SSL Glossary

A | A1 | A2 | B | C | C1 | C2 | D | E | F G | H | I | J K L | M N O | P Q R | S | S1 | S2 | T | U Z


Secure Server
A Web server that utilizes security protocols like Secure sockets layer (SSL) to encrypt and decrypt data, and messages. Security protocols protect them against fraud, false identification, or third party tampering. Purchasing from a secure server ensures that a user's credit card information or other personal information is encrypted during its passage over the internet to the merchant's server. Popular security protocols include SSL, HTTPS, SSH2, SFTP, PCT, and IPSec.
Secure Sockets Layer or SSL
An Internet protocol which uses encryption to supply data confidentially, providing privacy and data integrity amid a client and a server transaction. SSL HTTP can also, as an option, provide peer entity authentication amid the client and the server with secure SSL validation of digital certificates. SSL is layered below HTTP and above a transport protocol (TCP). SSL is independent of the application it summarizes and any other higher-level protocol can layer on top of SSL transparently. SSL has two layers: (a) SSL's lower layer, the SSL Record Protocol, coated on top of the transport protocol and encapsulating higher level protocols. (b) SSL's upper layer, supplying asymmetric cryptography for server authentication, which is verifying the secure server's digital identity to the client with digital ID signatures or certificates. Te process of verifying the client's identity to the server is known as client authentication. It also allows them to negotiate a symmetric encryption algorithm and secret session key, used for data confidentiality, prior to the transmission or receiving of data by the application protocol. A keyed hash offers data integrity service for data that is encapsulated. See also Transport Layer Security (TLS)
Secure State
A state in which no subject can get access into any object in a manner that is illicit. SSL Certificates provide a Secure State.
Security Association
(a) A relationship established among two or more entities to allow them to guard data they swap. The relationship negotiates characteristics of defense mechanisms but does not involve the mechanisms. (b) Used in IPsec as a simplex (unidirectional) logical connection generated for purposes of security and put in with either ah or esp, but never both. The security association offers security services that depend on the protocol chosen, the IPsec mode transport or VPN tunnel, the endpoints and the choice of optional services in the SSL protocol. A security association is recognized by (a) a destination IP address, (b) a protocol identifier or (c) a security parameter index.
Security Audit
A self-assessing review and investigation of a system's policy, records, and actions to determine the capability of system controls, guarantee compliance with conventional security policy and processes, discover breach in security services, and recommend any alterations which imply a need for countermeasures. The objective of the basic audit is to establish accountability for systems which initiate or participate in security-relevant occurrences and actions. Means are needed to create and record security audit information and are also need in order to review and analyze the audit trail in order to detect and exam attacks and compromises of security.
Security by Obscurity
A term used, more often than not negatively, in reference to the procedure of attempting to secure a system for Internet security and online security by failing to publish any information about it. This is done in the hope that no one will figure out how it works.
«« Back to Top

Сравнить все
сертификаты SSL

Бесплатный сертификат SSL