PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Transit Safety

This article is part of the Information Security magazine issue of April 2006
SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway. It's no accident the Internet has been called the Information Superhighway. Huge volumes of traffic flow freely and, unless protected, in the open. E-commerce demands an increasing exchange of highly sensitive information, from credit card numbers to financial data, safely across the public network. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) secure Internet traffic in an encrypted tunnel, ensuring that it is seen only when it arrives at its destination, using digital certificates to guarantee that a Web site is what it purports to be. Most Internet users have performed some type of online transaction involving SSL or TLS. The familiar closed padlock icon that appears in the Web browser window indicates that SSL or TLS is being used to secure the connection. In this article, we'll explain the differences between SSL and TLS and how they work, and offer some important points to keep in mind when implementing them in your ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Secure Reads: The Database Hacker's Handbook
Read a review of The Database Hacker's Handbook.
-
Security Device Testing
Karalon's Traffic IQ Pro 1.0
-
Get a Grip!
MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.
-
Transit Safety
BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.
-
Security Survivor All-Stars
COVER STORY Five security survivors tell you how to outwit, outplay and outlast the bad guys.
-
Hot Pick: F5 Network's FirePass 4100 Controller
F5 Network's FirePass 4100 Controller
-
Access Security
KoolSpan's SecurEdge
Columns in this issue
-
Ping: Jane Scott Norris
Jane Scott Norris
-
Face-Off: Schneier, Ranum debate security awareness training
Is User Education Working?
-
Perspectives: Putting out a call for self-defending clients
Network perimeter defenses have crumbled. What we need now are self-defending clients.