Category: 

What Are Network Security Protocols?

Secure networks have extra security, evidenced by "https" in the address.
Article Details
  • Written By: Michael Linn
  • Edited By: J.T. Gale
  • Last Modified Date: 08 July 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
In the US, workers under 25 have unemployment rates that are twice the national average.  more...

July 28 ,  1945 :  14 people were killed when a US Army bomber crashed into the Empire State building.  more...

Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer.

Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN).

The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in cleartext, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server.

Ad

As an alternative, Secure File Transfer Protocol (SFTP) offers a more secure way to transfer files. SFTP is usually built upon Secure Shell (SSH) and is able to encrypt commands and data transfers over a network, thereby reducing the likelihood of interception attacks. The SSH cryptographic protocol is also resilient to impersonation attacks because the client and server are authenticated using digital certificates.

In addition to SSH, Secure Sockets Layer/Transport Layer Security (SSL/TLS) can be used as the underlying protocol for SFTP. Like SSH, SSL/TLS authenticates the identity of both the server and the client, as well as encrypts communications between the two. In addition to securing SFTP file transfers, SSL/TLS is used for securing e-mail communication.

SSL is also used in combination with Hypertext Transfer Protocol (HTTP) to encrypt communications between a browser and a web server in the form of HTTP over Secure Sockets Layer (HTTPS). HTTPS encrypts communications and verifies the identity of a web server. When performing private transactions over the Internet, such as online banking, it generally is good practice for a person to check the browser’s address bar to make sure that the website’s address begins with https:// and not just http://.

Another area where cryptographic network security protocols play an important role, especially for modern businesses, is in exchanging documents between private networks over a public Internet connection. These so-called Virtual Private Networks (VPNs) are critical for business because they securely connect remote workers and offices across the world. Some commonly used network security protocols that are used to facilitate VPNs are Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), IP Security (IPsec), and SSH. Not only do these network security protocols create a safe connection but they also greatly reduce the costs associated with creating an alternate solution, such as building or leasing lines to create a private network.

Ad

Discuss this Article

Logicfest
Post 2

Wow. How many Webmasters out there are using FTP to update and manage their external server accounts? The risk of a security problem arising is slim for those who don't have sites with a lot of critical information, but the risk of that information being accepted will increase when it comes to information that can be valuable in the hands of a competitor or a hacker wanting to use the data in nefarious ways.

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email