I’m using clips from Jessica McKellar’s How the Internet works
http://example.com:8042/over/there?name=ferret#nose
\_/ \__________/\___/\_________/ \_________/ \__/
| | | | | |
scheme authority port path query fragment
You type:
http://www.example.com/Index.Html
Your browser sends:
GET /Index.Html HTTP/1.1
Host: www.example.com
HTTP/1.1 200 OK
Date: Mon, 23 May 2005 22:38:34 GMT
Server: Apache/1.3.3.7 (Unix) (Red-Hat/Linux)
Last-Modified: Wed, 08 Jan 2003 23:11:55 GMT
ETag: "3f80f-1b6-3e1cb03b"
Content-Type: text/html; charset=UTF-8
Content-Length: 131
Accept-Ranges: bytes
Connection: close
<html>
<head>
<title>An Example Page</title>
</head>
<body>
Hello World, this is a very simple HTML document.
</body>
</html>
<html>
<head>
<title>An Example Page</title>
</head>
<body>
Hello World, this is a very simple HTML document.
</body>
</html>
Histiaeus is said to have tattooed a message on a slave’s head and let the hair grow in.
the ciphertext “fuxppb” has been shifted forward 3 letters?
fuxppbetwooadsvnnzcrummyHow do you it’s really Bob’s (public) key?
(used by HTTPS and replaces SSL)
worm (autonomous); virus (dependent); Trojan (non-self-replicating); bots (remote controlled)
| a. DNS | 1. location of Web resource |
| b. IP | 2. reliably deliver data |
| c. TCP | 3. addressing and routing |
| d. HTTP | 4. marked up Webpage content |
| e. HTML | 5. requesting Web resource |
| f. URL | 6. name to IP mapping |
What are the three important components of web security?
- confidentiality: cipher + symmetric secret/key
- exchanging secret: asymmetric public/private keys
- authenticate public key: certificate
The ciphertext “gljlwdo” has been shifted forward 4 letters.
gljlwdofkikvcnejhjubmdigital