Demystifying SSL Decryption

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Websites have been around since the early 90s, relying on the HTTP protocol. With HTTP, all of the communication between the client and web server is not encrypted. If an attacker could position themself somewhere within the communication path, they would be able to see all of the data being transferred in clear text. You can think about it like a CB radio. Anyone who wants to tune into a specific channel, can eavesdrop on others chatting, as long as they’re in range. They could also speak up and pretend to be someone they are not.
Luckily there was a better way. Netscape invented HTTPS in 1994, which leverages encryption, so that if an attacker was in between yourself and the web server, all of the information would still be encrypted. Secure web browsing has transformed the Internet allowing for online banking, shopping and everything in between to occur with great safety. The problem with encrypted traffic, is that security devices including firewalls, had no way to inspect this traffic. An attacker could easily leverage this limitation, to drop in a virus, communicate with a command and control server on the Internet or worse yet, copy sensitive data from an environment offsite. So how do we address this?

X ITM Cloud News

Sofia .

Leave a Reply

Next Post

Monolithic Decomposition and Implementing Microservices Architecture

Tue Jul 21 , 2020
Spread the love          “Microservices” is one of the most popular buzz-words in the field of software architecture. While our first article talks about the fundamentals and benefits of microservices, in this article we will explain how enterprises can implement microservices in real-world use cases by leveraging key architectural principles. How to […]
X- ITM

Cloud Computing – Consultancy – Development – Hosting – APIs – Legacy Systems

X-ITM Technology helps our customers across the entire enterprise technology stack with differentiated industry solutions. We modernize IT, optimize data architectures, and make everything secure, scalable and orchestrated across public, private and hybrid clouds.

This image has an empty alt attribute; its file name is x-itmdc.jpg

The enterprise technology stack includes ITO; Cloud and Security Services; Applications and Industry IP; Data, Analytics and Engineering Services; and Advisory.

Watch an animation of  X-ITM‘s Enterprise Technology Stack

We combine years of experience running mission-critical systems with the latest digital innovations to deliver better business outcomes and new levels of performance, competitiveness and experiences for our customers and their stakeholders.

X-ITM invests in three key drivers of growth: People, Customers and Operational Execution.

The company’s global scale, talent and innovation platforms serve 6,000 private and public-sector clients in 70 countries.

X-ITM’s extensive partner network helps drive collaboration and leverage technology independence. The company has established more than 200 industry-leading global Partner Network relationships, including 15 strategic partners: Amazon Web Services, AT&T, Dell Technologies, Google Cloud, HCL, HP, HPE, IBM, Micro Focus, Microsoft, Oracle, PwC, SAP, ServiceNow and VMware

.

Cloud Services Live Updates Contact Us




X ITM