I 的DC-DC的降压芯片的学习(12V降至3.3V)
- Does the applet input box flash?
- How the uni app automatically switches the requested address according to the environment
- GenICam GenTL 标准 ver1.5(2)
- Supplementary questions of monthly competition
- Building log analysis system with elk (II) -- deployment and installation
- 02 mongodb data types, important concepts and common shell instructions
猜你喜欢

视频爆炸时代,谁在支撑视频生态网高速运行?

A solution to the inefficiency of setting debug mode in developing flask framework with pychar

La norme européenne en 597 - 1 pour les meubles est - elle la même que les deux normes en 597 - 2 pour les ignifuges?

Learning notes of digital circuit (II)

一文告诉你什么是 Kubernetes
![[graduation season] graduate summary](/img/f6/59134c1dbf70fc809652d925fd528f.jpg)
[graduation season] graduate summary

Detailed explanation of KVM common commands

揭开SSL的神秘面纱,了解如何用SSL保护数据

Door level modeling - learning notes

用Pycharm开发Flask框架设置debug模式没有效果的解决办法
随机推荐
How to write anti shake throttling for small programs?
等保三级密码复杂度是多少?多久更换一次?
使用信号分析器
品达通用权限系统(Day 5~Day 6)
Building a server monitoring platform with telegraf influxdb grafana
猫狗队列的问题
Does the applet input box flash?
03 MongoDB文档的各种增加、更新、删除操作总结
MySQL 主从复制、分离解析
03 summary of various additions, updates and deletions of mongodb documents
利用 telegraf influxdb grafana 搭建服务器监控平台
Building log analysis system with elk (III) -- Security Authentication
电学基础知识整理(一)
GenICam GenTL 标准 ver1.5(2)
美创数据安全管理平台获信通院“数据安全产品能力验证计划”评测证书
Detailed explanation of KVM common commands
applicationContext.getBeansOfType 获取一个接口下所有实现类 执行方法或者获取实现类对象等 操作应用场景学习总结
Single responsibility principle
The operating mechanism of spectrogram in audio Science
Leetcode: monotonic stack structure (Advanced)