Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Security

Security protocols, also called cryptographic protocols, work to ensure that the network and
the data sent over it are protected from unauthorized users.

Common functions of security network protocols include the following:

 Encryption: Encryption protocols protect data and secure areas by requiring


users to input a secret key or password in order to access that information.
 Entity Authentication: Entity authentication protocols create a system that
requires different devices or users on a network to verify their identity before
accessing secure areas.
 Transportation: Transportation security protocols protect data while it is
transported from one network device to another.

Examples of Security Protocols:


1. SSL: It is a network security protocol mainly used for protecting sensitive data
and securing internet connections. SSL allows both server-to-server and client-
to-server communication. All the data transferred through SSL is encrypted
thus stopping any unauthorized person from accessing it.
2. HTTPS: It is the secured version of HTTP; this protocol ensures secure
communication between two computers where one sends the request through
the browser and the other fetches the data from the web server.
3. TLS: It is a security protocol designed for data security and privacy over the
internet, its functionality is encryption, checking the integrity of data i.e.,
whether it has been tampered with or not, and Authentication. It is generally
used for encrypted communication between servers and web apps, like a web
browser loading a website, it can also be used for encryption of messages,
emails, and VoIP.

Network Protocol Example


Whether you know it or not, you’ve absolutely encountered network protocols when using
electronic devices – and some of them are readily identifiable.

Here are a few examples of the most commonly used network protocols:

 Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data
is transmitted over the internet and determines how web servers and browsers
should respond to commands. This protocol (or its secure counterpart, HTTPS)
appears at the beginning of various URLs or web addresses online.
 Secure Socket Shell (SSH): This protocol provides secure access to a
computer, even if it’s on an unsecured network. SSH is particularly useful
for network administrators who need to manage different systems remotely.
 Short Message Service (SMS): This communications protocol was created to
send and receive text messages over cellular networks. SMS refers exclusively
to text-based messages. Pictures, videos or other media require Multimedia
Messaging Service (MMS), an extension of the SMS protocol.

Network protocols do not simply define how devices and processes work; they define how
devices and processes work together. Without these predetermined conventions and rules, the
internet would lack the necessary infrastructure it needs to be functional and useable.
Network protocols are the foundation of modern communications, without which the digital
world could not stand.

You might also like