SlideShare a Scribd company logo
1 of 15
By- Nandini Raj
Inderprastha
Engineering College
What is Network Security?
•securing the computer networks of the
organizations against various type of threats and
attacks
•measures taken to control and monitor network
resources and services running on the computer
network.
Types of Attacks:
•Interruption: Denying service to legitimate users.
These are attacks on system Availability.
•Interception: Unauthorized user gaining access to a
service. This is an attack on Confidentiality.
•Modification: Unauthorized access and tampering of
data. This is an attack on Integrity.
•Fabrication: This means creation of wrong or
counterfeit data. This is an attack on Authenticity.
Stages of an Attack
• Initial Information Gathering: eg: domain name of a company’s
website, name of machines, IP addresses and ranges etc.
• Network Probe: by pinging at the various systems to see which
systems are alive. a port scanning tool which can assess which ports
are unused in an organization’s server and to which ports connections
can be made.
• Gaining Unauthorized Access : attacker tries to gain root or
administrator access by guessing passwords and if he gets root access
he can install other softwares and services.
Continued…
• Capturing the Network: by installing various hacking tools in
the system. These tools further attack other systems in the
network.
• Grabbing/Destroying data: confidential information about
the organization including customer profiles, credit card nos.
and the attacker can easily destroy files or misuse the
information.
Different types of Attacks:
•IP Spoofing
•DoS Attacks
•Network Packet
Sniffers
•Password Attacks
•Man-in-the-
middle Attacks
Network Security – Intrusion Detection
Systems(IDS)
• hardware/software that monitors and analyses
computers and network activities for any event that
may suggest an intrusion by an unauthorized person
or an attacker.
• reports them in form of alerts in real-time for the
network administrators to take corrective action.
Concepts of IDS
•Knowledge-Based IDS: uses previous knowledge about attacks
also known as signatures stored in databases to detect and
report current attempts of intrusion.
•Advantage : false alarm rates are low
•Disadvantage: require much more resources for database
storage.
•Behaviour-Based IDS: monitors the behaviour of users or
analyses user patterns in order to detect any anomaly(unusual
behaviour) to identify any intrusion. For example: the amount of
data currently being uploaded/downloaded in the network,
protocols being used etc.
• Advantage: new kind of vulnerability can be detected
• Disadvantage: high false alarm rate.
Virtual Private Networks(VPN)
• is a network of virtual channels or circuits that
provides a secure medium of sending data over public
or unsecured network like the Internet.
• allows a trusted network to communicate with
another trusted network over untrusted public
networks.
• used to extend the internal private network of an
organization to the external network or different
geographical locations.
VPN Protocols
• SSL Protocol: SSL stands for Secure Sockets Layer. It is a protocol that provides
confidentiality and authentication of data which is being sent through the
encrypted channel. This protocol mainly consists of three sub-protocols:
• Handshake Protocol: In this phase, both the client and server on either sides
first establish cryptographic capabilities and the key to be used for actual
encryption later on. This is done by using same algorithms on both sides.
Also the Server is authenticated using digital certificates and client
authentication is optional.
• Record protocol: In this sub-phase, the data is encrypted using the key
decided in the above phase and sent between the client and the Server.
• Alert protocol: In case of any error or any problem in transmission, both
sided can alert each other by special error messages.
IPSec Protocol:
Stands for Internet protocol Security and is a protocol that provides authentication,
confidentiality of data by encrypting the IP packets. It contains sub protocols:
• Internet Key Exchange Protocol: used for negotiating the keys and algorithms that
will be used later on in other sub protocols. Diffie-Hellman algorithm which is used
for key agreement between two parties for Symmetric cryptography.
• Authentication Header Protocol: This sub protocol works in two modes:
• Transport Mode: In this mode the IP packet which contains three parts: IP header,
TCP header and Data part – out of these the TCP header and Data parts are used for
creating a hash like authentication code using algorithms decided earlier and this is
known as the AH header. The AH header is inserted in between the IP header and
the TCP header. Used for Host-to-Host VPNs.
• Tunnel Mode: In tunnel mode a new IP header is created and the entire packet is
used for creating hash. In the final packet AH header is inserted in between the New
IP header and the Old IP header. The tunnel mode is used for Site-to-Site VPNs.
Continued:
• Encapsulating Security Payload Protocol: This sub protocol ensures
confidentiality by encrypting the contents of the packets received after AH
protocol has finished its job and a ESP header is added to the packet. The
packet is then sent through the communication channel. This sub protocol
works in two modes:
• Transport Mode: In this mode the IP packet which contains three parts-IP
header, TCP header and Data part – out of these the TCP header and Data
parts are encrypted using algorithms and key decided earlier and a new
header called the ESP header is inserted in between the IP header and the
TCP header. The Transport mode is used for Host-to-Host VPNs.
• Tunnel Mode: In tunnel mode a new IP header is created and the entire
packet is encrypted. In the final packet ESP header is inserted in between the
New IP header and the Old IP header. The tunnel mode is used for Site-to-
Site VPNs.
BEST DEFENSE
IS GOOD
OFFENCE!!
THANK YOU!!

