PROTOCOLS
Internet protocols are the rules that
govern the functioning of the internet.
HTTP
• Hyper Text Transfer Protocol
• Hyper means something that can be linked to
another piece of data, within the same
document or to an external document.
HTTPS
• Hyper Text Transfer Protocol Secure
• Padlock in address bar- secure with https
https://www.
Why HTTPS
• The data that is transferred over the internet
is encrypted using this protocol.
Encryption
• Encryption is the process of converting plain
text into a non-understandable format using
some algorithm.
Encryption
• It is a two way function where the data is
encrypted and decrypted for accessibility.
• Algorithms which are used for a secure
transfer of data AES, PGP are used for
symmetric and public key encryption
respectively.
Hashing
• This is one way function
• Used to get a fixed length hash value of any
data provided to the algorithm.
• Hashing algorithms like MD5, SHA-256 are
used to validate the digital signature of the
SSL certificate.
FTP
• File Transfer Protocol: It is used to transfer
files between client and server.
• Allows continuous downloading of files.
• It can be made secure by encrypting the data
using SSL/TLS certificate-FTPS or SFTP- SSH
FTP.
FTP
• Account for restricted access
• Entire website is not accessible
UDP
• User Datagram Protocol. This protocol is a
connectionless protocol.
• It is used for transferring the data with low
latency and loss-tolerating connection such as
live streaming.
For more tutorials and courses please visit:
www.codewizacademy.com

Protocols

  • 1.
  • 2.
    Internet protocols arethe rules that govern the functioning of the internet.
  • 3.
    HTTP • Hyper TextTransfer Protocol • Hyper means something that can be linked to another piece of data, within the same document or to an external document.
  • 4.
    HTTPS • Hyper TextTransfer Protocol Secure • Padlock in address bar- secure with https https://www.
  • 5.
    Why HTTPS • Thedata that is transferred over the internet is encrypted using this protocol.
  • 6.
    Encryption • Encryption isthe process of converting plain text into a non-understandable format using some algorithm.
  • 7.
    Encryption • It isa two way function where the data is encrypted and decrypted for accessibility. • Algorithms which are used for a secure transfer of data AES, PGP are used for symmetric and public key encryption respectively.
  • 8.
    Hashing • This isone way function • Used to get a fixed length hash value of any data provided to the algorithm. • Hashing algorithms like MD5, SHA-256 are used to validate the digital signature of the SSL certificate.
  • 9.
    FTP • File TransferProtocol: It is used to transfer files between client and server. • Allows continuous downloading of files. • It can be made secure by encrypting the data using SSL/TLS certificate-FTPS or SFTP- SSH FTP.
  • 10.
    FTP • Account forrestricted access • Entire website is not accessible
  • 11.
    UDP • User DatagramProtocol. This protocol is a connectionless protocol. • It is used for transferring the data with low latency and loss-tolerating connection such as live streaming.
  • 12.
    For more tutorialsand courses please visit: www.codewizacademy.com