Downloads: 113 | Views: 322 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Information Technology | India | Volume 3 Issue 6, June 2014 | Popularity: 7.1 / 10
The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati
Abstract: The Open Secure Sockets Layer (OpenSSL) is used to provide a secure platform for transactions that happen over the internet. About two thirds of the servers on the internet use the OpenSSL platform to provide secure transaction over the internet. The OpenSSL is a widely used open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Transactions such as online shopping; emails and online banking are carried out on the internet through the OpenSSL and other platforms which provide a security. Vulnerabilities have however been found in the OpenSSL that has resulted in a wide public outcry all over the world. A vulnerability referred to as the Heartbleed Bug has sent shockwaves all over the internet. From the study we conducted; the scope of the data that has been potentially compromised is astronomical and includes usernames; passwords; bank account and credit card numbers; medical data; documents in online cloud storage. Not only has all of this user data been directly compromised; but; what are worse; the private keys of the servers running the vulnerable versions of OpenSSL were also almost certainly compromised. We recommend patching of affected applications or/and upgrade to versions that are not vulnerable in order to mitigate the risks identified.
Keywords: OpenSSL, Heartbleed bug, secure, Transport Layer Security, Secure Sockets Layer, vulnerability
Edition: Volume 3 Issue 6, June 2014
Pages: 1470 - 1473
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022
Pages: 1382 - 1391Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience
Wasif Khan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, Iraq, Volume 11 Issue 8, August 2022
Pages: 933 - 935Artificial Intelligence (AI) Deep Learning for Phishing Attack
Taif S. Hasan
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Technology, India, Volume 11 Issue 6, June 2022
Pages: 1959 - 1968Enhancing Cloud-Based Smart Contract Security: A Hybrid AI and Optimization Approach for Vulnerability Prediction in FinTech
Ranadeep Reddy Palle, Haritha Yennapusa, Krishna Chaitanya Rao Kathala
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Information Technology, India, Volume 12 Issue 2, February 2023
Pages: 1704 - 1712Explore the Application of Predictive Analytics and Machine Learning Algorithms in Identifying and Preventing Cyber Threats and Vulnerabilities within Computer Systems
Ranadeep Reddy Palle
Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Information Technology, United States of America, Volume 12 Issue 2, February 2023
Pages: 1759 - 1765Security is the Best Enabler and Blocker of AI Adoption
Laxminarayana Korada, Satyaveda Somepalli