Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

HTTPS

Index HTTPS

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. [1]

97 relations: AAA (computer security), Address bar, Application layer, Authentication, Black hat, Block cipher mode of operation, Bullrun (decryption program), Certificate authority, Chosen-ciphertext attack, Cipher, Cipher suite, Ciphertext, Client certificate, Communication protocol, Communications security, Comodo Group, Computer security, Curl-loader, Data integrity, Dialog box, Diffie–Hellman key exchange, DigiCert, Eavesdropping, Electronic Frontier Foundation, Elliptic-curve Diffie–Hellman, Encryption, Extended Validation Certificate, Firefox, Forward secrecy, Global surveillance disclosures (2013–present), GlobalSign, GoDaddy, Google Chrome, HTTP cookie, HTTP Strict Transport Security, HTTP/2, HTTPS Everywhere, HTTPsec, Hypertext Transfer Protocol, If and only if, Implementation, Indiana University Bloomington, Information privacy, Institute of Electrical and Electronics Engineers, Internet, Internet Engineering Task Force, Internet Explorer, Internet Explorer 7, Internet protocol suite, Let's Encrypt, ..., List of TCP and UDP port numbers, Malware, Man-in-the-middle attack, Mass surveillance, Metadata, Microsoft, Microsoft Developer Network, Microsoft Research, Moxie Marlinspike, Mozilla Foundation, National Security Agency, Netscape, Netscape Navigator, Network operating system, Online Certificate Status Protocol, Opera (web browser), Opportunistic encryption, Packet analyzer, Packet injection, Plaintext, Public key certificate, Public-key cryptography, Root certificate, Safari, Secure cookie, Secure Hypertext Transfer Protocol, Server Name Indication, Session key, Side-channel attack, Softpedia, SPDY, Stunnel, Tor (anonymity network), Traffic analysis, Transport Layer Security, Uniform Resource Identifier, URL, Web browser, Web crawler, Web of trust, Web server, Website, Wi-Fi, Windows Vista, Wireless LAN, World Wide Web, X.509. Expand index (47 more) »

AAA (computer security)

AAA refers to Authentication, Authorization and Accounting.

New!!: HTTPS and AAA (computer security) · See more »

Address bar

In a web browser, the address bar (also location bar or URL bar) is a graphical control element that shows the current URL.

New!!: HTTPS and Address bar · See more »

Application layer

An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.

New!!: HTTPS and Application layer · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: HTTPS and Authentication · See more »

Black hat

A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".

New!!: HTTPS and Black hat · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: HTTPS and Block cipher mode of operation · See more »

Bullrun (decryption program)

Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA).

New!!: HTTPS and Bullrun (decryption program) · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: HTTPS and Certificate authority · See more »

Chosen-ciphertext attack

A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the decryptions of chosen ciphertexts.

New!!: HTTPS and Chosen-ciphertext attack · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: HTTPS and Cipher · See more »

Cipher suite

A cipher suite is a set of algorithms that help secure a network connection that uses Transport Layer Security (TLS) or Secure Socket Layer (SSL).

New!!: HTTPS and Cipher suite · See more »

Ciphertext

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.

New!!: HTTPS and Ciphertext · See more »

Client certificate

In cryptography, a client certificate is a type of digital certificate that is used by client systems to make authenticated requests to a remote server.

New!!: HTTPS and Client certificate · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: HTTPS and Communication protocol · See more »

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

New!!: HTTPS and Communications security · See more »

Comodo Group

Comodo is a cyber security company headquartered in Clifton, New Jersey in the United States.

New!!: HTTPS and Comodo Group · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: HTTPS and Computer security · See more »

Curl-loader

curl-loader is an open-source software performance testing tool written in the C programming language.

New!!: HTTPS and Curl-loader · See more »

Data integrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

New!!: HTTPS and Data integrity · See more »

Dialog box

The graphical control element dialog box (also called dialogue box (British English) or just dialog) is a small window that communicates information to the user and prompts them for a response.

New!!: HTTPS and Dialog box · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: HTTPS and Diffie–Hellman key exchange · See more »

DigiCert

DigiCert Inc is a privately held, US-based X.509 SSL certificate authority (CA).

New!!: HTTPS and DigiCert · See more »

Eavesdropping

Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent.

New!!: HTTPS and Eavesdropping · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: HTTPS and Electronic Frontier Foundation · See more »

Elliptic-curve Diffie–Hellman

Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel.

New!!: HTTPS and Elliptic-curve Diffie–Hellman · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: HTTPS and Encryption · See more »

Extended Validation Certificate

An Extended Validation Certificate (EV) is a certificate used for HTTPS websites and software that proves the legal entity controlling the website or software package.

New!!: HTTPS and Extended Validation Certificate · See more »

Firefox

Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by Mozilla Foundation and its subsidiary, Mozilla Corporation.

