Verified Document

Secure Sockets Layer Ssl Is Defined By Essay

¶ … Secure Sockets Layer (SSL) is defined by Techtarget (2010) as a common employed protocol used for the management of security of information being transmitted over the internet. SSL has been recently succeeded by the Transport Layer Security (TLS), a protocol that is based on SSL. SSL operates on the program layer that is located between the Transport Control Layer (TCP) and then Hypertext Transfer Protocol. PCI (2008) referred to SSL as the established industry standard that is used in the encryption of the channel between a given web browser and an appropriate web server in order to ensure that there is privacy and reliability in the information that is being transmitted over the given channel. SSL is basically included as part of the web browsers as well as Web servers. Patel (2008,p.223) indicated that the SSL protocol was originally developed by Netscape in order to ensure that the security of information that is being transmitted as well as routed via HTTP,POP3 or LDAP was assured.The protocol had since then been adopted by Microsoft as well as other client/server developers as the de facto standard prior to its evolution...

SSL employs public -- and private key encryption system from the RSA and includes the application of a digital certificate.
How SSL works

According to Patel (2008,p.223), SSL is specially designed in order to employ TCP as its communication layer so as to provide a reliable, secure and authenticated end-to-end connection between two different points over a given network.

The Objectives of SSL

Onyszko (2004) outlines the basic objectives as well as architecture of SSL. The first objective of SSL is to authenticate a client and server against each other. It does this by providing and supporting the use of standard key cryptographic techniques (otherwise known as public key encryption) in authenticating the communication between two parties. The second objective is to ensure integrity of the data being transmitted. The third objective is to secure the privacy…

Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Transport Layer Security and
Words: 1919 Length: 5 Document Type: Term Paper

The wireless application models closely follow the internet model. "WAP specifies two essential elements of wireless communication: an end-to-end application protocol and an application environment based on a browser. The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents.

Building a Secure Workflow Management
Words: 11534 Length: 35 Document Type: Research Proposal

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. 1.4. Lecture Survey. The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system

Database Security Design of an
Words: 2976 Length: 11 Document Type: Term Paper

With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does

Security of Network Is Fundamental
Words: 670 Length: 2 Document Type: Essay

It therefore assists in identifying network vulnerability and corrects them immediately. SSL Certificate Ferland (2009) noted that Secure Socket Layer (SSL) is a network protocol used in encrypting data so that the information send remains secure until it reaches its destination. It also used in the validation of the identity of the website which is using certificate. It informs the user the authentication of the website and that such a web

Internet Trust Certificates in Every
Words: 2900 Length: 10 Document Type: Term Paper

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now