Wednesday, May 6, 2020

Essay on Networking Network Security - 2380 Words

Network Design Contents Introduction – Why Are Security Protocols Are Needed? 2 What Is TLS? 2 A Diagram Detailing the TLS Handshake 3 What Is SSH? 3 A Diagram Summarising SSH 4 TLS SSH; A Comparison 4 Similarities 4 Differences 4 Comparative Advantages 5 Network Requirements 5 TLS Requirements 5 SSH Requirements 5 TLS Example 6 SSH Example 6 Conclusion 6 Bibliography 7 Introduction – Why Are Security Protocols Are Needed? In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in†¦show more content†¦Security protocols are primarily commonly used to protect communication via the web, VPNs (Virtual Private Networks) and the transferring of files. This report will now go on to compare two main security protocols – TLS SSH. They will be compared in a way that takes into account both the similarities and differences in approach and features and their relative advantages and disadvantages. This information will then be backed up by examples where each protocol would be preferred to the other in a certain situation along with my own personal reasoning based on the research that has been carried out on my part. What Is TLS? TLS (Transport Layer Security) is the successor to another security protocol; SSL (Secure Sockets Layer) which was originally developed by ‘Netscape’ (HowStuffWorks SSL and TLS. 2014). It is a cryptographic security protocol which was designed primarily to ensure communication security across the internet. Communication security is achieved by the use of X.509 certificates and hence asymmetric cryptography which allows the exchange of a symmetric key, which can then be used to encrypt the data that is being transmitted between both parties involved in the communication. The protocol is made up of two main layers; TLS Record Protocol and TLS Handshake Protocol. TLS will be most commonly recognised when ‘https’ is noticed inShow MoreRelatedNetwork Security Enhancement Using Software Defined Networking Technologies1810 Words   |  8 Pages â€Æ' Network Security enhancement using Software Defined Networking Technologies Software Defined Networking (SDN) is a pattern of new technologies for permitting more prominent control of how networks work. As opposed to a genuinely static network that must be controlled by exclusive merchant particular protocols, with at times restricted deceivability into the internals of layer 2 gadgets like switches, SDN considers experimentation in enhancing and arranging how the network functions. FurthermoreRead MoreTechnological Advancements for Mabuhay Airlines 706 Words   |  3 Pagessmall airline company providing direct flight from Manila, Philippines to all points of the country. Serving the nation for more than two decades, MAL has become one of the most respected airlines with new and modern fleet of aircraft and a route network that serves 29 domestic points. MAL offers a wide arrays of online services such as view Flight Schedule, Book a Flight, Manage Booking, express service (extrack) that track and trace your cargo online and find out what types of cargo we carry forRead MoreRiordan Security Issues1359 Words   |  6 PagesRunning head: WEB SECUIRTY ISSUES AND CONCERNS CMGT 440 - Introduction to Information Systems Security University of Phoenix Abstract Introduction Riordan manufacturing is a plastic injection molding company based in San Jose. The company also has various operations in 3 other Michigan cities as well as one overseas office in China. â€Å"Riordan has a 46 million annual earning† and their major customers are automotive parts manufacturers, aircraft manufacturers, the Department ofRead MoreDeveloping a Company Network Security Policy820 Words   |  3 Pageshaving the capabilities to access the company’s network both in and out of the office, increases the potential that information or the access to information may end up in the wrong hands. It is because of these threats that companies create and enforce network security policies. A network security policy is a document that states how company intends to protect the company’s physical and information technology assets. (Rouse, 2007) A security policy is intended to be a living document thatRead MoreBest Practices For Network Security2439 Words   |  10 PagesBest Practices for Network Security Network security, in this technological age, should be one of the most important items of concern for any business owner or network administrator. Since just about every company out there is connected to and conducts some sort of business over the Internet, just about every one of them is at risk from outside threats. This means that they should take certain steps in order for them for them to conduct their business securely. Beyond the initial steps, it mustRead MoreWorldwide Network Security7789 Words   |  32 PagesMARKET ANALYSIS Worldwide Network Security 2012–2016 Forecast and 2011 Vendor Shares John Grady IDC OPINION The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $7.4 billion in 2011. UTM revenue saw the strongest growth at 17.4% and reached $2.2 billion. The IDP market saw more moderate growth at 4.5%, reaching $1.9Read MoreNetwork Security : A Secure Platform For Computers2050 Words   |  9 PagesNetworking security the process of taking physical and software preemptive evaluations to protect the underlying network foundation from unauthorized admittance, misuse, glitch, modification, demolish, imprudent revelation, thereby creating a secure platform for computers, users and programs to implement their permitted critical functions within a secure environment. Network security has become significant due to the patent that can be obtained through the Internet. There are essentially two differentRead MoreThe Import ance Of Firewalls On The Operation System1222 Words   |  5 Pagesbecoming critical key to business sectors and public services, therefore there are many companies paying more attention to aspects of information integrity towards its reliability and creditability (Ezingeard, McFadzean, Birchall, 2005). Moreover, security is one of the domains on the information systems, in which organizations emphasize on taking audit and compliance with controlling and monitoring information assurance processes. According to Ezingeard, McFadzean, Birchall (2005), informationRead MoreRemote Access And Using Extensible Authentication Protocol Essay1129 Words   |  5 Pagesdata outside the office which presents many security challenges. Not only is the end user accessing your network resources and potentially sensitive data, but they are many times doing so from a public network which the admin has no control over and is open to others who may have malicious intent. These connections clearly need to be properly secured in order provide end users secure network connections. To secure remote connections, a virtual private network (VPN) will created using the Routing andRead MoreEssay on Security Issues of Ambient Networks2196 Words   |  9 PagesIn this essay we will present security issues of a networking concept referred to as ambient networks, which aims to enable the cooperation of heterogeneous networks belonging to different operator or technology domains. In this way, it appears as homogeneous to the users of the network services. Providing security in ambient networks is a huge challenge. The main reason is that the traditional security model is not valid anymore. Traditional security assumes that there is a vulnerable channel

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.