Secure communications: The use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of communication between two or more parties. It is used to prevent unauthorized access to sensitive information and to protect against man-in-the-middle attacks. Examples include using encryption to protect the contents of an email, using digital signatures to verify the authenticity of a message, and using secure protocols to establish a secure channel between two parties.
Categories: CC D4: Network Security | CCSP D3: Cloud Platform and Infrastructure Security | CISM D3: Information Security Program | CISSP D4: Communication and Network Security | Security+ D1: General Security Concepts | SSCP D6: Network and Communication Security
Related Articles:
- thors-glossary-thorteaches-com
- Glossary: SSL/TLS (Secure Sockets Layer/Transport Layer Security)
- Glossary: Secure Socket Layer (SSL)
- Glossary: Revocation
- Glossary: Public key certificate
- Glossary: Private Key
- Glossary: Personal Area Network (PAN)
- Glossary: Ephemeral Key
- Glossary: Data Origin Authentication
- Glossary: Callback