When we access a web page, what we actually do is a request to a machine to show us its content in the browser, which is downloaded to our computer. But what we want, for example, when we log into a web page such as our electronic banking is that our username and password, the information that we view about our accounts and the operations that we carry out, that is, the information that we exchange with the server is done safely and cannot be intercepted by unwanted people. This is when the HTTPS protocol, also known as the secure hypertext transfer protocol, takes on special relevance. Https full form and its work and concept
It is an internet communication protocol, a set of commands or instructions that the browser executes, when we type a URL, click on a link or fill out a form. The initial protocol from which it starts is the well-known HTTP , in which all the information that our browser exchanges with the server is in normal text. In HTTPS the traffic is encrypted, thus guaranteeing a secure connection.
The objective of the HTTPS protocol is to prevent a malicious person or attacker from obtaining our sensitive information : users, passwords or credit card numbers. If the information that our browser exchanges with the server is not encrypted (web page implemented with HTTP, which is not secure, http://www.pagina.xxx), an attacker who is on the same public or non-secure network as us , it could capture our traffic and access our sensitive data. For this we must always ensure that we use sensitive data through unreliable networks, that the pages have HTTPS implemented (https: //www.page.xxx) so that our information travels encrypted.
It is possible that a person being in the same Wifi network as us, can capture our network traffic, and in the case of transporting sensitive and unencrypted information, can access it. The general recommendation is to always use pages that have HTTPS implemented to make purchases or exchanges of sensitive or confidential information and thus guarantee a first security barrier for our personal data. Https full form and its work and concept
Main Difference - Summary vs Conclusion Summary and conclusion are two terms that are often…
Difference between moth and butterfly fall into two categories: anatomical and behavioral. Most moths are…
An engineer is a person whose job is to design and build engines, machines, roads,…
Internet is the term used to identify the massive interconnection of computer networks around the…
A CD-R is a type of disc that does not contain any data. It is blank…
Computing technologies are constantly evolving, and if we base our predictions on Moore's Law, they…