YoVDO

Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites - USENIX Enigma Conference - 2016

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses Cloud Computing Courses Web Security Courses Data Protection Courses

Course Description

Overview

Explore the complexities of HTTPS connections and data security in this 21-minute conference talk from USENIX Enigma 2016. Delve beyond the simple "lock" icon in web browsers to understand the intricate topology of services handling data after it leaves the HTTPS tunnel. Learn about the evolution of HTTPS termination, the impact of low-cost web infrastructure services on secure global caching, and the challenges of extending trust beyond the initial connection. Discover potential approaches to bridge security gaps and gain insights into the true journey of web data once it reaches the server side. Examine topics such as Moore's Law, cloud computing, modern web properties, edge networks, and negative security indicators to enhance your understanding of online data protection.

Syllabus

Intro
What is a padlock
What is HTTPS
Moores Law
The Cloud
Modern Web Properties
Github
Edge Network
Google Front End
Data Protection
HTTP
Negative Security Indicators


Taught by

USENIX Enigma Conference

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Defined Networking
Georgia Institute of Technology via Coursera
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Web-Technologien
openHPI
Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique