20 INTERNET TERMS U SHOULD KNOW: DNS, HTML, FTP, URL, HTTPS, PORT, BIT & MANY
MORE.
1. URL
Full form of URL is Uniform Resource Locators.
URLs—are the web browser addresses of internet pages and files.
With a URL, you can locate and bookmark specific pages and files in a web
browser.
You can also download the offline page of the internet pages and
share that page with social media.
The format of a URL can be written in these forms:
1.http://www.examplewebsite.com/mypage
2.https://www.examplewebsite.com/mypage
3.www.examplewebsite.com/mypage
4.https://examplewebsite.com/mypage
5.http://examplewebsite.com/mypage
This format is frequently shortened to this:
www.examplewebsite.com/mypage
Sometimes URLs are longer and more complicated, but all follow
acknowledged rules for naming. URLs consist of three parts:
- Protocol: The protocol is the portion before the
symbol //:. Most web pages use the protocol http or
https, but there are other protocols too.
- Host: The host or top-level domain,
which frequently ends in .com, .net, .edu, or .org but can
also end in one of many others that have been officially
recognized.
- Filename: The filename or page
name is the portion between protocol and host name.
2. HTTP
HTTP is the short form for Hypertext
Transfer Protocol, the data communication standard of web pages. When a web
page has this prefix, the links, text, and pictures should work correctly in a
web browser.
It is initially developed by Tim
Berners-Lee at CERN in 1989 and introduced in 1991; 29 years ago.
Different versions of HTTP present today are:
Year |
HTTP Version |
1991 |
0.9 |
1996 |
1.0 |
1997 |
1.1 |
2015 |
2.0 |
2018 |
3.0 |
3. HTTPS
HTTPS is
the short form for Hypertext Transfer Protocol Secure. This indicates that the
web page has added an additional layer of encryption to hide your personal
information and passwords from hackers.
HTTPS creates a secure
channel over an insecure network.
Whenever you log
in to your online bank account or a shopping site there mostly https presents in
website.
When you use a
e-commerce website and enter credit card information into, look for https in the URL
for security.
The protocol is also called
as HTTP over TLS, or HTTP over SSL.
Usage in websites
4. HTML
Hypertext Markup
Language is full form of (HTML).
HTML is the
programming language of web pages. HTML commands
a web browser to display text and graphics in a unique and specific way.
HTML elements are
the building blocks of HTML pages. With HTML elements you can constructs graphs,
add images and other
objects such as interactive forms
into the rendered page.
HTML provides a
means to create structured documents by denoting structural semantics for text such as headings, paragraphs,
lists, links, quotes and
other items.
The first
publicly available description of HTML was a document called "HTML Tags", first mentioned on the Internet by Tim
Berners-Lee in late 1991.
The initial
version of HTML describes 18 elements which make relatively simple design of
HTML.
HTML versions timeline
HTML 2
November 24,
1995
HTML 2.0 was published
as RFC 1866. Supplemental RFCs added capabilities:
·
November 25, 1995: RFC 1867 (form-based file
upload)
·
May 1996: RFC 1942 (tables)
·
August 1996: RFC 1980 (client-side image maps)
·
January 1997: RFC 2070 (internationalization)
HTML
3
January 14, 1997
HTML 3.2 was published
as a W3C Recommendation. It was the first version developed and
standardized exclusively by the W3C, as the IETF had closed its HTML Working
Group on September 12, 1996.
HTML 4
December 18,
1997
HTML 4.0 was published
as a W3C Recommendation. It offers three variations:
·
Strict, in which deprecated elements are forbidden
·
Transitional, in which deprecated elements are allowed
·
Frameset, in which mostly only frame related elements
are allowed.
April 24, 1998
HTML 4.0 was reissued with minor edits without incrementing the version
number.
December 24,
1999
HTML 4.01 was published as a W3C Recommendation. It offers the same three
variations as HTML 4.0 and its last errata were published on May 12,
2001.
HTML 5
October 28, 2014
HTML5 was published as
a W3C Recommendation.
November1,2016
HTML 5.1 was published as a W3C
Recommendation.
December14,2017
HTML 5.2 was published
as a W3C Recommendation.
5.XML
XML is extensible
Markup Language, related to HTML.
XML focuses on
cataloging and databasing the text content of a web page.
XHTML is a
combination of HTML and XML.
For many
office-productivity tools, including Microsoft Office (Office Open XML), OpenOffice.org and LibreOffice (Open Document),
and Apple's iWork XML-based
formats have become the default.
