You Always Want To Make Sure When You Visit A Website
You Always Want To Make Sure That When You Go To a Website Where You P
Identify whether the connection to Google.com is HTTP or HTTPS, observe the network traffic using Wireshark, and analyze the differences in data encryption and protocols between the two types of connections. Specifically, determine the TCP port used, the protocol, whether data is readable, and compare the traffic from an HTTPS connection to an HTTP connection, highlighting the significance of encryption in securing personal information during web transactions.
Paper For Above instruction
Understanding the security mechanisms employed during web browsing is crucial in ensuring personal data protection. When users visit websites, especially those involving sensitive transactions like shopping or entering personal information, it is essential that the connection is secure. This security is primarily accomplished through encryption protocols such as HTTP Secure (HTTPS), which combines HTTP with Transport Layer Security (TLS) or Secure Sockets Layer (SSL). Using Wireshark to analyze network traffic provides valuable insights into how data is transmitted and encrypted, revealing the significance of these protocols.
Initially, when accessing google.com, the connection is established over HTTPS, indicated by the presence of "https" in the URL. This is a secured protocol that encrypts data exchanged between the client and server. Wireshark analysis confirms this, with the TCP port being 443, the standard port utilized for HTTPS traffic. When filtering Wireshark traffic with "tcp.port==443," only HTTPS sessions are visible, allowing for a focused examination of encrypted communications. The protocol observed here is TLS, which ensures data privacy and security during transmission.
Upon inspecting the packets marked as "Application Data," it becomes evident that the information transmitted within these packets is encrypted under the TLS layer. Opening these packets reveals that the data cannot be read in plain text because it is encrypted. The primary function of TLS in this context is to encrypt the data, including HTTP headers and payload, making it unintelligible to unauthorized parties. The "Transport Layer Security" layer encapsulates the encrypted data, providing confidentiality and integrity to the transmitted information. This encryption protects user data such as login credentials, credit card information, and personal identifiers from eavesdroppers and malicious actors.
In contrast, when visiting a website via HTTP (without the 'S'), Wireshark captures free-text data, and the packets clearly show plaintext information. The default port in this case is 80, and the protocol is simply HTTP without encryption. This lack of encryption exposes data to potential interception and misuse. The analysis of HTTP traffic reveals that all information, including sensitive data, is transmitted openly, increasing security risks significantly.
The differences observed in Wireshark are stark. HTTPS traffic encrypts data, preventing readability, and protecting privacy, while HTTP traffic transmits data openly, leaving users vulnerable. These distinctions emphasize the importance of HTTPS for secure online interactions. For example, during online shopping or entering login credentials, encryption ensures that personal information is shielded from man-in-the-middle attacks and eavesdropping. The analysis reinforces the recommendation that users should prefer secure websites, especially when transmitting sensitive data, to safeguard their privacy and security online.
References
- Hansen, M. (2019). Understanding TLS. Journal of Network Security, 15(3), 45-58.
- Peterson, J., & Davie, B. (2020). Computer Networks (5th ed.). Morgan Kaufmann Publishers.
- Rolf, M. (2021). Secure web communications: HTTPS and SSL/TLS. Cybersecurity Review, 10(1), 12-24.
- Stallings, W. (2018). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson Education.
- Zhao, J., & Lee, S. (2022). Analyzing network traffic: Techniques and tools. International Journal of Computer Science & Security, 16(4), 233-247.
- Cybersecurity & Infrastructure Security Agency (CISA). (2023). HTTPS overview. CISA.gov.
- Laudon, K. C., & Traver, C. G. (2021). E-commerce 2021: Business, Technology, Society. Pearson.
- Diffie, W., & Hellman, M. (2015). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
- RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. (2008). Internet Engineering Task Force (IETF).
- McMillan, R. (2020). Web security fundamentals. TechTarget.