Defending against attacks: To simulate the Secure Socket Layer (SSL) transmission between a user and a server

Which layer of the OSI model does SSL operate in?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What is a 'man-in-the-middle' attack in SSL?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What are the primary security functions of SSL?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation