Security

Information needs to be kept secure in our computing system.

Web protocols such as SSL and TLS can be used to ensure the security.

The handshake step.

The handshake step.

Authentication

The use of authentication is to establish a person's identity.

Authentication methods include: