Networking: Network Security

2392 Words5 Pages

Network Design Contents Introduction – Why Are Security Protocols Are Needed? 2 What Is TLS? 2 A Diagram Detailing the TLS Handshake 3 What Is SSH? 3 A Diagram Summarising SSH 4 TLS & SSH; A Comparison 4 Similarities 4 Differences 4 Comparative Advantages 5 Network Requirements 5 TLS Requirements 5 SSH Requirements 5 TLS Example 6 SSH Example 6 Conclusion 6 Bibliography 7 Introduction – Why Are Security Protocols Are Needed? In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in terms of transmission. If data transmission is interrupted or data and information within the data is stolen when it is being transmitted this can have devastating effects depending on what the data or information relates to e.g. companies classified customer information. An actual instance of this is when a group of hackers deemed ‘Annonymous’ hacked Sony’s PlayStation Network servers and managed to gain access to millions of their customer’s details. It is clear that in the wrong hands, data and or information can be deadly. This is where security protocols come in; a security protocol can be defined as ‘A sequence of operations that ensure the protection of data. Used with a communication protocol, it provides secure delivery of data between two parties’ (security protocol Definition from PC Magazine Encyclopedia. 2014). Cryptography is a key part of security protocols as it converts the data being sent into a secret code so it is fit for transmission in a secure manner, especially when being sent... ... middle of paper ... ...verview of the SSL or TLS handshake. 2014. An overview of the SSL or TLS handshake. [ONLINE] Available at: http://pic.dhe.ibm.com/infocenter/wmqv7/v7r1/index.jsp?topic=%2Fcom.ibm.mq.doc%2Fsy10660_.htm [Accessed 25 March 2014]. Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. 2014. Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. [ONLINE] Available at: http://www.k2esec.com/secure-communications/network-security-protocols-ipsec-vs-tlsssl-vs-ssh-part-ii. [Accessed 25 March 2014]. Barrett, D. J. and Silverman, R. E. 2001. SSH, the secure shell. Cambridge [Mass.]: O'Reilly. Oppliger, R. 2009. SSL and TLS. Boston: Artech House. Stallings, W. and Stallings, W. 1999. Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall. Rescorla, E. 2001. SSL and TLS. Boston: Addison-Wesley.

More about Networking: Network Security

Open Document