preview

Essay on Networking: Network Security

Best Essays

Network Design

Contents
Introduction – Why Are Security Protocols Are Needed? 2
What Is TLS? 2
A Diagram Detailing the TLS Handshake 3
What Is SSH? 3
A Diagram Summarising SSH 4
TLS & SSH; A Comparison 4
Similarities 4
Differences 4
Comparative Advantages 5
Network Requirements 5
TLS Requirements 5
SSH Requirements 5
TLS Example 6
SSH Example 6
Conclusion 6
Bibliography 7

Introduction – Why Are Security Protocols Are Needed?
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in …show more content…

Security protocols are primarily & commonly used to protect communication via the web, VPNs (Virtual Private Networks) and the transferring of files. This report will now go on to compare two main security protocols – TLS & SSH. They will be compared in a way that takes into account both the similarities and differences in approach and features and their relative advantages and disadvantages. This information will then be backed up by examples where each protocol would be preferred to the other in a certain situation along with my own personal reasoning based on the research that has been carried out on my part.
What Is TLS?
TLS (Transport Layer Security) is the successor to another security protocol; SSL (Secure Sockets Layer) which was originally developed by ‘Netscape’ (HowStuffWorks "SSL and TLS". 2014). It is a cryptographic security protocol which was designed primarily to ensure communication security across the internet. Communication security is achieved by the use of X.509 certificates and hence asymmetric cryptography which allows the exchange of a symmetric key, which can then be used to encrypt the data that is being transmitted between both parties involved in the communication. The protocol is made up of two main layers; TLS Record Protocol and TLS Handshake Protocol. TLS will be most commonly recognised when ‘https’ is noticed in

Get Access