Statements (37)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Network_Security_Technique
|
| gptkbp:alsoKnownAs |
SSL Inspection
HTTPS Interception |
| gptkbp:auditedBy |
Compliance Officers
Security Auditors |
| gptkbp:block |
gptkb:HSTS
gptkb:Certificate_Pinning Client-Side Validation |
| gptkbp:brokenBy |
Forward Secrecy
|
| gptkbp:canBeBypassedBy |
End-to-End Encryption
|
| gptkbp:cause |
Performance Overhead
Operational Complexity |
| gptkbp:controversy |
Security Risks
Privacy Concerns Legal Compliance |
| gptkbp:exposedBy |
Sensitive Data
User Privacy |
| gptkbp:implementedIn |
Cloud Security Services
Enterprise Security Appliances |
| gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
| gptkbp:requires |
gptkb:certification
Man-in-the-Middle Technique Trusted Root Certificate |
| gptkbp:supportsProtocol |
gptkb:SSL
TLS |
| gptkbp:usedBy |
Firewalls
Intrusion Detection Systems Proxies |
| gptkbp:usedFor |
Data Loss Prevention
Threat Detection Monitoring Encrypted Traffic |
| gptkbp:bfsParent |
gptkb:PA-3220
gptkb:PA-5220 |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
SSL Decryption
|