-
Essay / Network Security Protocols
Table of ContentsNetwork Security DA-1Registration Number: 16BCI0095What are Network Security Protocols?Some Attacks on Network Security Protocols in NetworksPrerequisites for SSLSSLR ArchitectureRecord LayerNetwork Security DA-1Registration Number :16BCI0095What are network security protocols?Protocols are a set of rules governing communications between two sources. Network security protocols are a type of network protocol that ensures the security and integrity of data in transit over a network connection. Network security protocols define how to secure network data against illegitimate attacks. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get Original EssayThere are around 3,885,567,619 internet users in this world and the World Wide Web is full of sensitive information required for e-commerce, online transactions, etc. Database-based applications are increasing their grip on the systems market, systems are growing rapidly. Unauthorized and malicious users are finding ways to access these systems and creating new ways to retrieve sensitive information. It is therefore important to secure the data transmitted over such a network. Several very popular network protocols such as "Localtalk" (Apple) or "Token Ring" (IBM), commonly used in the 1990s and early 21st century, are now widely used. fallen into disuse due to the proliferation of Internet-based networks, which use IP/TCP, have become the primary protocols for most networks. But simple TCP/IP does not provide the security needed for e-commerce, online banking, and corporate extranets. Additional tools along with these protocols are needed for better security. One way to mitigate a potential attack during a user's session would be to use a secure communications protocol to encrypt data in transit between the user and the server where the sensitive information resides. This is where Secure Sockets Layer (SSL) and Transport Layer Security (TLS) come in. Some Network Attacks We can group network attacks based on the skills the attacker possesses. Unstructured: These attacks are carried out by unskilled hackers. The attacker uses tools available on the Internet and often does not know the environment he is attacking. These threats should not be overlooked as they can potentially expose valuable information to malicious users. Structured – These attacks are much more dangerous than previous attacks and are carried out by people with advanced computer skills. These hackers are experts in exploiting system vulnerabilities. By obtaining enough information about a company's network, these individuals can create custom hacking tools to breach network security. Security protocols in network layer communication protocols, security protocols, application layer, HTTP FTP SMTP, PGP. S/MIME, HTTPS, Transport Layer, TCP/UDP, SSL, TLS, SSH, Network Layer, IP, IPsec, Secure Socket LayerIn a broad sense, Secure Socket Layer is a security protocol. It is a standard security technology for establishing encrypted links between a client and a server, usually a web server (website) and a browser, or an email server and an email client. There are many applications of SSL because it is capable of securing any transmission over TCP. Secure HTTP, or..