SSL-based Secure Data Transfer with Handheld Devices
SSL-based Secure Data Transfer with Handheld Devices
Problem definition:
The secure sockets layer (SSL) security protocol is largely used nowadays
by the World Wide Web to secure Internet communications and an increasing
number of handheld devices are provided by the manufacturers with preinstalled
applications ( التطبيقات المثبتة مسبًقاe.g. Web browsers) and digital certificates in
order to support SSL in wireless environments too. We present first a
comprehensive شامل analysis of SSL protocol and the cryptographic التشفير
algorithms used as building blocks in the protocol. We demonstrate next that SSL
support embedded مغروسalso in other applications for some mobile devices
does not impact significantly on overall application's performance when
communicating with other parties. We wanted to use for our experimental setup,
APIs (Application Programming Interface) and tools that are either available for
the majority of the handheld devices or that can be downloaded and tested freely
and without major modifications. This is the especially the case of application
developers, who preferably would not use modified versions of cryptographic
libraries مكتبات التشفيرand special drivers characteristic to academic/commercial
testing environments. We also developed a tool named SSLperf (SSL performance)
for testing SSL security protocol's performance when transferring either small
amounts of data (e.g. credit card number) or of medium dimension (e.g. a
document in PDF format), with handheld devices. We've compared the results
obtained with SSLperf on Windows CE-enabled handheld and pocket PCs and
'powerful' Windows 2000/XP-enabled platforms with other related works.
Problem Overview
` The security issue is the main concern َهمfor all the online retailers. The
intruders can attack the system and make the system and the database of the e-
commerce companies and hack the sensitive data اختراق البيانات الحساسةof the
company, the financial data and the personal details of the customers. If the
customers' data gets breached يتم اختراق البياناتthen the data, the privacy of
the customers will get compromised. The e-commerce sites can face huge loss;
they can even lose the customers' base. The cyber attackers generally carry out the
malicious activities by incorporating virus األنشطة الضارة عن طريق دمج
الفيروسin the system of the e-commerce server, by taking control over the
insecure network of the e-retailers ]5[ شبكة غير آمنة من تجار التجزئة اإللكترونية.
Trojan horse حصان طروادةand the logic bombs القنابل المنطقيةare two kinds of
threats التهديداتand take away the sensitive information of the system and the
database. Another kind of threat is Denial of Service Attacks هجمات حجب الخدمة
and this attack is responsible to take control of one' system and disallow the
owner to access their own system. This attack is also responsible to shut down
one's server and one's system. Another popular attack is a phishing attack. هجوم
التصيدThe cyber attackers المهاجمين السيبرانيينdevelop a website which is
genuine e-commerce التجارة اإللكترونية الحقيقيةwebsite's lookalike. يبدو مشابها
They simply copy the HTML code and carry out the attack. Besides those threats
discussed, there are vulnerabilities نقاط الضعفtoo [6]. The vulnerabilities incur
يتكبدdue to the attack from the Structured Query Language (SQL) injection,
حقنةcross-site scripting, عبر موقع البرمجةcustomers choosing weak passwords
and lots more. The security measures must be applied to mitigate يخفف منthese
aforesaid threats and the vulnerabilities التهديدات ونقاط الضعف المذكورةrelated
to e-commerce.
Project Overview
To create the directory الدليلthat will contain the SSL keys, perform the
following steps:
1. Log in to your server via SSH. For more information, read our SSH Access
documentation.
2. Create an SSL key storage directory that MySQL can access. For example, run the
mkdir /mysql_keys command to create a mysql_keys directory. دليل
المفاتيح
To create the directory that will contain the SSL keys, perform the following
steps:
1. Log in to your server via SSH (Secure Socket Shell). For more information, read
our SSH Access documentation.
2. Create an SSL key storage directory that MySQL can access. For example, run the
mkdir /mysql_keys command to create a mysql_keys directory.
System Analyses:
Secure Socket Layer (SSL) provides security to the data that is transferred
between web browser and server.
SSL stands for Secure Sockets Layer. It is the standard technology that
uses encryption algorithms to scramble تزاحمdata in transit. في مرحلة انتقالية
This aims to keep internet connections secure and safeguards الضماناتany
sensitive data that is being sent between two computers which prevents hackers
المتسللينfrom modifying and reading any information transferred.
SSL Certificate
To implement SSL for your website, first you must get an SSL certificate.
