SSL Glossary

A | A1 | A2 | B | C | C1 | C2 | D | E | F G | H | I | J K L | M N O | P Q R | S | S1 | S2 | T | U Z


Signature is a unique and distinct pattern that is used to detect a virus infection or system penetration (see intrusion detection system), or as a "Digital ID" for SSL secure systems. The digital signature can be a permanently-set string of bytes, or it can be more complex and algorithmically-based, as with a secure socket layer. ID Signatures for secure server system penetration are by and large much more complex. They can even include the comparison of many different types of data in a security audit with logging.
Single sign-on
Single sign-on is a system, process or procedure in which a user is authenticated on one occasion, giving them access to a lot of disparate systems from that time on. It is like secure authentication or secure SSL authentication that only has to be done a single time.
Super-User is a user with full, unlimited and unrestricted access to each and every portion and resource of the system, such as the PKI Manager who administers and manages SSL Certificate duties on a large network.
Symmetric Key Encryption
Private key encryption, or "symmetric key encryption" uses the exact same, private key for both encryption and decryption. Both parties share the key as the factor for the communication. Symmetric key systems do not have to have a public key infrastructure (PKI) the way that asymmetric key encryption has to. Symmetric key encryption requires a secure channel for key exchange, unlike other kinds of 128-bit encryption with SSL.
System Integrity
The condition an SSL secure server is in when it executes its intended operation in an unimpaired manner, free from advertent or inadvertent unauthorized manipulation of the system.
«« Back to Top

Бесплатный сертификат SSL