Network Security Protocols

0 / 5. 0

Network security protocols

Introduction

Safety protocols in networks. Purchases and payments, bank accounts, personal information, clinical history, large -scale projects, and many other documents that can be considered confidential have been the objective of third parties, even more in the digital age. For this need, security protocols in computer networks were created, which allow for security in terms of the reliability and privacy of information. Next, we will describe some of the protocols and services involved in the security of communication, email and web navigation.

Developing

Information transport requires special protocols to guarantee communication security, giving safe and reliable access guarantees to information. First, the IPSEC is a set of safety protocols in the IP that ensures packages and guarantees its authentication, Tanenbaum, AS, & Wetherall, DJ refers that this protocol is always required, but that allows implementing a simple null algorithm,Easy and fast in RFC 2410. On the other hand, the Firewall acts as a filter of packages allowing or obstructing the entry or exit of packages from a private network to a public according to the rules established in the private. Apart from this, the VPN creates an illusory network superimposed on a public network, but with properties of a private network. 

Finally, email is the means of communication that replaces the sending of documentation and personal notification in physical, so it must be ensured that its content is not read by a third party;being the PGP and the s / mime the most used protocols for this purpose. First, the PGP works with 128 -bit keys of the idea encryption system, using RSA for the administration of keys and MD5 for the integrity of the data. Second, the s / mime supports different types of algorithms and works digital firms for correct authentication and integrity. Finally, IBM (SF) mentioned that using VPN and SSL you can create safe communication between the server and users guaranteeing confidentiality and integrity.

During web navigation is where the greatest amount of incidents of computer problems occur, for this the protocols are responsible for reducing the risk to end users. First, the safe assignment of names is done using the DNSSEC protocols, which proves the origin of the information, distributes the public and authentic key requests and transactions. Also, the SSL, which when using it on HTTP is known as HTTPS, according to Google (SF) allows you to check the identity of the website through certificates. In addition, it should be noted that web pages currently not only include HTML language, but codes in other languages, which are executed or not depend on the creator and the result of the previous execution environment. 

conclusion

In turn, in short, the security protocols in computer networks allow the reliability and privacy of the information sent and received, during communication, the IPSEC, Firewall, VPN and wireless security act, in the use of email,They highlight the PGP and S/Mime, and in web navigation they act on the safe assignment of names, SSL, Mobile Code and Navigators. Even so, safety starts from each user, the user must know the good practices of the use of the devices and the correct navigation to avoid any type of inconveniences where the user has responsibility, which is where the rate of computer problems is higher.

Bibliography

  • Tanenbaum, a. S., & Wetherall, D. J. (2012). Computer networks. (Alfonso Romero, Trad.). Mexico: Pearson Education. (Original work published in 2011).
  • Email security. (s.F.). 
  • Google. (s.F.). How to check if the connection of a site is safe. 

Free Network Security Protocols Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *