Secure Socket Layer (SSL) in the Network and Web Security Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Dec 14th, 2023

Security controls are a set of measures that aim to reduce the risk of information theft on various media and in various forms. Security controls are necessary to overcome cyberthreats, which usually consist of theft of personal information or confidential protocols. Cybersecurity consists of creating tracking systems and preventive actions that are designed to increase the security of data storage or transmission. For example, secure communication protocols allow users to reduce the information load and noise that is potentially stolen. Protocols such as WAP or HTTP are ways to transfer information through the use of cryptographic protocols SSL and TLS. Specifically SSL and TLS are virtual or digital signature tools that authenticate sites or news pages. These certificates guarantee to the user that the connection is secure and allow the data to be transmitted (Dastres & Soori, 2020). In case of an insecure connection according to the protocols, the user receives a notification and personally decides whether to send the information to the site without security guarantees.

We will write a custom essay on your topic a custom Essay on Secure Socket Layer (SSL) in the Network and Web Security
808 writers online

Cryptographic means of information protection allow more than others the elimination of threats in the process of data transmission. During encryption each character of the document, transmitted through a communication channel, is subject to coding, and the information itself, which needs to be protected, is divided into separate blocks, each of which is replaced by a code: alphabetic, numeric or combined. Such encryption methods as permutation, replacement, analytical transformation and gamming are also widely used.

Regarding information security, attention should be paid to the problems with VPNs. VPN refers to technologies implemented through one or more network connections over other networks. The use of technology is often associated with the need to access those sites or applications whose servers are blocked by someone else. For example, in Vietnam, Facebook is blocked at the state level and can only be accessed through a VPN. In this case, a VPN helps create a connection supposedly from another country, allowing the user from Vietnam to use the messenger.

Among the apparent pluses of using a VPN are the possibilities of personal traffic encryption and secure transmission of information over the Internet. In addition, the VPN brings the user closer to almost anonymous work because the transmission is encrypted, and there is an opportunity to connect to remote servers. Nevertheless, VPNs have disadvantages, which are repeatedly criticized and brought up for discussion. First, as VPNs evolve, so do hacker technologies and unique remote download codes that undermine previously secure additional protocols. Second, VPNs are an accessible and broad format for overcoming insecure connections. Attackers are highly likely to steal information because they are connected to the same service. Thirdly, there is the notion of a passive hijacking attack, which allows one to identify visited sites and consequently have data about the IP addresses of VPN users.

I found the content of Bansode and Girdhar’s (2021) article valuable and interesting because they link the increase in threats from VPN use to the effects of the pandemic. According to them, the pandemic has led to a significant increase in people using VPNs, so ways to circumvent this technology have also evolved. They point out that COVID-19 has led to more businesses using shared corporate VPN networks with more clients. Consequently, the risk of corporate data leakage has increased, so Bansode and Girdhar (2021) recommend updating VPN hardware with the latest Firmware and blocking unused services (6). The article provides insight into the relationship between security controls, secure protocols used, and threats from VPN technologies, thereby improving the overall perception of cybersecurity.

References

Bansode, R., & Girdhar, A. (2021). . Journal of Physics: Conference Series, 1714. Web.

Dastres, R., & Soori, M. (2020). . International Journal of Computer and Information Engineering, WASET, In press, 14 (10), 330-333. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Print
Need an custom research paper on Secure Socket Layer (SSL) in the Network and Web Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, December 14). Secure Socket Layer (SSL) in the Network and Web Security. https://ivypanda.com/essays/secure-socket-layer-ssl-in-the-network-and-web-security/

Work Cited

"Secure Socket Layer (SSL) in the Network and Web Security." IvyPanda, 14 Dec. 2023, ivypanda.com/essays/secure-socket-layer-ssl-in-the-network-and-web-security/.

References

IvyPanda. (2023) 'Secure Socket Layer (SSL) in the Network and Web Security'. 14 December.

References

IvyPanda. 2023. "Secure Socket Layer (SSL) in the Network and Web Security." December 14, 2023. https://ivypanda.com/essays/secure-socket-layer-ssl-in-the-network-and-web-security/.

1. IvyPanda. "Secure Socket Layer (SSL) in the Network and Web Security." December 14, 2023. https://ivypanda.com/essays/secure-socket-layer-ssl-in-the-network-and-web-security/.


Bibliography


IvyPanda. "Secure Socket Layer (SSL) in the Network and Web Security." December 14, 2023. https://ivypanda.com/essays/secure-socket-layer-ssl-in-the-network-and-web-security/.

Powered by CiteTotal, automatic citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1