XML has also
provided the base language for communication protocols such as XMPP. Applications for the Microsoft .
NET Framework built configuration
and property lists on XML
files.
The characters
making up an XML document are divided into markup and content.
However, in
a CDATA section,
the delimiters <![CDATA[
and ]]>
are
classified as markup, and the text between
them is classified as content. In addition, whitespace before and after the
outermost element is classified as markup.
XML documents
may begin with an XML declaration that describes some information
about themselves. An example is <?xml version="1.0"
encoding="UTF-8"?>
.
6. IP Address
Every electronic device that
connects to the internet uses an Internet Protocol address for
identification and tracking purpose.
In most cases, IP
addresses are assigned automatically.
An IP address can look something
like this:
202.3.104.55
Or, like this:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
It may be a permanently assigned
IP address, or the IP address may change occasionally, but it is always a
unique identifier.
Wherever you browse or send an
email or instant message, and whenever you download a file, your IP address
serves as the equivalent of an automobile license plate to enforce
accountability and traceability.
7. ISP ( Internet Service providers)
You need an internet service
provider (ISP) to use the internet.
You may access a free ISP at school or at college, or at work, or you may pay for a
private ISP at home.
An ISP is the company or
government organization that provide you the internet services instead of
paying monthly fee.
An ISP offers a
variety of services for a variety of prices: web page access, email, web page
hosting, and so on.
Most ISPs
provide various internet connection speeds for a different monthly fee
i.e. for cheaper plan your internet services may be for few days or internet
speed will be low contrary for premium plans number of days of plan and
internet speed will be high .
You may choose
to pay more for a higher-speed internet connection if you like to stream movies
or select a less expensive package if you use the internet mostly for light
browsing and email.
In 1989, the
first Internet service providers, companies offering the public direct access
to the Internet for a monthly fee, were established in Australia and the
United States.
In Brookline,
Massachusetts, The World became the first commercial ISP in the US. Its first
customer was served in November 1989.
ISP Classified into the following
categories:
·
Hosting ISPs
·
Transit ISPs
·
Virtual ISPs
·
Free ISPs
·
Wireless ISPs
8. File Transfer Protocol
The File Transfer Protocol (FTP) is a standard network
protocol used for the transfer of computer files between a client and server on
a computer network.
FTP is built on a client-server model architecture using separate
control and data connections between the client and the server.
Data transfer modes
Data transfer can be done in any of three modes:
·
Stream mode (MODE S): Data is
sent as a continuous stream, relieving FTP from doing any processing. Rather,
all processing is left up to TCP. No End-of-file indicator is needed,
unless the data is divided into records.
·
Block mode (MODE B): Initially it
designed for transferring record-oriented files (STRU R), although can also be
used to transfer stream-oriented (STRU F) text files. FTP puts each record (or
line) of data into several blocks (block header, byte count, and data field)
and then passes it on to TCP.
·
Compressed mode (MODE C): Extends
MODE B with data compression using run-length encoding.
Most contemporary FTP clients and servers do not implement MODE
B or MODE C.
File structure
File organization is specified using the STRU command. The
following file structures are defined in section 3.1.1 of RFC959:
·
F or
FILE structure (stream-oriented). Files are viewed as an arbitrary sequence of
bytes, characters or words. This is the usual file structure on Unix systems
and other systems such as CP/M, MSDOS and Microsoft Windows. (Section 3.1.1.1)
·
R or
RECORD structure (record-oriented). Files are viewed as divided into records,
which may be fixed or variable length. This file organization is common on
mainframe and midrange systems, such as MVS, VM/CMS, OS/400 and VMS, which
support record-oriented filesystems.
·
P or
PAGE structure (page-oriented). Files are divided into pages, which may either
contain data or metadata; each page may also have a header giving various
attributes. This file structure was specifically designed
for TENEX systems, and is generally not supported on other platforms.
RFC1123 section 4.1.2.3 recommends that this structure not be implemented.
Most contemporary FTP clients and servers only support STRU F.
STRU R is still in use in mainframe and minicomputer file transfer
applications.
9. Router
A router or router-modem
combination is the hardware device that acts as the mediator and
coordinator for network signals arriving at your home or business from
your ISP.
A router can be wired or wireless
or both.
A router
provides a defense against hackers and directs content to the specific
computer, device, streaming device, or printer that should receive it.
A router may
have interfaces for different types of physical layer connections, such as copper cables, fiber optic, or wireless transmission.
