YoVDO

Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites - USENIX Enigma Conference - 2016

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses Cloud Computing Courses Web Security Courses Data Protection Courses

Course Description

Overview

Explore the complexities of HTTPS connections and data security in this 21-minute conference talk from USENIX Enigma 2016. Delve beyond the simple "lock" icon in web browsers to understand the intricate topology of services handling data after it leaves the HTTPS tunnel. Learn about the evolution of HTTPS termination, the impact of low-cost web infrastructure services on secure global caching, and the challenges of extending trust beyond the initial connection. Discover potential approaches to bridge security gaps and gain insights into the true journey of web data once it reaches the server side. Examine topics such as Moore's Law, cloud computing, modern web properties, edge networks, and negative security indicators to enhance your understanding of online data protection.

Syllabus

Intro
What is a padlock
What is HTTPS
Moores Law
The Cloud
Modern Web Properties
Github
Edge Network
Google Front End
Data Protection
HTTP
Negative Security Indicators


Taught by

USENIX Enigma Conference

Related Courses

Adventures in Authentication and Authorization
USENIX Enigma Conference via YouTube
Navigating the Sandbox Buffet
USENIX Enigma Conference via YouTube
Meaningful Hardware Privacy for a Smart and Augmented Future
USENIX Enigma Conference via YouTube
Working on the Frontlines - Privacy and Security with Vulnerable Populations
USENIX Enigma Conference via YouTube
Myths and Lies in InfoSec
USENIX Enigma Conference via YouTube