Surely more than one occasion we have heard of “HTTPS” but we’re not really sure what acronym means, and the truth is that neither we care too. This attitude can cause us a lot of serious problems related to the security of our data when we surf on the Internet, although we connect to the Internet through safe and reputable sites. In this article we will know what it means HTTPS and why that term is so important.
First of all, we must know that HTTPS is the safest way to surf the Internet, since any data that we introduce in the browser will travel encrypted and therefore cannot be analyzed for use in both commercial and criminal purposes.
Main differences between HTTP and HTTPS
The Hypertext Transfer Protocol (HTTP) is a system used in network systems, designed with the purpose to define and standardize the syntax and semantics of the transactions carried out between the various teams that make up a network.
The main feature of this protocol is that it is a forward-type operation “request-response” system, which means that the structure must be a client and a server, with the client who make the requests and the server giving the answers. The server responses can be both downloading a file or opening a web page, depending on the type of request made.
Basically, once we access with a browser to a web address and press the “Enter” key, the server responds by returning us the desired data.
In the case of Hypertext Transfer Protocol Secure (HTTPS), the system is based on a combination of two different protocols, HTTPS and SSL / TLS.
This is the safest and most reliable way to access content that offers the web, since any data or information that we introduce will be encrypted, which guarantees that data cannot be seen by anyone except for the client and the server, nullifying thus the possibility that it may be used by the cybercriminal, because all you have in your hands the offender will be encrypted data, which cannot decipher.
How we can see, the use of the HTTPS protocol is of vital importance to any activity involving the use of personal data as those used in banks, online stores, e-mails and elsewhere in which we should enter passwords, numbers credit card or other personal information.
For the system to work, you must implement the scheme “Certificate”, having to be duly signed by an authority. In the case of web browsers, this method is transparent to the user because the necessary certificates to be able to browse the Internet without problems are obtained with the browser.
In the table below, we can see the main differences between HTTP and HTTPS protocols:
|URL starts with “http: //”||URL starts with “https: //”|
|Port 80 is used for communication||Port 443 is used for communication|
|It works at the application level||It works at the transport layer|
|No required certificates||Prescribed certificate|
If you liked this page, you can share…