Routers may provide
connectivity within enterprises, between enterprises and the Internet, or
between internet service
providers' (ISPs') networks.
The largest
routers (such as the Cisco
CRS-1 or Juniper PTX) interconnect the various ISPs, or
may be used in large enterprise networks.
Smaller routers
usually provide connectivity for typical home and office networks.
Installation
Wired and wireless both networks
have variety in their connection setup or installation process.
On wired networks, connections
are simple than wireless ones.
Your computer just needs to
connect to the modem or router through a cable. Some network settings may be
needed to identify the networks and that’s it. On the other hand, wireless
networks you have to setup connection on connections settings.
Compatibility
Wired connections are suitable
for almost all the devices having Ethernet or Home PNA compatibility.
An actual Ethernet port is
required for establishing a wired network connection.
Ethernet is the most used wired connection
for computers and Some computer doesn’t have that port then additional Ethernet
adapter cards are used.
Wireless networks don’t require
any sort of ports to get connected. Devices that are wireless compatible with
the signals from the router can get connected with it.
But multiple users at a time can
cause the reduce in data transferring speed of wireless connections.
Security
Wired connections are visible to
only those devices that are connected with the computer directly.
But wireless connections are most
of the time visible to every nearby wireless compatibility Device.
As it is being broadcast in the
public areas, wireless networks are riskier than wired networks. Though signal
encryption provides some kind of security to wireless connections, but wired
networks are definitely less vulnerable than wireless.
It is easily clear that wired
connections are more safe than wireless due to easy installation, wider
compatibility and less security threat .
10. Bit
The bit is a basic and smallest unit of information in
computing and digital communications. The name is a portmanteau of binary digit.
The bit is not
defined in the International System of
Units (SI).
The bit represents a logical state with one of two possible
values. These values are most commonly represented as either 0 or 1, but other
representations such as true/false, yes/no, +/−, or on/off are also very common.
A bitwise operation optionally
processes bits one at a time. Data transfer rates are usually measured in
decimal SI multiples of the unit bit per second (bit/s), such as kbit/s.
one bit is
the information entropy of a binary random variable that is 0 or 1 with equal
probability.
11. Email
Full form of Email
is electronic mail. It is the process of sending and receiving of
typewritten messages from sender to receiver required both using mail services..
Email is usually handled by a
webmail service—Gmail or Yahoo Mail, for example—or an installed software
package such as Microsoft Outlook or Apple Mail.
You
can send email to yourself or send mail via different mail services also i.e. from
outlook to gmail.
Web-based email
Many email providers have a web-based email client (e.g. AOL Mail , Gmail , Outlook.com and Yahoo! Mail etc).
This allows users to log into the email account by using any compatible web browser to send and receive their email. Mail is typically not
downloaded to the web client, so can't be read without a current Internet
connection.
12. E-Commerce
E-commerce full
form is electronic commerce—the transactions of buying and selling online.
Every day, billions of dollars
exchange hands through the internet and the World Wide Web.
Some common applications related to electronic commerce are:
·
B2B e-commerce (business-to-business)
·
B2C e-commerce (business-to-consumer)
·
Conversational commerce: e-commerce via chat
·
Digital Wallet
·
Document automation in supply chain and logistics
·
Electronic tickets
·
Enterprise content management
·
Group buying
·
Instant messaging
·
Internet security
·
Online auction
·
Online banking
·
Online office suites
·
Online shopping and order tracking
·
Online transaction processing
·
Pre-tail
·
Print on demand
·
Shopping cart software
·
Social networking
·
Teleconference
·
Usenet newsgroup
·
Virtual assistant
·
Domestic and international payment systems
Aside from
traditional e-commerce, the terms m-Commerce (mobile commerce) and t-Commerce (online trade via smart, digital tv) have also
been used.
M-commerce
M-commerce
(mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as smartphones and tablets.
As
a form of e-commerce, m-commerce enables users to access online shopping
platforms without needing to use a desktop computer.
Examples
of m-commerce include in-app purchasing, mobile banking, virtual
marketplace apps like the Amazon mobile app or a digital wallet such
as Apple Pay, Android Pay, google pay, Mi-pay,Paytm,paypal, UPI payments and
Samsung Pay etc.
Over
time, content delivery over wireless devices has become significantly faster,
more secure and scalable and still increasing day by day.
As
of 2017 the use of m-commerce accounted for 34.5% of
e-commerce sales.
T-Commerce
T-Commerce is
a term describing trade via a (smart) digital TV-set In which recharge of tv via tv, choosing packages and
a marketing channel enabling interactive advertising and addressable advertising.
