Verified Document

Secure Sockets Layer Ssl Is Defined By Essay

¶ … Secure Sockets Layer (SSL) is defined by Techtarget (2010) as a common employed protocol used for the management of security of information being transmitted over the internet. SSL has been recently succeeded by the Transport Layer Security (TLS), a protocol that is based on SSL. SSL operates on the program layer that is located between the Transport Control Layer (TCP) and then Hypertext Transfer Protocol. PCI (2008) referred to SSL as the established industry standard that is used in the encryption of the channel between a given web browser and an appropriate web server in order to ensure that there is privacy and reliability in the information that is being transmitted over the given channel. SSL is basically included as part of the web browsers as well as Web servers. Patel (2008,p.223) indicated that the SSL protocol was originally developed by Netscape in order to ensure that the security of information that is being transmitted as well as routed via HTTP,POP3 or LDAP was assured.The protocol had since then been adopted by Microsoft as well as other client/server developers as the de facto standard prior to its evolution...

SSL employs public -- and private key encryption system from the RSA and includes the application of a digital certificate.
How SSL works

According to Patel (2008,p.223), SSL is specially designed in order to employ TCP as its communication layer so as to provide a reliable, secure and authenticated end-to-end connection between two different points over a given network.

The Objectives of SSL

Onyszko (2004) outlines the basic objectives as well as architecture of SSL. The first objective of SSL is to authenticate a client and server against each other. It does this by providing and supporting the use of standard key cryptographic techniques (otherwise known as public key encryption) in authenticating the communication between two parties. The second objective is to ensure integrity of the data being transmitted. The third objective is to secure the privacy…

Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Trust Certificates in Every
Words: 2900 Length: 10 Document Type: Term Paper

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

E-Commerce on Business Strategy the Purpose of
Words: 4512 Length: 16 Document Type: Term Paper

E-Commerce on Business Strategy The purpose of this literary review is to determine the effects and impacts of e-commerce on business strategies and internal processes with particular emphasis on the travel industry. Our review will include material from several different sources including the Sloan Management Review, Travel Weekly and white papers from Ernest & Young. We will begin by defining E-commerce and the impact of it in the new economy. Subsequently we

Counseling Although Counselors Work in
Words: 3758 Length: 13 Document Type: Thesis

4, Privacy Information, Limits of Confidentiality 16. Does the site have a waiver that clients must electronically sign or mail in before beginning counseling that specifically states the limits of ensuring confidentiality over the Internet? Confidentiality: a.4., Limits of Confidentiality; Confidentiality: c., Client Waiver Source: Shaw & Shaw, 2006, p. 42 Other changes that will undoubtedly influence the types of codes of ethical conduct mandated for counselor in the future will be the enormous

Network Security
Words: 3486 Length: 8 Document Type: Term Paper

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Features of Telecommunications Networks, Including Key Networking
Words: 1323 Length: 4 Document Type: Essay

features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. The OSI layer covers the different layers and types of communication that occurs within a network. The layers, in order of complexity from greatest to lowest are application, presentation, session, transport, network, data link and physical. The physical layer is the actual transport medium like network cable and such while routers

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now