More Related Content

What's hot

What's hot (20)

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Firewall
Firewall Firewall
Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Ppt
PptPpt
Ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network securityNetwork security
Network security
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityComputing Cage
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
 
Penalty enforcement & 10 second runoff
Penalty enforcement  & 10 second runoff Penalty enforcement  & 10 second runoff
Penalty enforcement & 10 second runoff drs8418
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Viewers also liked (17)

Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
 
Penalty enforcement & 10 second runoff
Penalty enforcement  & 10 second runoff Penalty enforcement  & 10 second runoff
Penalty enforcement & 10 second runoff
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network securityNetwork security
Network security
 
Networking
NetworkingNetworking
Networking
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar to Network security

Similar to Network security (20)

Network defenses
Network defensesNetwork defenses
Network defenses
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Ids
IdsIds
Ids
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Network scan
Network scanNetwork scan
Network scan
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Unit08
Unit08Unit08
Unit08
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
ICMP
ICMP ICMP
ICMP
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 

Network security

  • 2. What is Network Security? •securing the computer networks of the organizations against various type of threats and attacks •measures taken to control and monitor network resources and services running on the computer network.
  • 3. Types of Attacks: •Interruption: Denying service to legitimate users. These are attacks on system Availability. •Interception: Unauthorized user gaining access to a service. This is an attack on Confidentiality. •Modification: Unauthorized access and tampering of data. This is an attack on Integrity. •Fabrication: This means creation of wrong or counterfeit data. This is an attack on Authenticity.
  • 4. Stages of an Attack • Initial Information Gathering: eg: domain name of a company’s website, name of machines, IP addresses and ranges etc. • Network Probe: by pinging at the various systems to see which systems are alive. a port scanning tool which can assess which ports are unused in an organization’s server and to which ports connections can be made. • Gaining Unauthorized Access : attacker tries to gain root or administrator access by guessing passwords and if he gets root access he can install other softwares and services.
  • 5. Continued… • Capturing the Network: by installing various hacking tools in the system. These tools further attack other systems in the network. • Grabbing/Destroying data: confidential information about the organization including customer profiles, credit card nos. and the attacker can easily destroy files or misuse the information.
  • 6. Different types of Attacks: •IP Spoofing •DoS Attacks •Network Packet Sniffers •Password Attacks •Man-in-the- middle Attacks
  • 7. Network Security – Intrusion Detection Systems(IDS) • hardware/software that monitors and analyses computers and network activities for any event that may suggest an intrusion by an unauthorized person or an attacker. • reports them in form of alerts in real-time for the network administrators to take corrective action.
  • 8.
  • 9. Concepts of IDS •Knowledge-Based IDS: uses previous knowledge about attacks also known as signatures stored in databases to detect and report current attempts of intrusion. •Advantage : false alarm rates are low •Disadvantage: require much more resources for database storage. •Behaviour-Based IDS: monitors the behaviour of users or analyses user patterns in order to detect any anomaly(unusual behaviour) to identify any intrusion. For example: the amount of data currently being uploaded/downloaded in the network, protocols being used etc. • Advantage: new kind of vulnerability can be detected • Disadvantage: high false alarm rate.
  • 10. Virtual Private Networks(VPN) • is a network of virtual channels or circuits that provides a secure medium of sending data over public or unsecured network like the Internet. • allows a trusted network to communicate with another trusted network over untrusted public networks. • used to extend the internal private network of an organization to the external network or different geographical locations.
  • 11. VPN Protocols • SSL Protocol: SSL stands for Secure Sockets Layer. It is a protocol that provides confidentiality and authentication of data which is being sent through the encrypted channel. This protocol mainly consists of three sub-protocols: • Handshake Protocol: In this phase, both the client and server on either sides first establish cryptographic capabilities and the key to be used for actual encryption later on. This is done by using same algorithms on both sides. Also the Server is authenticated using digital certificates and client authentication is optional. • Record protocol: In this sub-phase, the data is encrypted using the key decided in the above phase and sent between the client and the Server. • Alert protocol: In case of any error or any problem in transmission, both sided can alert each other by special error messages.
  • 12. IPSec Protocol: Stands for Internet protocol Security and is a protocol that provides authentication, confidentiality of data by encrypting the IP packets. It contains sub protocols: • Internet Key Exchange Protocol: used for negotiating the keys and algorithms that will be used later on in other sub protocols. Diffie-Hellman algorithm which is used for key agreement between two parties for Symmetric cryptography. • Authentication Header Protocol: This sub protocol works in two modes: • Transport Mode: In this mode the IP packet which contains three parts: IP header, TCP header and Data part – out of these the TCP header and Data parts are used for creating a hash like authentication code using algorithms decided earlier and this is known as the AH header. The AH header is inserted in between the IP header and the TCP header. Used for Host-to-Host VPNs. • Tunnel Mode: In tunnel mode a new IP header is created and the entire packet is used for creating hash. In the final packet AH header is inserted in between the New IP header and the Old IP header. The tunnel mode is used for Site-to-Site VPNs.
  • 13. Continued: • Encapsulating Security Payload Protocol: This sub protocol ensures confidentiality by encrypting the contents of the packets received after AH protocol has finished its job and a ESP header is added to the packet. The packet is then sent through the communication channel. This sub protocol works in two modes: • Transport Mode: In this mode the IP packet which contains three parts-IP header, TCP header and Data part – out of these the TCP header and Data parts are encrypted using algorithms and key decided earlier and a new header called the ESP header is inserted in between the IP header and the TCP header. The Transport mode is used for Host-to-Host VPNs. • Tunnel Mode: In tunnel mode a new IP header is created and the entire packet is encrypted. In the final packet ESP header is inserted in between the New IP header and the Old IP header. The tunnel mode is used for Site-to- Site VPNs.