Transport Layer Security (TLS)
GPTKB entity
Statements (228)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
gptkb:API |
gptkbp:can_be_configured_for |
secure data transmission
secure connections secure email communication secure web browsing cipher suites protocol versions secure Vo IP calls |
gptkbp:can_be_used_with |
gptkb:POP3
gptkb:HTTP/2 gptkb:IMAP gptkb:SMTP |
gptkbp:defines |
gptkb:album
record protocol alert protocol |
gptkbp:developed_by |
gptkb:Netscape_Communications_Corporation
gptkb:Internet_Engineering_Task_Force gptkb:Internet_Engineering_Task_Force_(IETF) |
gptkbp:enables |
encryption
authentication secure communication over a computer network |
gptkbp:first_released |
gptkb:1994
gptkb:1999 |
gptkbp:has_replaced |
gptkb:SSL
|
https://www.w3.org/2000/01/rdf-schema#label |
Transport Layer Security (TLS)
|
gptkbp:includes |
SSLServer Socket class
SSLSocket class |
gptkbp:introduced_in |
gptkb:Java_2_Platform
|
gptkbp:is_adopted_by |
gptkb:financial_institutions
government agencies e-commerce platforms healthcare organizations major tech companies |
gptkbp:is_based_on |
hash functions
socket programming public key infrastructure (PKI) public key infrastructure asymmetric cryptography symmetric cryptography |
gptkbp:is_compatible_with |
gptkb:crypt
Java Networking API |
gptkbp:is_criticized_for |
complexity
vulnerabilities performance overhead |
gptkbp:is_defined_by |
gptkb:RFC_8446
gptkb:RFC_5246 |
gptkbp:is_designed_for |
secure data transmission
|
gptkbp:is_essential_for |
data confidentiality
data integrity verification privacy protection secure online transactions |
gptkbp:is_implemented_in |
gptkb:servers
gptkb:Gnu_TLS gptkb:Java_Secure_Socket_Extension_(JSSE) gptkb:Io_T_devices gptkb:Java_programming_language gptkb:Open_SSL gptkb:mobile_applications gptkb:Microsoft_._NET_Framework email clients web applications web browsers web servers application servers network devices certificate validation TLS handshake session resumption email servers instant messaging applications |
gptkbp:is_maintained_by |
gptkb:Oracle_Corporation
|
gptkbp:is_often_used_in |
gptkb:email_client
gptkb:Vo_IP gptkb:cloud_services gptkb:X.509_certificates banking social media VPNs e-commerce email clients instant messaging web browsers online banking Vo IP applications |
gptkbp:is_part_of |
gptkb:Java_SE_Security_framework
gptkb:Java_2_Platform gptkb:Java_Secure_Socket_Layer_(SSL)_implementation gptkb:Java_Transport_Layer_Security_(TLS)_implementation data protection data security network security Internet security internet security secure data exchange secure web architecture secure application design secure network design |
gptkbp:is_protected_by |
eavesdropping
tampering message forgery |
gptkbp:is_related_to |
gptkb:Transport_Layer_Security_(TLS)_handshake
confidentiality data integrity authentication data protection network security secure communication encryption protocols public key infrastructure (PKI) encryption algorithms certificate authorities session resumption cipher suites Secure Hypertext Transfer Protocol (HTTPS) TLS extensions |
gptkbp:is_standardized_by |
gptkb:IETF_RFC_8446
|
gptkbp:is_supported_by |
most operating systems
most web browsers most modern operating systems most web servers most modern web browsers most email clients most modern applications most modern web servers |
gptkbp:is_tested_for |
gptkb:SSL_Labs
gptkb:Qualys_SSL_Test |
gptkbp:is_used_by |
security professionals
web developers system administrators |
gptkbp:is_used_for |
secure web browsing
secure file transfer secure email transmission |
gptkbp:is_used_in |
gptkb:HTTPS
gptkb:cloud_services gptkb:mobile_applications gptkb:FTPS enterprise applications client-server applications collaboration tools gaming applications real-time applications web servers streaming applications content delivery networks file sharing applications financial applications healthcare applications chat applications network applications social media applications data center applications e-commerce applications government applications SMTP over SSL IMAPS remote access applications Io T applications VPN applications POP3 S |
gptkbp:is_vulnerable_to |
gptkb:BEAST_attack
gptkb:POODLE_attack gptkb:Heartbleed_bug man-in-the-middle attacks protocol downgrade attacks downgrade attacks |
gptkbp:latest_version |
gptkb:SSL_2.0
gptkb:SSL_3.0 gptkb:SSL_1.0 gptkb:TLS_1.3 |
gptkbp:operates |
gptkb:Transport_layer
gptkb:Transport_Layer |
gptkbp:protocol |
gptkb:TCP
|
gptkbp:provides |
data integrity
encryption authentication data confidentiality secure communication secure sockets |
gptkbp:replaced_by |
gptkb:TLS_1.3
gptkb:true TLS TLS 1.0 TLS 1.2 |
gptkbp:replaces |
gptkb:SSL_3.0
|
gptkbp:requires |
gptkb:PCI_DSS
gptkb:HIPAA gptkb:GDPR valid certificates secure key exchange secure cipher suites |
gptkbp:security |
gptkb:Vo_IP
VPNs data transfer instant messaging web applications web browsers online transactions |
gptkbp:successor |
gptkb:Secure_Sockets_Layer_(SSL)
gptkb:Transport_Layer_Security_(TLS) |
gptkbp:supports |
asymmetric encryption
symmetric encryption hash functions client authentication server authentication SSL/ TLS protocols perfect forward secrecy |
gptkbp:used_for |
securing communications over a computer network
|
gptkbp:used_in |
gptkb:HTTPS
gptkb:Vo_IP email protocols |
gptkbp:uses |
gptkb:X.509_certificates
encryption asymmetric encryption symmetric encryption hash functions |
gptkbp:uses_certificates |
gptkb:X.509_certificates
|
gptkbp:utilizes |
cipher suites
|
gptkbp:bfsParent |
gptkb:crypt
gptkb:Web_Objects_5.0 gptkb:Certification gptkb:Java_2_Platform gptkb:protocol gptkb:security_services gptkb:HTTPS gptkb:security |
gptkbp:bfsLayer |
4
|