Internet Security-security of data transmission and data transmission
Internet Security-talking about Data Transmission security. In the Internet world, the security issue of data hijacking is particularly prominent. How can we prevent data hijacking during transmission?
Scenario:
I. Data Packet Capture
Once a computer is injected with a program (for example, you can easily browse some poor websites), the network requests on your computer will be completely transparent.
Ii. External Network
Connecting to a restaurant or other unknown wifi will cause the network requests on your mobile phone to be transparently transmitted to the public network through wifi, which means they are completely transparent.
Note: do not perform sensitive operations when connecting to wifi in unknown restaurants, such as querying bank card account information and entering the payment password.
Protection: 1. End-to-end Data Encryption
Solution: the client sends all data to the server for RSA encryption (the client encrypts the data through the public key, and the server decrypts the data through the private key)
Solution: ciphertext data transmission, even if the data is hijacked, is not feasible, because the private key is saved by the server side, unless the server breaks through the private key (generally impossible, unless there is an inner)
Ii. Signature Verification
Solution: sort the packets transmitted by the client by ASCII code and perform MD5 Encryption
Solution: prevent tampering during Data Transmission
Iii. Message validity Verification
Solution: each time the client sends a message to the server, it must have a timestamp. the backend verifies the validity of the message timestamp.
Solution: prevent the same encrypted data packet from being requested infinitely
Iv. interface connection to HTTPS protocol (HTTPS protocol is currently recognized as the safest network transmission protocol)