It is part of Electronic Business and e-Commerce which
themselves are the most prominent parts of u-Commerce.
The promise of T-commerce is to enhance shopping channels as
well as regular TV ads by offering consumers a "One-Click" "Buy
It" possibility.
U-Commerce
Ubiquitous Commerce also known as U-Commerce refers to a variety of goods
and/or services.
Sometimes, it is used to refer to the wireless,
continuous communication and exchange of data and information between and among
retailers, customers, and systems (e.g., applications) regardless of location, devices used, or time
of day.
The origin and development of Ubiquitous Commerce is based on
various information and communication technologies. These technologies were
driving forces for the evolution to business transactions at any time and in
any place and so they will be in the future.
Among them are the following examples:
·
Internet as the fundamental technology and source
·
mobile data services regarding M-Commerce which are
especially Wireless LAN, UMTS, HSDPA and in the
future 4G / WiMAX
·
TV technologies/add-ons like Teletext and increasingly IPTV
·
technologies enhancing the communication of devices (EDI, XML, Web
service).
S-Commerce
(Silent-Commerce )
Silent Commerce is an expression for the execution of business transactions b/w
electronic devices.
It happens
without assistance and in some cases even without awareness of the human owners
of those devices.
13. Encryption
The process of converting information or data into a code, especially to
prevent unauthorized access is called as encryption.
The simple information or data is known as Plaintext and the
encrypted data or information is known as ciphertext. Only authorized parties can decipher or decrypt a ciphertext
back to plaintext and access the original information.
It is possible
to decrypt the message without possessing the key, but, for a well-designed
encryption scheme, computational resources, skills and experience are required.
Modern
encryption techniques ensure security because modern computers are inefficient
at cracking the encryption.
Modern encryption schemes utilize the concepts
of public-key and symmetric-key.
Public-Key
In public-key encryption schemes, the encryption key is published for anyone to
use and encrypt messages.
However, only
the receiving party has access to the decryption key that enables messages to
be read.
Symmetric key
It also known as private key. In symmetric-key schemes, the
encryption and decryption keys are the same.
Communicating parties must have the same key in order to achieve
secure communication.
14. Firewall
Firewall is a term to describe a
barrier against destruction. In the case of computing, a firewall consists of
software or hardware that protects a computer from hackers and viruses.
Firewalls are
categorized as a network-based or a host-based system.
Network-based
firewalls can be positioned anywhere within a LAN or WAN. Host-based firewalls are deployed directly on the host itself to
control network traffic or other computing resources.
They are either
a software appliance running on general-purpose hardware or a hardware appliance running
on special-purpose hardware, or a virtual appliance running on a virtual host controlled by
a hypervisor.
Firewall
appliances may also offer non firewall functionality, such as DHCP (Dynamic host configuration protocol) or VPN (Virtual private network) services.
Packet filter
The first reported type of network firewall is called a packet
filter, which inspect packets transferred between computers.
Three basic actions regarding the packet
consist of a silent discard, discard with Internet Control Message Protocol or TCP reset response to the sender, and forward to
the next hop.
Connection tracking Stateful Firewall
In
computing, a stateful firewall is a network-based firewall that individually tracks sessions of network
connections traversing it.
Stateful
packet inspection, also referred
to as dynamic packet filtering, is a security feature often used in
non-commercial and business networks.
Application/ Layer 7
The key benefit of application layer filtering
is that it can understand certain applications and protocols such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP).
This allows it to identify unwanted
applications or services using a non-standard port or detect if an allowed
protocol is being abused or not validated.
Endpoint specific
Endpoint based application firewalls function by determining
whether a process should accept any given connection.
15. Malware
Malware is any software intentionally designed to cause damage to
a computer, server, client, or computer network. Malware is a broad term that describes any malicious
software designed by hackers.
A wide variety
of malware types exist, including computer viruses, worms, Trojan horses, ransomware , spyware, adware, rogue software, and scareware., and
other software that seeks to do one of four things:
- Vandalize
your computer in some way.
- Steal
your private information.
- Take
remote control of your computer for other ends.
- Manipulate
you into purchasing something.
Grayware
Grayware is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks.
It describes applications that behave in an annoying or
undesirable manner, and yet are less serious or troublesome than malware.
Rootkits
Once malicious software is installed on a
system, it is essential that it stays concealed, to avoid detection. Software
packages known as rootkits allow this concealment, by modifying the
host's operating system so that the malware is hidden from the user.
