Monday, October 28, 2019

Network Security Protocols and Technologies

SMTP
DHCP
DNS
MD5

Choose four (4) protocols and discuss its details and importance in network security. Research how they aid network security.

SMTP

  • Simple Mail Transfer Protocol
  • Used to send and receive email
  • Due to its ability to queue the messages at the receiving end, this protocols usually used with one of two other protocols: Post Office Protocol (POP3), and Internet Message Access Protocol (IMAP). These will let the user to save messages in a server mailbox and download them periodically
  • Typically, users use a program that uses SMTP to send email, and POP3 or IMAP use to receive email.
How it works?

Importance:
It verifies the configuration of the computer from the email that is being sent and grants the permission for the process. It sends out the message and follow the successful delivery of the email. 

DHCP 
  • Dynamic Host Configuration Protocol
  • It is a network management protocol that is used to assign an IP address to any of the new node entering the network
  • It permits the node to be configured automatically, and it avoid the necessity of involvement by a network administrator
  • DHCP is also known as RFC 2131
  • It does:
  1. Manages the provision of the added nodes or even dropped by the network
  2. Maintains the IP address of the host by using the DHCP server

How it works?

Importance:
The DHCP reduces the amount of work that is required for the large network administration by eliminating the need to individually configure, and manage the IP address for every machine. And the administration is done in a single point

DNS
  • Domain Name System
  • It connects the URLs with their IP address
  • With DNS, it is possible to type the words rather than a string of numbers into a browser
  • When a user search for a domain names in the browser, it will sends a query to the internet to match the domain with the corresponding IP. 
  • Once it is already matches, it uses the IP to retrieve the content of the website
How it works?


Importance:
Can increase the internet security, especially for organizations where hacking can always occur because they are handling with sensitive data for the clients. The organizations need proper security controls to protect the data, they can use DNS servers. 

MD5
  • Known as cryptographic has algorithm 
  • Produces hash value in a hexadecimal format
  • Competes with other designs where hash functions take certain data and change it to provide a value that will be used in the place of the original value
How it works?
Importance:






References:

WhatIs.com. (2019). What is SMTP (Simple Mail Transfer Protocol)? - Definition from WhatIs.com. [online] Available at: https://whatis.techtarget.com/definition/SMTP-Simple-Mail-Transfer-Protocol [Accessed 23 Oct. 2019].


Techopedia.com. (2019). What is DHCP? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/11337/dynamic-host-configuration-protocol-dhcp [Accessed 23 Oct. 2019].


Namecheap.com. (2019). What is DNS? | DNS Definition | Namecheap . [online] Available at: https://www.namecheap.com/dns/what-is-dns-domain-name-system-definition/ [Accessed 23 Oct. 2019].


Webdevelopersnotes.com. (2019). What is SMTP - definition, function, importance and usage. [online] Available at: https://www.webdevelopersnotes.com/what-is-smtp [Accessed 23 Oct. 2019].


Techopedia.com. (2019). What is MD5? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/4022/md5 [Accessed 28 Oct. 2019].


TinyDNS.org. (2019). DNS Server: What Are They? Why Are They Used? Why Are They Important? - TinyDNS.org. [online] Available at: https://tinydns.org/dns-server/ [Accessed 28 Oct. 2019].


Slideshare.net. (2019). E-DHCP. [online] Available at: https://www.slideshare.net/ahmadtaweel2/edhcp [Accessed 29 Oct. 2019].

1 comment:

  1. I am so much excited after reading your blog. Your blog is very much innovative and much helpful for any industry as well as in person.
    NFFI

    ReplyDelete

CRP - Key Considerations for Research

Determine the key considerations are for planning and undertaking research Issues that can be encountered in research  poor time mana...