You might be wondering about some common terms that you often hear on the internet, all of which will be explained in this article. SSL stands for Secure Sockets Layer, which is often used for transmitting credit card, tax, banking or personal information to any business server in any part of the globe. Some common examples of the practical use of an SSL would be when you want to purchase a laptop fromAmazon.com, when you file your taxes online or use your money from your bank accounts to pay for bills. SSL uses port 443 to connect your computer to a secure server in the internet. SSL can be used to encrypt the secured data transmitted between a browser and a web server or vice versa. Browsers indicate the SSL secured session by changing the HTTP to HTTPS and are usually displayed by a small padlock.
SSH stands for Secure Shell and it commonly uses port 22 to connect your own computer to another computer on the internet. These are used by network administrators to manage their business servers. Some examples would be an email administrator who reboots the company email server from the comforts of his/her own home. Both of SSL and SSH are protected from regular hackers by the use of a sophisticated encryption technology except for some cases. SSL and SSH locks out the connection by scrambling the transmitted data so that it appears meaningless to any eavesdropper who may care to tap in. For those who are transmitting any financial information or internal business documentation, these two are a must to be used.
Here Are More Secure Certificate Terms:
• Certificate of Authority (CA): CA is a trusted 3rd party that issues digital certificates for the purpose of doing online business. The CA assures that the business is a legitimate one so people who transact online can exchange their personal information without the fear that their personal records will be handed over to someone else.
• Certificate Authority Site Seal: This is either a logo or banner that will tell your online visitors that your website has an SSL certificate. These are important for Network Solutions SSL review.
• Chain Certificates: This is the certificate that the CA used to sign a request that was signed by another CA.
• Certification Practice Statement (CPS): CPS is a document published by the CA which outlines the practices and policies used by the organization in issuing, managing and revoking digital certificates.
• Certification Revocation List (CRL): CRL is a digitally signed data file containing details of each digital certificate that has not been revoked. This can be downloaded and installed into the browser that the user will use, ensuring that the browser will not trust a revoked digital certificate.
• Certificate Signing Request (CSR): This is needed when you apply for your SSL certificate. When you apply for an SSL certificate you need to create a CSR on your web server. You need to give the details of your site and organization to the web server so that it can be output into a CSR file.
• Domain SSL Certificate: These are digital SSL certificates where the ownership of the domain is verified. This is considered to be the lowest level of SSL certification.
• Extended Validation Certificate (EV): This is issued according to a specific set of identity verification criteria. The criteria mentioned here are verified by the requesting entity’s identity by the certificate authority (CA) before a certificate will be issued.
• Private SSL: This is a SSL certificate that is issued exclusively for your website.
• Public Key Infrastructure Certificate (PKI): PKI combines a digital signature with a public key to identify someone. It is simply a certificate that allows computer users to show that they do own the public keys they claim to. A digital signature is needed for the PKI certificate before this is issued for any particular person or company. The signature can be made by an authority figure who assigns the certificate and the person whose identity is being confirmed. PKI certificates are used to authenticate cryptographic public keys. This certificate allows other people to verify that they are indeed communicating with the right person who is using the right public key.
• Server Gate Cryptography: This provides for additional bits more than the standard 40 bit encryption required. Having more of this means a longer key is used, which results to the prevention of a 3rd party from breaking through.
• Shared SSL: This is an SSL certificate for you and other people hosted on the same server.
For those who might have been confused before about certain secure certificates, terms or jargons that may be used, by this time they are hopefully enlightened about all of these things. Such knowledge is essential, especially for those involved in online business. While there are still many terms that you need to familiarize yourself with, we have essentially covered most of what you need to know about secure certificates.