Http Protocol Essay

559 words - 3 pages

The HTTP protocol for the longest time has had a feature called Cookies. Today, all of the modern web development structure offers an easy access to cookies for programmers to never concern on how to format them or to make sure cookie headers are directed accurately. It is instructive to learn on how cookies work as well as the options they support. The two essential function of a cookie is to first, store information and second to instruct a Web server of a user returning to a specific Website/page. As an example is the personalization of Web pages, or registering for products/services. When that action occurs on a web browser a cookie is create on the client side. On the server side of the visiting Web page server the cookie assists in recalling the specific information (Zakas, 2009). The cookie simplifies the process of ...view middle of the document...

In turn, this flaw can be exploited by an attacker to set their own rogue cookies and use them later via an HTTPS connection. Thus, a victim will be fooled into using the attacker’s cookie instead of the legitimate Web site cookie. In addition, the attacker in conjunction with other known vulnerabilities in Web servers like SQL Injection, can use its controlled cookie to gain access of private information (Anderson, 2015). Remember cookies stores many types of information of the web surfing user. Therefore, using a man-in-the-middle (MITM) attacks on an HTTP session, the attacker can inject cookies that can be attached to consecutive HTTPS connections. Since there are cookies containing the secure flag indicating transmission via HTTPS connection protocol, there is no parameter that oversees how or who sets HTTP cookies (Zheng, et al., 2015). The use of internet cookies can be considered beneficial for computer users. On the other hand, it should ring an alarm to computer users that an un-desired information recording file becomes available to anyone with enough computer knowledge. Internet cookies come as a convenience to the user to save time and not repeat the same steps when visiting a website. However, allowing the use of cookies is up to each of us. Thank you for reading.
Anderson, M. (2015, September 24). Cookies can render secure websites vulnerable in all modern browsers. Retrieved from Th Stack:
Zakas, N. C. (2009, May 5). HTTP cookies explained. Retrieved from NCZOnline:
Zheng, X., Jiang, J., Liang, J., Duan, H., Chen, S., Wan, T., & Weaver, N. (2015, August 14). Cookies Lack Integrity: Real-World Implications. Retrieved from USENIX:

Other Essays Like Http Protocol

Networking Sip Trunking Essay

598 words - 3 pages Introduction SIP which means Session Initiation Protocol is used for signaling system for connecting, monitoring and disconnection multimedia and voice based communications sessions over the internet. Internet Engineering Task Force defines SIP as “Peer-to-peer multimedia signaling protocol that integrates with other internet services to deliver rich communications”. Definition SIP trunking means that the IP media streams that are transmitted

Real Time Protocol (Rtp) Essay

620 words - 3 pages , audio, and data via network sessions (connected and connectionless). RTCP provides the control portion of RTP media transmissions; without it, RTP would not work properly. RFC 1889 and 3550 go into a lot of depth on what RTP is, and how it came about. RFC 1889 was obsoleted by 3550 in 2003. References Casner S.L., Frederick, R., Jacobson, V. (2003). RFC 3550. RTP A Transport Protocol for Real-Time Applications. The Internet Society. Retrieved from: Some Frequently Asked Questions about RTP. (2004). Retrieved from:

The Seven Domains of a Typical It Infrastructure

638 words - 3 pages IPv6 Research Paper Current State of IPv6 DJ NT1430 Linux Networking Instructor: Mr. Brown March 5, 2013 Due to the number of limited number of internet addresses, a new internet protocol has come available to consumers, IPV6. “Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP), the communications protocol that routes traffic across the Internet. It is intended to replace IPv4, which

Web Technology

2047 words - 9 pages (http:// or https://) in URIs refer to the Hypertext Transfer Protocol and to HTTP Secure, respectively, and so define the communication protocol to be used for the request and response. The HTTP protocol is fundamental to the operation of the World Wide Web; the added encryption layer in HTTPS is essential when confidential information such as passwords or banking information are to be exchanged over the public Internet. Web browsers usually

The History, Function, Governance, and Value of the Tcp/Ip Standard

2113 words - 9 pages within a prescribed standard. These include such familiar protocols as Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), and of course TCP and IP. Because of its use and acceptance during the ARPANET years, TCP/IP has become the most widely used protocol stack for network communications and the de facto standard for connection to the Internet. Function of the TCP/IP Standard The TCP/IP

