Ensures security, privacy, integrity, and authentication of data transmitted between a web browser and a server
HTTPS
Uses encryption to keep communications secure
HTTPS
Ensures the data received is the data sent, and confirms the identity of the server
HTTPS
Eliminates the ability of unmoderated third parties, such as ISPs, to inject unauthorized content (like ads) into webpaged
HTTPS
HTTPS
Hypertext Transfer Protocol Secure
URL prefix of HTTPS
https://
Data transmission of HTTPS
Encrypted in transit in both directions
Security status of HTTPS
Signified by a padlock icon in the URL bar
Port used by HTTPS
Port 443
Technical Relationship of HTTPS
HTTP with TLS encryption
URL prefix of HTTP
http://
Data transmission of http
Communicates in plain text
Security status of http
Flagged by browsers as “not secure”
Port used by http
Port 80
Technical Relationship of http
The base protocol
Encryption protocol used by HTTPS
TLS
TLS
Transport Layer Security
TLS is previous known as?
Secure Sockets Layer (SSL)
This verifies a provider’s identity
Transmission of TLS/SSL certificates
Infrastructure done by HTTPS to secure communication, wherein the security occurs based upon the transmission of TLS/SSL certificates, which verify a provider’s identity
Asymmetric public key infrastructure
These certificates verify that a particular provider is who they claim to be
SSL/TLS certificate
This key is controlled by the website owner and is kept in private
Private key
It lives on the web server and is used to decrypt information that was encrypted by the public key
Private key
This key is available to anyone who wishes to interact with the server securely
Public key