Free Essay SamplesAbout UsContact Us Order Now

Network Security Protocols

0 / 5. 0

Words: 609

Pages: 2

640

Network security protocols

Introduction

Safety protocols in networks. Purchases and payments, bank accounts, personal information, clinical history, large -scale projects, and many other documents that can be considered confidential have been the objective of third parties, even more in the digital age. For this need, security protocols in computer networks were created, which allow for security in terms of the reliability and privacy of information. Next, we will describe some of the protocols and services involved in the security of communication, email and web navigation.

Developing

Information transport requires special protocols to guarantee communication security, giving safe and reliable access guarantees to information. First, the IPSEC is a set of safety protocols in the IP that ensures packages and guarantees its authentication, Tanenbaum, AS, & Wetherall, DJ refers that this protocol is always required, but that allows implementing a simple null algorithm,Easy and fast in RFC 2410. On the other hand, the Firewall acts as a filter of packages allowing or obstructing the entry or exit of packages from a private network to a public according to the rules established in the private. Apart from this, the VPN creates an illusory network superimposed on a public network, but with properties of a private network. 

Finally, email is the means of communication that replaces the sending of documentation and personal notification in physical, so it must be ensured that its content is not read by a third party;being the PGP and the s / mime the most used protocols for this purpose.

Wait! Network Security Protocols paper is just an example!

First, the PGP works with 128 -bit keys of the idea encryption system, using RSA for the administration of keys and MD5 for the integrity of the data. Second, the s / mime supports different types of algorithms and works digital firms for correct authentication and integrity. Finally, IBM (SF) mentioned that using VPN and SSL you can create safe communication between the server and users guaranteeing confidentiality and integrity.

During web navigation is where the greatest amount of incidents of computer problems occur, for this the protocols are responsible for reducing the risk to end users. First, the safe assignment of names is done using the DNSSEC protocols, which proves the origin of the information, distributes the public and authentic key requests and transactions. Also, the SSL, which when using it on HTTP is known as HTTPS, according to Google (SF) allows you to check the identity of the website through certificates. In addition, it should be noted that web pages currently not only include HTML language, but codes in other languages, which are executed or not depend on the creator and the result of the previous execution environment. 

conclusion

In turn, in short, the security protocols in computer networks allow the reliability and privacy of the information sent and received, during communication, the IPSEC, Firewall, VPN and wireless security act, in the use of email,They highlight the PGP and S/Mime, and in web navigation they act on the safe assignment of names, SSL, Mobile Code and Navigators. Even so, safety starts from each user, the user must know the good practices of the use of the devices and the correct navigation to avoid any type of inconveniences where the user has responsibility, which is where the rate of computer problems is higher.

Bibliography

  • Tanenbaum, a. S., & Wetherall, D. J. (2012). Computer networks. (Alfonso Romero, Trad.). Mexico: Pearson Education. (Original work published in 2011).
  • Email security. (s.F.). 
  • Google. (s.F.). How to check if the connection of a site is safe. 

Get quality help now

Dustin Abbott

5,0 (359 reviews)

Recent reviews about this Writer

To be honest, I hate writing. That’s why when my professor assigned me with coursework, I just took the easy way out and hired StudyZoomer to assist me. I’m absolutely satisfied with the result, no flaws.

View profile

Related Essays

Indian Removal Act

Pages: 1

(275 words)

Security Assessment

Pages: 1

(275 words)

Legal Marijuana

Pages: 1

(550 words)

CNO nursing plan

Pages: 1

(550 words)

Professional Research proposal

Pages: 1

(275 words)

Clininical Rotation Experience

Pages: 1

(275 words)

Mass incarceration

Pages: 1

(275 words)

Proposal

Pages: 1

(275 words)

ousing problem

Pages: 1

(275 words)