Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Networks and Computer Security

(ETN772)

Project Proposal

Muhammad Asfund Ausaf


CIIT/FA16-REE-026/ISB

Security Protocols

Introduction:
Security protocols are a basically network protocol that ensures
the security and integrity of data in transit over a network
connection. Security protocols define the processes and method
use to secure network data from any illegitimate attempt to
review or extract the contents of data. Network security protocols
are primarily designed to prevent any unauthorized user,
application, service or device from accessing network data. This
applies to virtually all data types regardless of the network
medium used. Network security protocols generally implement
cryptography and encryption techniques to secure the data so
that it can only be decrypted with a special algorithm, logical key,
mathematical formula and/or a combination of all of them.
The primary components of a security protocol are as follow:
Access Control
Authenticates user identity. Authorizes access to specific
resources based on permissions level and policies.
Encryption Algorithm
The cryptographic cipher combined with various methods for encr
ypting the text.
Key Management
Create, distribute and maintain the keys.
Message Integrity
Ensure that the encrypted message has not been tampered with.
There are lists of network security protocols available such as
HTTPs, SSH, SSL, PCT, IPsec etc.

My Topics:
The security protocols that I have chosen to works on are SSH &
IPsec. Little introduction about these protocols are as follow.
The OSI model is an open standard that is used so any vendor can
implement a solution that can interoperate with one another.
There are seven different layers in the OSI model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer

SSH:
Secure Shell (SSH) is Application Layer cryptographic network
protocol for operating network services securely over an
unsecured network. The best known example application is for
remote login to computer systems by users

IPsec:
Internet Protocol Security (IPsec) is a Network Layer protocol suite
for secure Internet Protocol (IP) communications that works by
authenticating and encrypting each IP packet of a communication
session. IPsec includes protocols for establishing mutual
authentication between agents at the beginning of the session
and negotiation of cryptographic keys to be used during the
session.

You might also like