SSL and TLS protocols Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

How can a user know if a website is secure by looking at the web address?

A

They should see https in the web address

Locked padlock icon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the process of SSL and how it provides a secure connection when selling art (art gallery website)

A
  • SSL is a security protocol
  • It encrypts data that is sent
  • It sends digital certificates to the user’s web browser
  • They contain the art gallery’s public key
  • This can be used to authenticate the art gallery
  • The transaction begins once the certificate is authenticated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe what is meant by Transport Layer Security(TLS)

A
  • It is a security protocol
  • It encrypts data sent over the web or network
  • It is the updated version of SSL
  • It has two layers: a handshake layer and a record layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some applications of TLS?

A

Cloud based storage, email, instant messaging, online banking, online shopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some applications of SSL?

A

Online shopping, email, instant messaging, VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is an SSL connection established?

A
  1. User’s web browser sends a message so it can connect with the required website secured by SSL.
  2. The web browser sends sends a request to the web server. It requests it to identify itself.
  3. The web server sends its digital certificate to the web browser.
  4. The web browser authenticates the certificate.
  5. If it is authentic, a connection is established. Any data sent it encrypted using public and private keys.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does SSL keep (the company’s) data safe?

A

It uses encryption. Encryption can be asymetric, symmetric or both. Public and private keys are used. Data is meaningless without a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly