To access material, start machines and answer questions login.
In the Networking Core Protocols room, we learned about the protocols used to browse the web and access email, among others. These protocols work great; however, they cannot protect the confidentiality, , or authenticity of the data transferred. In simpler terms, when we say that confidentiality is not protected, it means that someone watching the packets can read your password or credit card information when sent over . Similarly, they can access your private documents when sent via email. As for not protecting the of the data, it means that an adversary can change the contents of the transferred data; in other words, if you authorise the payment of one hundred pounds, they can easily change it to another value, such as eight hundred pounds. Authenticity means ensuring we are talking with the correct server, not a fake one. Important online transactions are risky without ensuring confidentiality, , and authenticity.
Transport Layer Security () is added to existing protocols to protect communication confidentiality, , and authenticity. Consequently, , , , and become HTTPS, POP3S, SMTPS, and IMAPS, where the appended āSā stands for Secure. We will examine these protocols and the benefits we reaped from .
Similarly, it is deemed insecure to remotely access a system using the TELNET protocol; Secure Shell () was created to provide a secure way to access remote systems. Furthermore, is an extensible protocol that offers added security features for other protocols.
Room Prerequisites
This room is the last in a group of four rooms about computer networking:
- Networking Concepts
- Networking Essentials
- Networking Core Protocols
- Networking Secure Protocols (this room)
We recommend finishing all the previous three rooms before starting this one.
Learning Objectives
Upon finishing this room, you will learn about:
- SSL/
- How to secure existing plaintext protocols:
- How replaced the plaintext TELNET
- How creates a secure network over an insecure one
Please ensure you have finished the Networking Core Protocols room at minimum.
Ready to learn Cyber Security?
The Networking Secure Protocols room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