SSL Certificates are small data files that digitally bind a cryptographic key ربط
مفتاح التشفيرto an organization’s detail, or simply it is a paragraph of letters and
numbers that only your site knows – like a really “long password”. When installed
on a web server, it activates the padlock ينشط القفلand the https protocol and
allows secure data transfer from a web server to a browser.
After getting your SSL certificate, you have to do three more steps to
implement SSL on your website:
1.Activate the SSL certificate (Note: your web host might do this step for
you).
2.Install the certificate (Note: your web host might also do this step for you).
3.Update your site to use HTTPS.
How do you test and validate التحقق من صحةthe security of your SSL
implementations التطبيقاتand protocols?
Introduction
With an SSL certificate, your website can use the HTTPS protocol to
securely transfer information from point A to B. This is crucial مهمwhen
transferring sensitive information like credit card data on checkout الدفعpages
and personally identifiable التعرف عليهاinformation (PII) on login and contact
forms.
In addition to security benefits, websites with SSL encryption get better rankings
التصنيف العالميon Google and improved performance through the use of
HTTP/2. It’s also important to understand that SSL does not protect your
website — rather, it protects the data that is sent through your website.
This guide is designed to show beginners and intermediate المبتدئين والمتوسطين
users how to add a free SSL certificate from Let’s Encrypt on their self-
hosted websites.
& Get
Regardless of the type of certificate you choose, the encryption and level of
security is the same.
Get Help
Looking f website security? We’ot you covered.
These are a decent option for many website owners. Paying a certificate
authority (or your hosting company )شركة استضافةwill often give you the
benefits of technical support. The encryption level is the same as with free SSL
certificates. The key differentiator التمييز الرئيسيwill come in the level of
support you get with your certificate.
These are being spearheaded قادby the Let’s Encrypt initiative – an open
collaboration between a number of global organizations focused on making SSL
certificates accessible to all website owners.
Note
You can also get the benefits of SSL certificates through cloud providers,
such as content delivery networks (CDNs) and website application firewalls
(WAFs) solutions like the one from Sucuri, العصائرwho offer it at no additional
charge.These services are a proxy وكيلbetween the visitor and your website. By
changing your domain records to point to their servers, they can cache your content
to make your website faster and filter out malicious traffic. ارةeرور الضeة المeحرك
This also means that the browser recognizes which server IPs are connected to
your domain, allowing for the use of DV certificates.
These providers can also work with your own SSL certificate. If you are a
Sucuri customer, عصائر العمالءyou can contact our technical support team for
information and assistance.
Note
If you are implementing an SSL certificate through your host, you may
want to skip ahead تخط إلى األمامto Step 3: Important Final Steps.
1.4 Getting a free SSL Certificate
The following guide works best if you have a dedicated مخلصIP for your
site (through a VPS or dedicated server). If you’re on a shared platform, talk to
your host about deploying Let’s Encrypt; a number of hosts have automated the
process of deploying a free SSL for shared hosting accounts. It is possible to use
server name indication (SNI) with one server IP address and generate certificates
for all sites on the server.
The rest of this guide will assume you have full access and control of your
web server.
IP address
Server username (with admin or sudo privileges)
User password (or preferably SSH key authentication)
Software (i.e. Apache, nginx, IIS)
Operating system and version number (i.e. Debian 7, Ubuntu 16.04, etc.)
SSH Access Through cPanel
From your computer, you need a way to log into your server and send SSH
commands. If you are on a Mac, you can use Terminal (built-in application) and on
Windows you can download PuTTY. Some hosts also offer a web interface for
running commands on your server.
Note
The instructions will vary depending on your server software and system.
Some systems do not support Certbot, but you can find a list of other reputable
clients that should work with your server environment.
1. Connect to your server over SSH using the IP address, username, and password.
2. Visit the Certbot website and choose your server operating system and software.
3. Follow the instructions given for your server to do the next steps.
4. Run any commands listed to install dependencies.
5. Run the commands listed to install Certbot.
6. Run the commands listed to generate the certificate.
7. Provide an email address when prompted.
8. Agree to the terms when prompted.
9. Run the commands listed to test renewals under Automating Renewal.
10.Set up a cron or system job on your server to automate the renewal process
The following images and animations illustrate the entire process for a server using
Apache on Ubuntu 16.04.
Using the instructions provided for your server, install any dependencies and the
Certbot tool. أداة سيرتبThe following images are an example of what you can
expect.
