Security Protocols Overview an RSA Data Security Brief SSL &
Security Protocols Overview An RSA Data Security Brief SSL & TLS Secure Socket Layer & Transport Layer Security Secure Sockets Layer (SSL) is the that do not necessarily need to be Internet security protocol for on the same secure network. point-to-point connections. It pro- Where SSL secures two applica- vides protection against eaves- tions, IPSec secures an entire net- dropping, tampering, and forgery. work. Clients and servers are able to au- thenticate each other and to estab- Applications lish a secure link, or “pipe,” across SSL can be used in any situation the Internet or Intranets to protect where a link between two comput- the information transmitted. ers or applications needs to be pro- tected. The following are just a few The Need for SSL of the real-world, practical appli- With the growth of the Internet cations of SSL & TLS: and digital data transmission, many applications need to se- curely transmit data to remote applications and computers. • Client/Server Systems SSL was designed to solve this problem in an open standard. SSL in the browser is not enough to secure most systems. Systems such as secure database access, or remote object SSL is analogous to a secure “telephone call” between two systems such as CORBA, can all be securely improved computers on any network including the Internet. In SSL, a using SSL. Other applications include redirection of se- connection is made, parties authenticated, and data securely cure connections such as proxy servers, secure Webserver exchanged. The latest enhancement of SSL is called Trans- plug-ins, and Java “Servlets.” port Layer Security (TLS).
[Show full text]