Solved

Security

Posted on 2011-02-10
1
380 Views
Last Modified: 2012-05-11
Explain when using HTTP would be satisfactory and why, and when you should use HTTP  
0
Comment
Question by:melmaxi64
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 10

Accepted Solution

by:
cyberstalker earned 500 total points
ID: 34868670
HTTPS should be used when you are dealing with sensitive information. One of the most obvious things for this is of course, logins. Another is when you are dealing with e.g. credit card information.

HTTPS does involve a small overhead, both for the client and the server. Most computers nowadays have no trouble with it, but if you are developing a site that is to be viewed on embedded devices (like smartphones, tablets, etc...) you might want to consider not using it for the non-sensitive part.

In any other case, using it for everything is quite acceptable.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Imagine a situation that you have installed SSL (http://en.wikipedia.org/wiki/Secure_Sockets_Layer) Certificate on your Cisco ASA (Cisco Adaptive Security Appliance) firewall. Installation of SSL certificate on ASA is an another topic for which you …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question