Wednesday, August 28, 2019

STATEGIC BUSINESS Essay Example | Topics and Well Written Essays - 7000 words

STATEGIC BUSINESS - Essay Example nges and the ways and means by which these could be remedied or fixed, so that uninterrupted and hassle-free use of internet could be ensured to the end-users and clients. The Transport Layer Protocol (TLS) could be defined as a protocol used in a communication network like the Internet. The Transport Layer Protocol provides data security for sent data/information. Data security is made possible by encrypting the data from the client and decrypting it at the receiver. It also ensures that the data is sent to the right person. One of the main advantages of TLS is that it can be extended by laying new algorithms with respect to the client-server algorithms. Different versions of TLS have been developed for computer applications including internet browsing, mailing and IP telephony. The new technology of TLS rushed into the IT scene following the introduction of Secure sockets layer (SSL) by Netscape .However, the introduction of TSL posed a great disadvantage as TSL and SSL failed to function together in proper co-ordination. This became a major hassle for those who were working with new and old networking protocols. But, it is surprising that today, mo st of the browsers operate using TSL. As TLS protocol offers powerful security to the data that is being sent, it acts as a kind of assurance to the person to whom you are communicating with. However, this is possible only when both ends are certified with the TLS certificate. In a typical scenario, this is not possible for all the users. X.509 is the most commonly used certificate for TLS communication. Some of the main protocols that TLS supports are HTTP, IMAP, POP3, and SMTP. TLS is an innovative technology used for modern communication purposes. A key advantage of TLS is that it offers extreme data reliability and security. The data is sent and received by the client server using certain procedures that underlie the protocol. This process starts with the client inquiring about the TLS certificate of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.