Rootkits can prevent a harmful process from being
visible in the system's list of processes, or keep its files from being read.
Backdoors
A backdoor is a method of bypassing normal authentication procedures,
usually over a connection to a network such as the Internet.
Once a system has been compromised, one or more backdoors may be
installed in order to allow access in the future, invisibly to the user.
16. Phishing
The fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal personal
information, such as passwords and credit card numbers is called phishing.
Typically
carried out by email spoofing, instant messaging, and text messaging, phishing often
directs users to enter personal
information at a fake website which matches the look and feel of the
legitimate site.
Types
Spear phishing
Phishing attempts directed at specific individuals or companies
is known as spear phishing.
In contrast to bulk phishing, spear phishing attackers often
gather and use personal information about their target to increase their
probability of success.
Whaling
The term whaling refers to spear phishing
attacks directed specifically at senior executives level and other high-profile
targets.
Catphishing and catfishing
Catphishing is a
type of online deception that involves getting to know someone closely in order
to gain access to information or resources about the persons. usually in the
control of the mark, or to otherwise get control over the conduct of the target.
Catfishing is a similar but distinct concept, involves a
person creating a social network profile on different platforms as
a sock puppet or fictional person in order to finagle someone into a
(usually) romantic relationship.
This usually begins online, with the hope or promise of it
progressing to real-life romance. This is never the objective of the
perpetrator; in general, he is seeking access to the mark's money or resources,
or to receive gifts or other consideration from the victim.
Clone phishing
Clone phishing is a type of phishing attack whereby a
legitimate, and previously delivered, email containing an attachment or link
has had its content and recipient address(es) taken and used to create an
almost identical or cloned email.
The attachment or link within the email is replaced with a
malicious version and then sent from an email address spoofed to appear to come
from the original sender.
It may claim to be a resend of the original or
an updated version to the original.
Typically this requires either the sender or
recipient to have been previously hacked for the malicious third party to
obtain the legitimate email.
Vishing (Voice phishing)
Not all phishing attacks require a fake website. Messages that
claimed to be from a bank told users to dial a phone number regarding problems
with their bank accounts.
Once the phone number (owned by the phisher, and provided by
a voice over IP service) was dialed, prompts told users to enter their
account numbers and PIN.
Vishing (voice phishing) sometimes uses fake caller-ID data
to give the appearance that calls come from a trusted organization.
SMS phishing
SMS phishing or smishing uses cell phone text
messages to deliver the bait to induce people to divulge their
personal information.
Smishing attacks typically invite the user to click a link, call
a phone number, or contact an email address provided by the attacker via SMS
message.
The victim is then invited to provide their private data; often,
credentials to other websites or services.
17. DNS (Domain Name System)
DNS full form is Domain
Name System.
DNS is an Internet
service that translates domain names to IP addresses.
Domain Name System (DNS)
The Domain Name System (DNS)
is a hierarchical and decentralized naming system for computers, services, or
other resources connected to the Internet or a private network.
Domain names are
alphabetic and therefore easy to remember, but the Internet is based on numeric
IP addresses, so a DNS server is required for computers to communicate with one
another.
DNS name server
A DNS name server is a server that stores the DNS records for a
domain; a DNS name server responds with answers to queries against its
database.
DNS database
The most common types of records stored in the DNS database are
for Start of Authority (SOA), IP addresses (A and AAAA), SMTP mail
exchangers (MX), name servers (NS), pointers for reverse DNS lookups (PTR),
and domain name aliases (CNAME).
DNS has been expanded over time to store
records for other types of data for either automatic lookups, such as DNSSEC records,
or for human queries such as responsible person (RP) records.
As a general purpose database, the DNS has also
been used in combating unsolicited
email (spam) by storing a real-time blackhole list (RBL).
The DNS database is traditionally stored in a
structured text file, the zone file, but other database systems are common.
Domain name space
The domain name space consists of a tree data structure.
Each node or leaf in the tree has a label and zero or more resource
records (RR), which hold information associated with the domain
name.
DNS zone
A DNS zone may consist of only one domain, or may
consist of many domains and sub-domains, depending on the administrative
choices of the zone manager.
DNS resolvers
The client side of the DNS is called a DNS resolver.
A resolver is responsible for initiating and sequencing the
queries that ultimately lead to a full resolution (translation) of the resource
sought, e.g., translation of a domain name into an IP address.
DNS resolvers are classified by a variety of query methods, such
as recursive, non-recursive, and iterative.
DNS Message Format
The DNS protocol uses two types of DNS messages, queries and
replies; both have the same format.