Raven Williams-1230

1110 words - 5 pages are many different protocols used and they all vary from protocol to protocol. Protocols can be implemented in hardware or software. Many types of protocols have a lot of advantages and disadvantages. One example of a protocol is “HTTP – HyperText Transfer Protocol”. HTTP is an internet-based protocol that allows our systems to send and receive webpages. HTTP is an application layer and is designed to work with framework within internet

Structure Of Management Information

1886 words - 8 pages management of IP routes." REVISION "9103310000Z" DESCRIPTION "The initial revision of this MIB module was part of MIB- II." ::= { mib-2 48} [RFC2011] 2)     Transmission Control Protocol MIB tcpMIB MODULE-IDENTITY LAST-UPDATED "200502180000Z" -- 18 February 2005 ORGANIZATION "IETF IPv6 MIB Revision Team" CONTACT-INFO &quot

Security Protocols

1624 words - 7 pages authentication is one of the agreed-upon methods a web server can use to negotiate credentials with a user's web browser. It applies a hash function to a password before sending it over the network, which is safer than basic access authentication, which sends plaintext. Technically, digest authentication is an application of MD5 cryptographic hashing with usage of nonce values to discourage cryptanalysis. It uses the HTTP protocol. Process

Politics of Environment

3205 words - 13 pages negotiated by virtually the whole of the international community” (Sands, 2003, p359). In 1997 the Kyoto Protocol to the UNFCCC was adopted, creating a legally binding international treaty to which members of the UNFCCC could ratify. Fundamentally, this essay aims to evaluate whether the Kyoto Protocol is, and has been, an equitable and effective global agreement, focussing particularly on how the key principles of international law have been applied in

Video Conferencing

5176 words - 21 pages worldwide basis. The ITU has developed the H, G and T Series of standards whilst the IETF has developed Real-Time Protocol (RTP), Real-Time Control Protocol (RTCP) & Resource Reservation Protocol (RSVP). Transport Protocols. There are several standards based transport protocols used with conferencing, TCP, UDP & RTP. Generally, each configures the data into packets, with each packet having a 'header' that identifies its contents. The protocol

Data Networking Assignment

1568 words - 7 pages Praveen Chekka TSMG 5330 – Fall 2013 NU ID: 001942606 DATA NETWORKING ASSIGNMENT 03 1. The difference in browsing time or page load time depends of various factors. Different factors are Cookies, Caching, and HTTP persistent connection with pipelining, SPDY protocol and DHCP protocol. Cookies - HTTP server is stateless. Cookies help the server to identify them because it allows users as a function of identity to access the content

Related Papers

It204 Ip#5 Essay

1184 words - 5 pages longer required. NetBIOS may still be needed if a network has clients running older versions of Windows. The TCP/IP protocol suite has several protocols associated with it. HyperText Transfer Protocol (HTTP) is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets. HTTP is an information requesting and responding protocol. It is used to send and request Web documents; it is also used

Router And Switch Configuration Essay

626 words - 3 pages in routing traffic and is a type of IGP, which means it’s a protocol that is used within only one system. References Cisco. (2012). Catalyst 2950 Switch Getting Started Guide. Retrieved from IBM. (2005). ConsoleUI parts and related variables. Retrieved from Wikipedia. (2012). Spanning Tree Protocol. Retrieved from Wikipedia. (2012). Virtual LAN. Retrieved from

A Report To Critically Compare A Number Of Routing Protocols; Including Rip V2, Eigrp & Ospf

4252 words - 18 pages (Cisco Networking Academy). England: Cisco Press. SourceDaddy. (2012) Selecting a Routing Protocol - Networking Tutorial. [Online] Available: [Accessed: 25 February 2014].

Kudler Fine Foods Network Analysis

1013 words - 5 pages scalable which enables expansion of the network as needed. It also provides very reliable data delivery. The Suite includes protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP). HTTP transfers web pages including plain text, audio, video, images and hypertext. FTP transfers files from one computer to another. SMTP is the protocol needed to send and receive email messages. The