answersLogoWhite

0

https does not 'become' a secure protocol, it 'is' a secure protocol. however, it is 'common practice to intially use the http protocol and 'switch to' or 'use' the https protocol for 'secure' or 'encrypted' communication. information exchanged using the http protocol is exchanged in the 'clear' or using 'plain' text while information exchanged using the https protocol is 'encrypted' (using any number of encryption and or signing mechanisms)prior to exchange. https is an industry agreed upon standard that references the 'secure exchange' of http information.

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

Https stands for what?

Hypertext Transfer Protocol Secure HTTPS stands for Hypertext Transfer Protocol Secure. It is a type of website that is thought to be secure and safe for monetary transactions.


What is meaning https?

The meaning is Hyper Text Transfer Protocol Secure (HTTPS)


Hyper Text Transfer Protocol Secure?

Hyper Text Transfer Protocol Secure is also known as HTTPS. It is a secure data transfer protocol.


What does https stand for in internet?

Hypertext transfer protocol secure.


What is S in https?

Hyper Text Transfer Protocol Secure. (Secure being the "S")


How does a Browser communicate with name server?

http or https http is hyper text transfer protocol https is hyper text transfer protocol secure sockets


In the URL httpwww.Google.com which part of the address is the protocol?

The protocol used for web-browsing is the Hypertext Transfer Protocol, otherwise known as HTTP. The secure version of HTTP is Secure Hypertext Transfer Protocol, otherwise knows as HTTPS.


Which protocol is used to request for webpages and messages?

The HyperText Transfer Protocol (HTTP). For secure conections, the HTTP protocol operates on top of the Secure Sockect Layer (SSL) / Transport Layer Security protocols. This is HTTP Secure (HTTPS).


What is the full form of 'http'?

Full Form of HTTPS: Hyper Text Transfer Protocol Secure i want to protect my computer from hackers by using the https system. how do i do this?


What is the form of http?

Full Form of HTTPS: Hyper Text Transfer Protocol Secure i want to protect my computer from hackers by using the https system. how do i do this?


What is SSL with HTTP?

Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol and a network security protocol. HTTP operates at the highest layer of the TCP/IP Internet reference model, the Application layer; but the security protocol operates at lower sublayer, encrypting an HTTP message prior to transmission and decrypting a message upon arrival. HTTPS has also been known as "Hypertext Transfer Protocol over Secure Socket Layer", but now HTTPS may be secured by the Transport Layer Security (TLS) instead of Secure Sockets Layer (SSL) protocol. To invoke HTTPS, one replaces "http://" with "https://" in the URI, or Web address. HTTPS connections are often used for payment transactions on the Web and for sensitive transactions in corporate information systems.


What port number is used to request web content to be transmitted using a secure protocol?

443 for HTTPS

Trending Questions
What are the basic components of a computer network? You have reformatted your computer but you have a full functioning OS xp pro on c drive and stuffed up version of xp pro on d drive how can you delete the d drive version? Where can I buy a Sony laptop 17 online? How do you find the lucky wheel on pet party? Difference between package and language? What are the difference between static and dynamic hashing in DBMS? Advantage and disadvantage of static routing? What are examples of display device? What sectional views are used to replace an existing primary view? Why many system designer believe that data modelling is the most important part of the system development process? What are the four generic architectural components of a public communication network? Why did the Chinese invent seismograph? What are Wire sizes determined by? What does the computer program Hotspot Shield do? I would like to know if a Certificate of Completion any good to get in the Army It say that I have satisfactorily completed the course of study prescribed by the Board of Education for high school and therefore entitle to this Certificate of Completion.? Describe Two types of remote maintenance carried out on ICTequipment? What is the cost effectiveness of a lan network? What benefit does the binary digit have over decimal in ters of the internal operation of computer? What are some common challenges faced when dealing with resource allocation problems in project management? Where can one download the snap in Active Directory Users and Computers?