Each message consists of a header and four sections: question,
answer, authority, and an additional space. A header field (flags) controls the
content of these four sections.
The header section consists of the following fields: Identification, Flags, Number
of questions, Number of answers, Number of authority resource
records (RRs), and Number of additional RRs. Each field is 16 bits
long,
18. WWW (world Wide Web)
The World
Wide Web (WWW), commonly known as the Web, is an information system where
documents and other web resources are identified by Uniform Resource Locators (URLs,
such as https://example.com/), which may be interlinked
by hypertext, and are accessible over the Internet.
Origin
English
scientist Tim Berners-Lee invented the World Wide Web in 1989. He wrote the first
web browser in 1990 while employed at CERN near Geneva, Switzerland.
Static page
A static web page (sometimes called a flat
page/stationary page) is a web page that is delivered to the user exactly
as stored.
Dynamic web page
A server-side dynamic web page is
a web page whose construction is controlled by an application server processing
server-side scripts.
19. PORT
In computer networking, a port is a communication endpoint.
At the software level, within an operating system, a port is a
logical construct that identifies a specific process or a type of network
service.
Port Numbers
Ports are identified for each transport protocol and address
combination by 16-bit unsigned numbers, known as the port number.
A port number is a 16-bit unsigned integer, thus ranging from
0 to 65535. For TCP, port number 0 is reserved and cannot be used, while
for UDP, the source port is optional and a value of zero means no
port.
A port number is always associated with an IP address of a host
and the type of transport protocol used for communication.
The lowest-numbered 1024 port numbers identify the
historically most commonly used services and are called the well-known port numbers. Higher-numbered ports are available for general use by
applications and are known as ephemeral ports.
The port numbers are divided into three ranges:
the well-known ports, the registered ports, and
the dynamic or private ports.
The well-known ports (also known as system ports)
are those from 0 through 1023.
Port Scanning
The practice of attempting to connect to a range of ports in
sequence on a single computer is commonly known as port scanning.
Port Use in URL
Port numbers are sometimes seen in web or other uniform resource locators (URLs).
By default, HTTP uses port 80 and HTTPS uses port 443, but a
URL like http://www.example.com:8080/path/ specifies that the web browser connects instead to
port 8080 of the HTTP server.
20. SSL Certificate
SSL stands for Secure
Socket Layer.
SSL certificates
validate your website's identity, and encrypt the information visitors send to,
or receive from, your site. This keeps thieves away from spying on exchanges
between you and your shoppers.
TLS/SSL client certificate
Client certificates are less common than server certificates,
and are used to authenticate the client connecting to a TLS service, for
instance to provide access control.
Client certificates are supported by many web browsers, but most
services use passwords and cookies to authenticate users, instead of client
certificates.
Client certificates are more common in RPC (Remote
Procedure Call) systems, where they are used to authenticate devices to
ensure that only authorized devices can make certain RPC calls.
TLS/SSL server certificate
Server certificates
typically are issued to hostnames, which could be a machine name (such as
‘XYZ-SERVER-01’) or domain name (such as ‘www.digicert.com’).
A web browser
reaching the server, and validates that an SSL server certificate is authentic.
That tells the user that their interaction with the web site has no
eavesdroppers and that the web site is exactly who it claims to be.
SSL certificates can be classified into three types:
·
Domain Validation SSL
·
Organization Validation SSL
·
Extended Validation SSL.
Domain Validation (DV) SSL certificate
A Domain Validation (DV) SSL
certificate is the most basic of the three types of SSL certificates. While
Organization Validated (OV) and Extended Validated (EV) require multiple
validation steps, DV SSL certificates require a single validation step.
DV SSL certificates are very
beneficial for those who want to quickly get a certificate on their site to
build trust and ensure their visitors are protected.
It is used for personal website.
Organization Validation SSL certificate
The main
purpose of OV SSL certificate is to encrypt website/business and user’s
sensitive information which is being used for transactions.
It comes
up with 2048-bit signature and powerful 256-bit encryption.
Extended Validation SSL Certificate
An
Extended Validation SSL Certificate (also known as EV SSL for short) is the
highest form of SSL Certificate on the market. It is used for E-commerce
website.
All
levels of SSL – provide encryption and data integrity, they vary in terms of
how much identity verification layers is involved.
Comments
Post a Comment
Please subscribe to our blog by giving your name and email id to get notifications for upcoming blogs.You can also give topics on which i will write. Please keep comments respectful and peaceful.