Learnitweb

Category: Java security

  • A01: 2021 – Broken Access Control

    1. What is access control? Access control is a security mechanism that regulates and restricts who or what can view, access, or modify resources in a system or application. Its primary purpose is to ensure that only authorized users or entities have access to specific resources, while unauthorized access is prevented. Access control is a…

  • OWASP – An Introduction

    1. What is OWASP? OWASP stands for Open Web Application Security Project. The Open Web Application Security Project (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provides free and open resources. It is led by…

  • What is a PEM file?

    1. Introduction Privacy-Enhanced Mail (PEM) is a widely used file format for storing and transmitting cryptographic keys, certificates, and related data. It originated from a set of 1993 IETF standards aimed at defining “privacy-enhanced mail” for secure email communication. While the original privacy-enhanced mail protocol is largely obsolete, the PEM file format has become a…

  • What is a PKCS#12 file?

    1. Introduction In cryptography, PKCS #12 specifies a file format designed to securely bundle multiple cryptographic objects into a single archive file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. A PKCS #12 file may be encrypted and signed.…

  • A guide to Java KeyStore and KeyStore API

    1. Introduction In this tutorial, we’ll discuss a very important concept of security – keystore. A keystore is a storage facility for cryptographic keys and certificates and represented by java.security.KeyStore class in Java. A KeyStore manages different types of entries and the three basic type of entries are PrivateKey, SecretKey and Certificate. Let us discuss…

  • TLS Handshake process

    1. Introduction A TLS handshake is the first step that starts the a TLS communication session. During a TLS handshake, the two parties in the communication exchange acknowledgement messages, verify each other, agree on the cryptographic algorithms to be used in communication and agree on session keys. SSL was replaced by TLS (Transport Layer Security),…

  • What is HTTPS

    1. Introduction Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP. The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack. In HTTPS, the data…