New!!: HTTPS and Firefox · See more »

Forward secrecy

In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances your session keys will not be compromised even if the private key of the server is compromised.

New!!: HTTPS and Forward secrecy · See more »

Global surveillance disclosures (2013–present)

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.

New!!: HTTPS and Global surveillance disclosures (2013–present) · See more »

GlobalSign

GlobalSign is a WebTrust-certified certificate authority (CAs) and provider of Identity Services.

New!!: HTTPS and GlobalSign · See more »

GoDaddy

GoDaddy Inc. is an American publicly traded Internet domain registrar and web hosting company.

New!!: HTTPS and GoDaddy · See more »

Google Chrome

Google Chrome is a freeware web browser developed by Google LLC.

New!!: HTTPS and Google Chrome · See more »

HTTP cookie

An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.

New!!: HTTPS and HTTP cookie · See more »

HTTP Strict Transport Security

HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps to protect websites against protocol downgrade attacks and cookie hijacking.

New!!: HTTPS and HTTP Strict Transport Security · See more »

HTTP/2

HTTP/2 (originally named HTTP/2.0) is a major revision of the HTTP network protocol used by the World Wide Web.

New!!: HTTPS and HTTP/2 · See more »

HTTPS Everywhere

HTTPS Everywhere is a free and open-source browser extension for Google Chrome, Mozilla Firefox, Opera, and Firefox for Android, which is developed collaboratively by The Tor Project and the Electronic Frontier Foundation (EFF).

New!!: HTTPS and HTTPS Everywhere · See more »

HTTPsec

HTTPsec ("HTTP security") is an authentication scheme for the web protocol HTTP.

New!!: HTTPS and HTTPsec · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: HTTPS and Hypertext Transfer Protocol · See more »

If and only if

In logic and related fields such as mathematics and philosophy, if and only if (shortened iff) is a biconditional logical connective between statements.

New!!: HTTPS and If and only if · See more »

Implementation

Implementation is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy.

New!!: HTTPS and Implementation · See more »

Indiana University Bloomington

Indiana University Bloomington (abbreviated "IU Bloomington" and colloquially referred to as "IU" or simply "Indiana") is a public research university in Bloomington, Indiana, United States.

New!!: HTTPS and Indiana University Bloomington · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: HTTPS and Information privacy · See more »

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.

New!!: HTTPS and Institute of Electrical and Electronics Engineers · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: HTTPS and Internet · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: HTTPS and Internet Engineering Task Force · See more »

Internet Explorer

Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.

New!!: HTTPS and Internet Explorer · See more »

Internet Explorer 7

Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows.

New!!: HTTPS and Internet Explorer 7 · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: HTTPS and Internet protocol suite · See more »

Let's Encrypt

Let's Encrypt is a certificate authority that provides free X.509 certificates for Transport Layer Security (TLS) encryption via an automated process designed to eliminate the hitherto complex process of manual creation, validation, signing, installation, and renewal of certificates for secure websites.

New!!: HTTPS and Let's Encrypt · See more »

List of TCP and UDP port numbers

This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.

New!!: HTTPS and List of TCP and UDP port numbers · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: HTTPS and Malware · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: HTTPS and Man-in-the-middle attack · See more »

Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens.

New!!: HTTPS and Mass surveillance · See more »

Metadata

Metadata is "data that provides information about other data".

New!!: HTTPS and Metadata · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: HTTPS and Microsoft · See more »

Microsoft Developer Network

Microsoft Developer Network (MSDN) is the portion of Microsoft responsible for managing the firm's relationship with developers and testers, such as hardware developers interested in the operating system (OS), and software developers developing on the various OS platforms or using the API or scripting languages of Microsoft's applications.

New!!: HTTPS and Microsoft Developer Network · See more »

Microsoft Research

Microsoft Research is the research subsidiary of Microsoft.

New!!: HTTPS and Microsoft Research · See more »

Moxie Marlinspike

Matthew Rosenfield, known as Moxie Marlinspike, is an American computer security researcher, whose research focuses primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception.

New!!: HTTPS and Moxie Marlinspike · See more »

Mozilla Foundation

The Mozilla Foundation (stylized as moz://a) is a non-profit organization that exists to support and collectively lead the open source Mozilla project.

New!!: HTTPS and Mozilla Foundation · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: HTTPS and National Security Agency · See more »

Netscape

Netscape is a brand name associated with the development of the Netscape web browser.

New!!: HTTPS and Netscape · See more »

Netscape Navigator

Netscape Navigator was a proprietary web browser, and the original browser of the Netscape line, from versions 1 to 4.08, and 9.x. It was the flagship product of the Netscape Communications Corp and was the dominant web browser in terms of usage share in the 1990s, but by 2002 its use had almost disappeared.

New!!: HTTPS and Netscape Navigator · See more »

Network operating system

The term network operating system is used to refer to two rather different concepts.

