1 00:00:00,420 --> 00:00:06,940 Let us have a discussion on secure sockets layer and how SSL and VPN works together. 2 00:00:07,290 --> 00:00:09,590 Well, what is assassin for time being? 3 00:00:09,600 --> 00:00:10,860 Just ignore the picture. 4 00:00:11,280 --> 00:00:14,370 Focus on what I'm going to tell you now. 5 00:00:14,370 --> 00:00:18,250 Next on the list is the secure sockets layer. 6 00:00:18,690 --> 00:00:26,910 Now, this security protocol was developed by Netscape to actually work with its browser, and it is 7 00:00:26,910 --> 00:00:30,150 based on arriviste Shamir and Adelman. 8 00:00:30,150 --> 00:00:34,620 That is the RSA encryption algorithm, which is a public key encryption. 9 00:00:35,010 --> 00:00:43,020 And it is used to enable the securitization connections over the Internet between the browser and of 10 00:00:43,030 --> 00:00:43,330 Web. 11 00:00:43,350 --> 00:00:43,830 So. 12 00:00:45,480 --> 00:00:50,940 Now, as the sun is service independent, what is the meaning of service independence? 13 00:00:51,420 --> 00:00:57,780 It means that a lot of different network applications can be securely connected with it. 14 00:00:58,300 --> 00:01:04,590 One of the famous being the ubiquitous etched deep south, that is the hypertext transport. 15 00:01:06,010 --> 00:01:15,430 You got it right, Hypertext Transfer Protocol HD deep's a hyper text transfer protocol, there is no 16 00:01:15,430 --> 00:01:16,050 transport. 17 00:01:16,300 --> 00:01:17,290 I was checking on you. 18 00:01:17,920 --> 00:01:24,180 So HTP uses SSL to get the HDTV protocol. 19 00:01:25,270 --> 00:01:32,020 Now, as time marched on, as the cell was merged with another transport layer, security protocols 20 00:01:32,020 --> 00:01:37,720 to form a new protocol that is called Let's Transport Layer Security Details. 21 00:01:37,720 --> 00:01:41,770 And the latest version of Palace is VLS 2.0. 22 00:01:42,220 --> 00:01:45,670 And it provides a number of enhancement or the earlier versions. 23 00:01:46,450 --> 00:01:54,520 Now, several improvements in the operation of the main component of encryption was with the Amedi five 24 00:01:54,520 --> 00:01:56,650 or the secured hashing algorithm. 25 00:01:56,650 --> 00:01:58,450 S.A.G. was being introduced. 26 00:01:59,020 --> 00:02:07,450 Hashing functions are used by SSL to ensure that the data is not changed or altered, preserving the 27 00:02:07,450 --> 00:02:14,290 integrity of the data, which is one of the most important elements of information, security, integrity. 28 00:02:17,240 --> 00:02:23,980 Now, more flexibility in the choice of hashing and encryption algorithms on the part of the client 29 00:02:23,990 --> 00:02:32,450 and server are also supported by SSL and it has enhanced support for the advanced encryption standard 30 00:02:32,450 --> 00:02:34,760 that is the atheist's algorithm. 31 00:02:36,620 --> 00:02:42,800 Now, what is you can see on the screen, I forgot this, this isn't a Cecil connection process. 32 00:02:42,800 --> 00:02:46,340 The first thing here, I use my little laser pointer. 33 00:02:46,340 --> 00:02:48,590 The first thing here is connection request. 34 00:02:49,070 --> 00:02:53,030 Uh, the PC or the host sends a correction request to the server. 35 00:02:53,690 --> 00:02:56,990 Then the server asks if you do need a secure connection. 36 00:02:57,170 --> 00:03:00,110 OK, I'll provide with all the security capabilities. 37 00:03:00,510 --> 00:03:04,640 And finally, the SSL connection is established. 38 00:03:05,630 --> 00:03:15,410 Now, SSL VPN is really the process of using the secure socket layer to create a virtual private network. 39 00:03:15,620 --> 00:03:16,100 All right. 40 00:03:16,640 --> 00:03:24,080 A VPN is a secured connection between the two systems that would otherwise have to connect to each other 41 00:03:24,350 --> 00:03:25,970 through a non secured network. 42 00:03:26,400 --> 00:03:27,390 Oh, here's what I mean. 43 00:03:27,410 --> 00:03:32,180 Listen carefully now, even though I never really let this happen. 44 00:03:32,180 --> 00:03:37,550 But let's just say I could connect to the servers in my corporate office through the Internet. 45 00:03:37,580 --> 00:03:46,180 OK, now, you know by now that this would be a very bad thing because the Internet is not at all secure. 46 00:03:46,280 --> 00:03:46,790 Right. 47 00:03:47,240 --> 00:03:55,970 But if I connect to all of those servers using a virtual private network with a tunnelling protocol 48 00:03:57,770 --> 00:04:05,990 inside, anything that I send from my PC to my corporate office would be locked up nicely and securely. 49 00:04:06,260 --> 00:04:06,700 Right. 50 00:04:07,900 --> 00:04:15,790 Plus, weapons come in handy for the data that's being sent within a private network that that you would 51 00:04:15,790 --> 00:04:19,030 probably wouldn't want everyone on the network to be able to see. 52 00:04:20,440 --> 00:04:27,400 Maybe you want the specific computers on the Internet to be able to communicate with each other securely, 53 00:04:27,820 --> 00:04:31,820 like, let's say, the computers used by your top finance people. 54 00:04:32,590 --> 00:04:40,540 Now, you wouldn't necessarily want that data just sent off in the clear to be viewed by the office 55 00:04:40,540 --> 00:04:41,070 gossip. 56 00:04:41,530 --> 00:04:42,850 Now, would you know? 57 00:04:43,810 --> 00:04:50,680 So you can put those finance books on a VPN that's just like having them on their own little private 58 00:04:50,680 --> 00:04:51,310 network. 59 00:04:52,240 --> 00:04:59,770 Plus, what's even cool about this setup is that the members of your Internet VPN can still communicate 60 00:04:59,770 --> 00:05:02,520 with everyone else so whenever they want. 61 00:05:02,770 --> 00:05:05,230 So why not use of VPN? 62 00:05:06,430 --> 00:05:07,150 So he is it. 63 00:05:07,600 --> 00:05:10,770 You can see the server and the SSL VPN gateway. 64 00:05:11,110 --> 00:05:13,460 Here is the clear text communication. 65 00:05:13,480 --> 00:05:21,790 But when a client wants to connect through the Internet to your server, it uses a necessarily VPN communication 66 00:05:22,150 --> 00:05:24,330 which provides more security. 67 00:05:25,180 --> 00:05:27,550 So that does it for SSL and VPN. 68 00:05:27,580 --> 00:05:32,480 Just make sure that you understand why VPN is used alongside with a system. 69 00:05:33,370 --> 00:05:39,700 It is literally a process of using assistant to create a private network. 70 00:05:39,730 --> 00:05:42,290 So that is the use of SSL and VPN. 71 00:05:43,120 --> 00:05:44,820 Well, that does it for this lecture. 72 00:05:45,190 --> 00:05:47,340 I will ask you in the next lecture.