Network DesignContentsIntroduction – Why are security protocols needed? 2What is TLS? 2A Detailed TLS handshake diagram 3What is SSH? Diagram 3A summarizing SSH 4TLS and SSH; A Comparison 4Similarities 4Differences 4Comparative Advantages 5Network Requirements 5TLS Requirements 5SSH Requirements 5TLS Example 6SSH Example 6Conclusion 6Bibliography 7Introduction: Why Are Security Protocols Necessary? In the modern age of computing, networks are an important part of IT. It is important now more than ever that data sent over any network, be it LAN (Local Area Network) or WAN (Wide Area Network; Internet), is kept secure, private (when required) and uninterrupted in terms of transmission. If data transmission is interrupted or if data and information within it is stolen during transmission, this can have devastating effects depending on what the data or information relates to, for example confidential information about companies' customers. A concrete example of this occurred when a group of hackers believed to be "anonymous" hacked into Sony's PlayStation Network servers and managed to access millions of customer details. It is clear that in the wrong hands, data and/or information can be deadly. This is where safety protocols come in; a security protocol can be defined as 'A sequence of operations that ensure data protection. Used with a communications protocol, it provides secure delivery of data between two parties (Security protocol definition from PC Magazine Encyclopedia. 2014). Encryption is a key part of security protocols as it converts the data being sent into a secret code so that it is suitable for transmission securely, especially when it is sent… middle of paper… overview. of the SSL or TLS handshake. 2014. An Overview of the SSL or TLS Handshake. [ONLINE] Available at: http://pic.dhe.ibm.com/infocenter/wmqv7/v7r1/index.jsp?topic=%2Fcom.ibm.mq.doc%2Fsy10660_.htm [Accessed 25 March 2014] .Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. 2014. Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II «K2E Security. [ONLINE] Available at: http://www.k2esec.com/secure-communications/network-security-protocols-ipsec-vs-tlsssl-vs-ssh-part-ii. [Accessed March 25, 2014]. Barrett, D. J., & Silverman, R. E. 2001. SSH, the secure shell. Cambridge [Mass.]: O'Reilly.Oppliger, R. 2009. SSL and TLS. Boston: Artech House.Stallings, W. and Stallings, W. 1999. Cryptography and Network Security. Upper Saddle River, NJ: Prentice Hall.Rescorla, E. 2001. SSL and TLS. Boston: Addison Wesley.
tags