New!!: HTTPS and Network operating system · See more »

Online Certificate Status Protocol

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.

New!!: HTTPS and Online Certificate Status Protocol · See more »

Opera (web browser)

Opera is a web browser for Windows, macOS, and Linux operating systems developed by Opera Software AS.

New!!: HTTPS and Opera (web browser) · See more »

Opportunistic encryption

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.

New!!: HTTPS and Opportunistic encryption · See more »

Packet analyzer

A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.

New!!: HTTPS and Packet analyzer · See more »

Packet injection

Packet injection (also known as forging packets or spoofing packets) is a computer networking term that refers to the process of interfering with an established network connection, by means of constructing packets to appear as if they are part of the normal communication stream.

New!!: HTTPS and Packet injection · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: HTTPS and Plaintext · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: HTTPS and Public key certificate · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: HTTPS and Public-key cryptography · See more »

Root certificate

In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA).

New!!: HTTPS and Root certificate · See more »

Safari

A safari is an overland journey, usually a trip by tourists to Africa.

New!!: HTTPS and Safari · See more »

Secure cookie

Secure cookies are a type of cookie that are transmitted over encrypted HTTP connections.

New!!: HTTPS and Secure cookie · See more »

Secure Hypertext Transfer Protocol

Secure Hypertext Transfer Protocol (S-HTTP) is an obsolete alternative to the HTTPS protocol for encrypting web communications carried over HTTP.

New!!: HTTPS and Secure Hypertext Transfer Protocol · See more »

Server Name Indication

Server Name Indication (SNI) is an extension to the TLS computer networking protocol by which a client indicates which hostname it is attempting to connect to at the start of the handshaking process.

New!!: HTTPS and Server Name Indication · See more »

Session key

A session key is a single-use symmetric key used for encrypting all messages in one communication session.

New!!: HTTPS and Session key · See more »

Side-channel attack

In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).

New!!: HTTPS and Side-channel attack · See more »

Softpedia

Softpedia is a website from Romania that indexes information and provides primarily software information and downloads.

New!!: HTTPS and Softpedia · See more »

SPDY

SPDY (pronounced "speedy") is a deprecated open-specification networking protocol that was developed primarily at Google for transporting web content.

New!!: HTTPS and SPDY · See more »

Stunnel

stunnel is an open-source multi-platform application used to provide a universal TLS/SSL tunneling service.

New!!: HTTPS and Stunnel · See more »

Tor (anonymity network)

Tor is free software for enabling anonymous communication.

New!!: HTTPS and Tor (anonymity network) · See more »

Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.

New!!: HTTPS and Traffic analysis · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: HTTPS and Transport Layer Security · See more »

Uniform Resource Identifier

A Uniform Resource Identifier (URI) is a string of characters designed for unambiguous identification of resources and extensibility via the URI scheme.

New!!: HTTPS and Uniform Resource Identifier · See more »

URL

A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

New!!: HTTPS and URL · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: HTTPS and Web browser · See more »

Web crawler

A Web crawler, sometimes called a spider, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).

New!!: HTTPS and Web crawler · See more »

Web of trust

In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner.

New!!: HTTPS and Web of trust · See more »

Web server

Web server refers to server software, or hardware dedicated to running said software, that can serve contents to the World Wide Web.

New!!: HTTPS and Web server · See more »

Website

A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server.

New!!: HTTPS and Website · See more »

Wi-Fi

Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.

New!!: HTTPS and Wi-Fi · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: HTTPS and Windows Vista · See more »

Wireless LAN

A wireless local area network (WLAN) is a wireless computer network that links two or more devices using wireless communication within a limited area such as a home, school, computer laboratory, or office building.

New!!: HTTPS and Wireless LAN · See more »

World Wide Web

The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet.

New!!: HTTPS and World Wide Web · See more »

X.509

In cryptography, X.509 is a standard that defines the format of public key certificates.

New!!: HTTPS and X.509 · See more »

Redirects here:

HTTP SSL, HTTP Secure, HTTP TLS, HTTP over SSL, HTTP over TLS, HTTPS Secure, HTTPS URI, HTTPS URL, HTTPS connection, HTTPS encryption, HTTPS web, HTTPS website, HTTPS:/, HTTPS://, HTTPs, HTTTPS, Htpps, Htps:, Htps://, Http secure, Https, Https scheme, Https., Https:, Https: URI scheme, Https://, Https;, HyperText Transfer Protocol with Privacy, Hypertext Transfer Protocol (Secure), Hypertext Transfer Protocol Secure, Hypertext Transfer Protocol over Secure Socket Layer, Hypertext transfer protocol secure, Port 443, Secure Server, Secure Servers, Secure server, Secure website.

References

[1] https://en.wikipedia.org/wiki/HTTPS

OutgoingIncoming
Hey! We are on Facebook now! »