In recent years the use of SSL security for web site and information protection has been found to be far superior to the older SSH protocols due to its use of an X509 certificate. This is due in part to the fact that the older SSH security uses keys that are easily compromised. While SSL protocols still use keys, they also require further information about the owner of the certificate to ensure complete protection.
The X509 Certificate Must Be Issued By a Trusted Certificate Authority
This certificate must be issued by a Certificate Authority as they are considered to be a trustworthy source who has taken the necessary steps to verify the identity of the company who they are issuing the X 509 certificate. This is done as a way to protect the company who owns the certificate and the public who will be relying on the owner to protect any information that they share over the Internet such as contact information, credit card information or private data.