The Secure Sockets Layer

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Hacking is the most popular modern day piracy, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc., and not limited to any of them.

Viruses

In computers, a virus is a program or programming code that replicates the copy or the start of a copy to another program, computer boot sector or document. Viruses can be transmitted as attachments to an email account or a downloaded file, or be present on a diskette or CD. The immediate source of the email account, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses cause its effect as soon as the code runs, other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") And some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates by resending itself as an email attachment or as part of a network message is known as a worm.

Identity Theft

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, to impersonate another person. The information can be used to obtain credit, goods, services on behalf of the victim, or to provide the thief with false credentials. In addition to running a debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

Identity theft is classified in two ways: real name and taken into account. True name identity theft means that the thief uses your personal information to open new accounts. The thief can open a credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Acquisition Account Identity theft means that the imposter uses personal information to access existing accounts of the person. Generally, the thief will change the mailing address on an account and run a huge bill before the person whose identity has been stolen realizes there is a problem. The Internet has made ​​it easier for an identity thief to use the information they have stolen because transactions can be made without any personal interaction.

Firewall

A firewall is a set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the Internet at large installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access.

Basically, a firewall, working closely with a router program, examines each network packet to determine whether to send you to your destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A Firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.

Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) is a protocol commonly used for managing the security of a message transmission over the Internet. SSL has recently been replaced by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. Developed by Netscape, SSL also gained the support of Microsoft and other developers of Internet client / server and thus became the de facto standard to evolve to the Transport Layer Security. The "plug" the term refers to the sockets method of passing data back and forth between a client and a server program in a network or between program layers in the same computer. SSL uses the public-and private RSA encryption key, which also includes the use of a digital certificate.

Secure HTTP (HTTPS)

S-HTTP (Secure HTTP) is an extension of the Hypertext Transfer Protocol (HTTP) that enables secure file sharing on the Wide World Web. Each S-HTTP file is encrypted or contains a digital certificate, or both. In a given document, S-HTTP is an alternative to the other known security protocol, Secure Sockets Layer (SSL). An important difference is that the S-HTTP allows the client sends a certificate to authenticate the user, the use of SSL, only the server can be authenticated. S-HTTP is more likely to be used in situations where the server represents a bank and requires user authentication is more secure than a user ID and password.

Digital Certificate

A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration date, a copy of the public key of the certificate holder (used for encrypting messages and digital signatures), and the digital signature of the certificate authority for a receiver can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in the records so that user authentication can find the public keys of other users.

Strong Password

A strong password is a combination of numbers, uppercase letters, lowercase letters, characters and, if possible, either. This makes it almost impossible to guess password within a reasonable period of time, and makes sure that all the hard work you put into keeping your machine well defended not wasted. The longer the password, the harder it is to guess.

Of course, like passwords approach the random numbers and letters, but also become more difficult to remember. That does not mean you have to resort to a weak password, however. Can m15peLL w0Rdz intentionally, or use a mnemonic device as a passphrase. Be sure to read the Microsoft article below some very useful advice on this subject.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now