Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 4

Network Security Protocols

There are various categories of protocols like routing protocols,


mail transferring protocols, remote communication protocols,
and many more. Network security protocols are one such
category that makes sure that the security and integrity of the
data are preserved over a network. Various methodologies,
techniques, and processes are involved in these protocols to
secure the network data from any illegitimate attempt in
reviewing or extracting the actual content of data.
Internet Security Threats
Internet security threats impact the network, data security and other
internet connected systems. Cyber criminals have evolved several
techniques to threat privacy and integrity of bank accounts, businesses,
and organizations.
Following are some of the internet security threats:
• Mobile worms
• Malware
• PC and Mobile ransomware
• Large scale attacks like Stuxnet that attempts to destroy infrastructure.
• Hacking as a Service
• Spam
• Phishing
Some Network Security Protocols
Here are the lists of some popular network security protocols:
• IPSec protocol is classified by the IETF IPSec Work Group,
which offers authentication of data, integrity, as well as
privacy between 2 entities. Manual or dynamic association of
management in cryptographic keys is done with the help of an
IETF-specific key managing protocol named Internet Key
Exchange (IKE).
• Secure Shell (SSH) was invented in the year 1995, which is a
cryptographic network security protocol used for securing
data communication over a network. It permits the
command-line to login remotely as well as the execution of
specific tasks remotely. Various functionalities of FTP are
incorporated in SSH. SSH-1 and SSH-2 are the latest of its kind.
• HyperText Transfer Protocol Secure (HTTPS) is a secured
protocol used to secure data communication among two or
more systems. It set up an encrypted link with the help of
Secure Socket Layer (SSL), now known as Transport Layer
Security (TLS). Since data transferred using HTTPS is in the
encrypted format, so, it stops cybercriminals from
interpretation as well as alteration of data throughout the
transfer from browser to the webserver.
• Kerberos is another network validation protocol that was
intended for providing a strong authentication between
client-server applications with the help of secret-key
cryptography. According to the Kerberos network validation
protocol, all of its services and workplaces correspond to
an insecure network, which makes it more secure and
responsible.

You might also like