Overview
Direct Answer
SSL/TLS is a pair of cryptographic protocols—Secure Sockets Layer (now deprecated) and its successor Transport Layer Security—that establish encrypted communication channels between clients and servers over untrusted networks. TLS remains the industry standard for protecting data in transit, authenticating endpoints, and preventing eavesdropping and tampering.
How It Works
TLS employs a handshake mechanism where client and server negotiate cipher suites, exchange certificates for authentication, and derive shared encryption keys using asymmetric cryptography. Once the handshake completes, application data flows through a symmetric encryption tunnel, with each record authenticated using message authentication codes to detect tampering.
Why It Matters
Organisations require cryptographic protection of sensitive data to meet regulatory compliance (GDPR, HIPAA, PCI-DSS), prevent credential theft, and maintain customer trust. Modern web commerce, banking, and healthcare infrastructure depend on widespread deployment; absence creates significant breach liability and reputational risk.
Common Applications
HTTPS for web browsing, email protocols (SMTPS, IMAPS), VPN tunnels, API communications, and database connections all employ TLS encryption. Financial institutions, healthcare providers, and e-commerce platforms rely on it to secure customer transactions and personal data.
Key Considerations
Certificate management complexity, CPU overhead during handshakes, and version deprecation (SSL 3.0 and earlier remain cryptographically broken) require ongoing operational maintenance. Misconfiguration—weak ciphers, expired certificates, or incorrect hostname validation—remains a common vulnerability vector despite protocol strength.
Cross-References(1)
More in Networking & Communications
Network Monitoring
Protocols & StandardsThe practice of continuously observing a computer network for slow or failing components.
Network Function Virtualisation
Cloud NetworkingReplacing dedicated network hardware with software running on commodity servers.
Throughput
Protocols & StandardsThe actual rate of successful data transfer across a network in a given time period.
mTLS
Protocols & StandardsMutual Transport Layer Security — a protocol where both client and server authenticate each other using certificates.
Network Resilience
Protocols & StandardsThe ability of a network to maintain acceptable service levels despite faults, challenges, and threats.
Mesh Network
Protocols & StandardsA network topology where each node relays data for the network, providing self-healing and redundant paths.
Reverse Proxy
InfrastructureA server that sits in front of web servers and forwards client requests to the appropriate backend server.
Proxy Server
InfrastructureAn intermediary server that forwards requests between clients and other servers, providing security and caching.