gptkbp:instance_of
|
gptkb:crypt
|
gptkbp:can_be_configured_for
|
web servers
network devices
email servers
|
gptkbp:can_be_used_with
|
gptkb:POP3
gptkb:HTTP/2
gptkb:IMAP
gptkb:SMTP
|
gptkbp:developed_by
|
gptkb:Internet_Engineering_Task_Force
|
gptkbp:first_released
|
gptkb:1999
|
https://www.w3.org/2000/01/rdf-schema#label
|
TLS (Transport Layer Security)
|
gptkbp:is_adopted_by
|
gptkb:educational_institutions
gptkb:financial_institutions
government agencies
major tech companies
|
gptkbp:is_based_on
|
hash functions
asymmetric cryptography
symmetric cryptography
|
gptkbp:is_implemented_in
|
software libraries
hardware devices
|
gptkbp:is_monitored_by
|
intrusion detection systems
network monitoring systems
security tools
|
gptkbp:is_often_used_in
|
VPNs
email clients
web browsers
Vo IP applications
|
gptkbp:is_part_of
|
application security
data security
network security
Internet security
|
gptkbp:is_supported_by
|
most modern web browsers
most modern web servers
|
gptkbp:is_tested_for
|
security audits
penetration testing
vulnerability scanning
|
gptkbp:is_vulnerable_to
|
gptkb:BEAST_attack
gptkb:POODLE_attack
gptkb:Heartbleed_bug
man-in-the-middle attacks
downgrade attacks
|
gptkbp:latest_version
|
gptkb:TLS_1.3
|
gptkbp:operates
|
gptkb:Transport_Layer
|
gptkbp:provides
|
data integrity
encryption
authentication
|
gptkbp:requires
|
gptkb:PCI_DSS
gptkb:HIPAA
gptkb:GDPR
|
gptkbp:successor
|
gptkb:SSL_(Secure_Sockets_Layer)
|
gptkbp:supports
|
multiple cipher suites
|
gptkbp:used_for
|
securing communications over a computer network
|
gptkbp:uses
|
gptkb:X.509_certificates
|
gptkbp:bfsParent
|
gptkb:ngx_http_v2_module
gptkb:Network_Level_Authentication_(NLA)
gptkb:Diffie-Hellman
|
gptkbp:bfsLayer
|
5
|