Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
A secure connection is a connection that is encrypted by one or more security protocols to ensure the security of data flowing between two or more nodes. When a connection is not encrypted, it can be easily listened to by anyone with the knowledge on how to do it, or even prone to threats by malicious software and rogue and unexpected events.
Anyone who wants to get information from a non-secured connection can do so since they can easily go through, in and out of the computer’s network taking with them important data such as login, passwords and other private information.
Secure connections, as they supposed to protect the data being transferred from one computer to another, must be able to do three main things.
Prevent third parties from getting hold of confidential data
It must first validate the identification of the person who wishes to access and exchange the data
It must protect information from being viewed or altered by unknown parties
There are many methods to be able to establish a secure connection, but most of them involve data encryption. Data encryption is a method which hides information from other unauthorized parties. This method usually needs an appropriate program installed on both computers involved in the connection that will encrypt and decrypt the information. Among these are our basic security protocols embedded in main communication protocols like TCP/IP, HTTPS, POP3 or IMAP.
Firewalls and anti-virus software may also serve in creating secure connections in some form.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day