close
test_template

Network Security Protocols

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 770 |

Pages: 2|

4 min read

Published: Nov 7, 2018

Words: 770|Pages: 2|4 min read

Published: Nov 7, 2018

Table of contents

  1. Network Security DA-1
  2. Registration Number:16BCI0095
  3. What are Network security protocols?
  4. Some attacks on Network
  5. Security Protocols in Networks
  6. Pre-requiseites for SSL
  7. SSL Architecture
  8. Record Layer

Network Security DA-1

Registration Number:16BCI0095

What are Network security protocols?

Protocols are a set of rules governs the communications between two sources. Network security protocols are a type network protocol that ensures the security and integrity of data in transit over a network connection. Network security protocols define how to secure network data from any illegitimate attacks.

There are around 3,885,567,619 internet users in this world and World Wide Web is full of sensitive information necessary for e-commerce, online transactions etc. As database driven applications are increasing their hold on the systems market, the systems are being developed rapidly. Unauthorized and malicious users are finding ways into these systems – and creating new ways to retrieve sensitive information. So it is important to secure the data that is transmitted in such network.

Several very popular network protocols such as, "Localtalk" (Apple) or "Token Ring" (IBM), commonly used in the 90's and early 21st century have now largely fallen into disuse as there is an increase in Internet-based networks, which use IP/TCP , are becoming the leading protocols for most networks But simple TCP/IP doesn’t provide the security necessary for e-commerce, online banking and company extranets Additional tools along with these protocols are required for better security. One way of mitigating a potential attack during a user’s session would be to use a secure communication protocol to encrypt data in transit between the user and the server on which the sensitive information resides. This is where the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) come into the picture.

Some attacks on Network

We can group network attacks based on the skills possessed by the attacker.

  • Unstructured–These attacks are done by unskilled hackers. The person behind the attack uses the tools available on the net and often does not know the environment he is attacking. These threats should not be neglected because they can potentially expose precious information to malicious users.
  • Structured– These attacks a far more dangerous compared to the previous attacks and are done by individuals who possess advanced computing skills. Such hackers are experts in exploiting system vulnerabilities. By gaining enough information about a company’s network, these individuals can create custom hacking tools to breach network security.

Security Protocols in Networks

Layer Communication Protocols, Security Protocols, Application Layer, HTTP FTP SMTP, PGP. S/MIME, HTTPS, Transport Layer, TCP /UDP, SSL, TLS, SSH, Network Layer, IP, IPsec, Secure Socket Layer

In a broad sense Secure Socket Layer is a security protocol. It is a standard security technology for establishing an encrypted links between a client and a server—typically a web server (website) and a browser, or a mail server and a mail client. There are many applications of SSL in existence, since it is capable of securing any transmission over TCP. Secure HTTP, or HTTPS, is a familiar application of SSL in e-commerce or password transactions

The 3 key features of the SSL that collectively provide security are:

  • Privacy - connection through encryption
  • Identity authentication – identification through certificates
  • Reliability –dependable maintenance of a secure connection through message integrity checking

Pre-requiseites for SSL

Generally to use certain protocols, there are some protocol specific criteria to be met by the communicating systems. Since the SSL protocol is integrated into most web browsers, and those browsers are normally used to access web applications, no further configuration is required from the client’s side of the SSL connection.

SSL Architecture

There are four protocol layers in the SSL protocol. They are:

  • Record Layer
  • ChangeCipherSpec Protocol
  • Alert Protocol
  • Handshake Protocol

These protocols encapsulate all communication between the client machine and the server.

Record Layer

It provides:

  • Confidentiality : A shared secret Key is used for encryption.
  • Message Integrity: A shared secret key is used to form a MAC(message authentication code)

The record layer manages the ChangeCipherSpec, Alert and Handshake protocol messages.It takes the message being transmitted and fragments the data into manageable blocks. It provides a header for each message, and a hash, generated from a Message Authentication Code (MAC) is appended at the end. This MAC is ensures the non-repudiation of the message.

Get a custom paper now from our expert writers.

It encrypts the data along with the MAC and transmits the result. The fields that comprise the five-byte header of the Record Layer are: Protocol Definition (1 byte), Protocol Version (2 bytes) and the Length (2 bytes). The protocol messages that follow the header cannot be longer than 16,384 bytes, as specified by the SSL protocol.

Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

Network Security Protocols. (2018, October 26). GradesFixer. Retrieved November 20, 2024, from https://gradesfixer.com/free-essay-examples/network-security-protocols/
“Network Security Protocols.” GradesFixer, 26 Oct. 2018, gradesfixer.com/free-essay-examples/network-security-protocols/
Network Security Protocols. [online]. Available at: <https://gradesfixer.com/free-essay-examples/network-security-protocols/> [Accessed 20 Nov. 2024].
Network Security Protocols [Internet]. GradesFixer. 2018 Oct 26 [cited 2024 Nov 20]. Available from: https://gradesfixer.com/free-essay-examples/network-security-protocols/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now