Basically SSL provides security for web based applications like internet banking. For providing end-to-end secure service over TCP, we use SSL. SSL is basically divided into two layers of protocol. Bottom layer is SSL record protocol which is used by HTTP protocol. SSL record protocol provides confidentiality (by using encryption) and message integrity (by using message authentication ... ... middle of paper ... ...te the commands across any type of network, while SSL is used for securely transmitting the critical information such as credit card or net banking transactions.
b. IDS- Intrusion Detection System- 2 types: Active and Passive c. NAT- Network Address Translation- Appends to your logical port. Protects internal hosts. Used with proxy servers. Translates internal IP to Real IP. Uses unique port table.
SSH has 3 main components as shown in figure 1: Transport Layer Protocol that provide confidentiality, integrity and authentication; User Authentication Protocol that authenticate client to the server; Connection Protocol that “multiplexes the encrypted tunnel into several logical channels” . Figure 1: Components of SSH  The main benefits of SSH are: Privacy of data, Integrity of data, Authentication of senders and receivers, authorization to access, forwarding “to encrypt other TCP/IP based sessions” . Privacy of data is maintained by encrypting that data that are transferred over the internet. The key is randomly selected and secretly negotiated between client and server and once the session is over, the key get discarded. Different Encryption algorithm are used such as 3-DES (triple-DES), IDEA, Blowfish.
The main function of the switch, router, gateways, or hubs is having the ability to process and forward data packets on the network. The creation and function is to ensure that each having their own unique functions and configurations which makes one a more viable optional choice over the next for ensuring data forwarding. For example, large networks will need routing protocols that will send the data packet to the intended destination and not broadcast it throughout the entire network. Gateways provide nodes with a contactless connection into the resources that are available for the users. The basic gateways that are installed in many pc are called NIC’s or network interface card (Andrews, 2006, pp.
• Discuss the minimum hardware and software requirements for connecting to the internet. • Discuss the function of IP addresses and how they apply to communicating on the internet. • Show the steps in registering domain name for user, indicating the different options that have to be considered. • Explain how a computer system can be protected from viruses transmitted via the net • Outline teh use of firewalls to protect against unauthorised access. • Describe the use of digital signatures to verify identity on the internet.
• Both are used for different purposes normally. SSH is used to create a secure connection over a network and SSL is used to transfer data securely by encryption techniques and use of certificates. So it is the purpose that decides which one is better. Reference: 1. http://www.hit.bme.hu/~buttyan/courses/BMEVIHI4372/ssh.pdf 2. http://www.differencebetween.net/technology/difference-between-ssh-and-ssl/ 3. https://www.symantec.com/content/en/us/enterprise/white_papers/b-beginners-guide-to-ssl-certificates_WP.pdf
1According to the SANS Institute Firewalls can be broken down into two categories: IP packet filters (NetworkLevel) and proxy servers (Application Level). There are also three parts or “zones” when referring to network protection. The first zone is ref... ... middle of paper ... ...the years from the simple performance of “PING” or “CONNECT” attempts to more extensive and subversive (or “quiet”) methods of detection. Today, the most popular tool for performing network mapping is the open source tool Nmap.5 Network mapping is capable of testing for the presence of nodes on a network based on a variety of detection techniques, including the use of Internet Protocol (IP), Transmission Control Protocol (TCP) and Universal Datagram Protocol (UDP). Each of these protocols has a unique flavor, and thus can generate varying results.
While TCP/IP is quite complicated, it is the most versatile protocol around. Some commonly used notions that surround TCP/IP management is that generally with TCP/IP, a client-server mode of operation is used. To run the TCP/IP server software, a gateway is used. A controlling host will run the client software. Also, an authentication method is needed to access to the server.
Securing Client/Server Transactions The three basic ways that security is implemented in the area of client/server transaction. The first area is firewalls. The basic idea of a firewall to monitor traffic from a trusted network ( a company’s internal network) to an untrusted network (such as the Internet). Firewalls fall into two categories, “proxies” and “packet-filtering” firewalls. Packet-filtering determines whether a packet is allowed or disallowed depending on the source of the packet and the contents of it.
You will learn what happens when a device on one network does not know the MAC address of a device on another network. You will learn that Reverse Address Resolution Protocol (RARP) is the protocol a device uses when it does not know its own IP address. Lastly, you will learn the difference between routing and routed protocols and how routers track distance between locations. You will also learn about distance-vector, link-state, and hybrid routing approaches and how each resolves common routing problems. In networking, there are two addressing schemes: one uses the MAC address, a data link (Layer 2) address; the other uses an address located at the network layer (Layer 3) of the OSI model.