Secure Socket Layer (SSL) is a protocol that is used during the client-server connection on the internet through TCP (Transmission Control Protocol). TSL is a much more complicated and secure protocol than SSL. TLS the recent version of SSL, which solidifies the security system better than SSL. 

Purpose of SSL: Its purpose is to add security layer in the web surfing and building a strong connection between the client and server system.

When a computer system connects a particular website, it uses HTTP (Hypertext Transfer Protocol). This protocol does not have a security layer. Therefore, when the information/ data is transferred from the client system to server system, there is a risk for hackers to retrieve the information. This is critical when you log in the system and write a password or credit card number. These financial codes are in plaintext, therefore there is high risk to hack these numbers. 

  • Secure Socket Layer provides an extra security layer in the HTTP protocol and makes it HTTPS. This establishes a secure connection, so credit card details and passwords are ensured to be encrypted.
  • This encrypt of the data/information in the form of ciphertext which cannot be decrypt without the key. There is asymmetric encryption in the system, so only system (client or server) can decipher the text. 
  • The browser request for a handshake with the server. It certifies to verify the authenticity of the website. After recognition, the request is transmitted. 
  • When the request is complete, the session is closed and the record of the encryption disappears. 


Malware is different malicious software that affects the vulnerabilities of a computer system. There are different categories of malware on the basis of the program code and purpose. 

  • Virus: Replicates itself in the computer system. Its purpose is gain access of the computer and destroy data, corrupt system softwares and make the resources of the computer useless. 
  • Worm: Similar to virus, its purpose is to replicate and spread. Unlike virus, it spreads over the computer network, therefore affection the host computer along with other computer system. It affects by damaging the files, encrypting system infecting the host and other network systems. 
  • Logic Bombs: Like other malicious malware, its affects, damages, corrupts the file and system. However, its different because it only activates after certain requirements are met. These requirements can be specific date, time or when the file is deleted or installed. 
  • Trojan Horse: It is as malicious as other categories of malware but this can be hidden in the computer system as software update, application, software
  • Spyware: Spyware is a malware that thiefs your identity by collection information about the user. Just like the activities done in internet, the sites you visit, the emails you get and receive. It collects these information to breach the data. It can even get into your operating system without your knowledge to trigger malicious activities 
  • Bot: Bots are also known as web bots, spider, crawlers that are automated program to run without the use of the hacker who is trying to retrieve the information from the computer system. They collect information such as passwords and other sensitive data.