Solved

Security

Posted on 2011-02-10
1
303 Views
Last Modified: 2012-05-11
Explain by applying asymmetric and symmetric encryption, your browser uses SSL to protect the privacy of the information passing between your browser and a web server
0
Comment
Question by:melmaxi64
1 Comment
 
LVL 8

Accepted Solution

by:
Toxacon earned 500 total points
Comment Utility
SSL uses asymmetric encryption and it means you have two keys: private or secret and public. The keys are mathemetically bound to each other.

This is how it works:

You encrypt the message you send with the recipient's public key. The math does the trick that only the holder of the corresponding private key can decrypt that specific message. It works also vice versa: you offer your public key to the sender and sender encrypts the message with it. Only you have the private key to open it. If you loose the private key then nobody is able to open message any more.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Window CA certificate renewal 5 37
Bitlocker  on a domain 10 67
IRM and Office 2016 5 237
Whats the use of master secret 4 49
Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now