Network Security Protocols Study Cards

Enhance Your Learning with Network Security Protocols Flash Cards for quick learning



Network Security

The practice of protecting computer networks and their data from unauthorized access, misuse, or attacks.

Encryption

The process of converting plaintext into ciphertext to protect sensitive information from unauthorized access.

Authentication

The process of verifying the identity of a user, device, or system to ensure that only authorized entities can access resources.

Secure Socket Layer (SSL)

A cryptographic protocol that provides secure communication over a computer network, commonly used for securing web traffic.

Transport Layer Security (TLS)

A cryptographic protocol that provides secure communication over a computer network, commonly used for securing web traffic.

Internet Protocol Security (IPsec)

A protocol suite used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet.

Secure Shell (SSH)

A cryptographic network protocol that provides secure remote login, secure file transfer, and secure tunneling capabilities.

Pretty Good Privacy (PGP)

A data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.

Kerberos

A network authentication protocol that uses symmetric key cryptography to provide secure communication over a non-secure network.

Secure File Transfer Protocol (SFTP)

A network protocol that provides secure file access, file transfer, and file management functionalities over a reliable data stream.

Secure Multipurpose Internet Mail Extensions (S/MIME)

A standard for public key encryption and signing of MIME data, commonly used to secure email communication.

Secure Hypertext Transfer Protocol (HTTPS)

A secure version of the Hypertext Transfer Protocol (HTTP) that uses encryption to protect the integrity and confidentiality of data exchanged between a client and a server.

Secure Real-time Transport Protocol (SRTP)

A security profile for the Real-time Transport Protocol (RTP) used in VoIP communications to provide encryption, message authentication, and integrity.

Secure Copy (SCP)

A network protocol that provides secure file transfer between a local and a remote host, based on the Secure Shell (SSH) protocol.

Secure Remote Procedure Call (SRPC)

A protocol that allows a computer program to request services from a remote server securely, preventing unauthorized access and data tampering.

Secure Electronic Transaction (SET)

A protocol standard for securing credit card transactions over insecure networks, providing confidentiality, integrity, and authentication.

Secure Sockets Layer (SSL)

A cryptographic protocol that provides secure communication over a computer network, commonly used for securing web traffic.