Note
If you are getting permission errors, check with your host to ensure your user has
permissions to run administrative commands (i.e. sudo).
After generating the certificate the Important Notes shows the location of
your Certbot configuration directory. This contains your account credentials,
certificate, and private keys.
You should navigate to this location on your server and download a backup.
If you aren’t sure how to do this, you can follow our post on how to make
backups over the command line.
2.4 Automate Renewal
Now you have an active SSL certificate on your site! Your certificate will
expire, however. Let’s Encrypt certificates are only valid for 90 days. You can
automate this process so you don’t have to remember to manually renew the
certificate.
It’s recommended to set the cron or systemd job to renew the certificate
twice a day. Before you begin, note the location of your Certbot configuration
directory from the previous step.
Note
Some server configurations may need to run additional commands to load the new
certs.
You can view the full documentation on Certbot renewals for more
information.
These charitable organizations are working to help make the internet a safer
place for everyone. While these tools are free, you can donate to help support both
Let’s Encrypt and Certbot.
1. https://letsencrypt.org/donate/
2. https://supporters.eff.org/donate/support-work-on-certbot
1. Go to the Websites & Domains tab of the Plesk admin control panel.
2. In the section for the domain name you want to use, click Hosting Settings.
3. In the Security section, select SSL support.
4. Select the Certificate you created, and then click OK.
There are other methods for Apache, such as using your virtual host file. If
you use an IIS server you can follow instructions to use the URL Rewrite
Module and nginx servers can use the nginx configuration file.
Copy this directive into the .htaccess file to redirect HTTP visitors to the
HTTPS version of your site:
RewriteEngine On
RewriteCond %{HTTPS} off
RewriteCond %{HTTP_HOST} ^(www\.)?domain\.com$ [NC]
RewriteRule ^(.*)$ https://www.domain.com/$1 [L,R=301]
Copy
Caution
Editing the .htaccess file can cause issues with more sites with complex structures.
The rewrite below works best for websites on a dedicated server or VPS running
Apache. You need to replace domain with your domain name for the sample code
to work.
3.2 Check for Mixed Content Warnings
While your site is now available on HTTPS, you might still have resources
linked to your website that load over HTTP. This includes things like images,
videos, and external resources.
Browsers will block this content as “unsafe”, which can also cause broken
functionality of your site and security warnings in browsers.
grep -r "http://"
This will list all files to investigate in your server or CMS. Simply change all
resource URLs from http:// to https:// or to a relative path.
You should also query your database or manually look through posts and pages for
HTTP content. There are plugins and extensions ملحقات واإلضافاتavailable that
can automate the process of rewriting URLS using HTTP to HTTPS (i.e. Really
Simple SSL for WordPress).
If the HTTP resource is stored on your own website, we recommend using
the relative directory and filename as follows.
Absolute Path:
<img src="https://example.com/images/pic.jpg">
Relative Path:
<img src="/images/pic.jpg">
Resources that can cause Mixed Content Warnings:
o Web fonts
o Iframe content
o JavaScript includes
o CSS stylesheets
o Image embeds
o Video embeds
o Audio embeds
Caution
If your website loads external resources, changing links to HTTPS could break the
functionality. To avoid this, make sure the resource is available over HTTPS
before changing the URL in your code. You can access the URL with HTTPS in a
browser to verify.
If you run into issues, you can attempt to download the external content and host it
on your own server to ensure it loads over HTTPS. Always test in a development
environment for scripts and other content that could perform differently.
Once configured, add and verify the new HTTPS site in Google Search
Console. This will allow you to recrawl your site and submit a new XML sitemap
with your HTTPS URLs.
For many SEO elements like “rel=canonical” and “open graph” tags, it is
advisable to use an absolute URL, as these are read externally by social media sites
and search engine crawlers.
Similarly, social sharing counters for older content will likely become
invalid. This is because now there is a new URL starting with HTTPS rather than
HTTP, and many tools count each as a separate URL with its own engagement
metrics.
o rel=canonical
o rel=alternate
o rel=next & rel=prev
o hreflang
o Open Graph tags
o Schema.org
o Structured Data
o Sitemaps
o Internal Linking
munication secret between users and the websites they visit. SSL secures
data in transit but does not secure the website itself.
Di
Notes:
- Cater: زود الطعام
- Vouch: يضمن شخص
- Decent: مقبول
- Reputable: حسن السمعة
- Prompted: مطالب
- Enrolled: المقيدين