logo

Hypertext Transfer Protocol Research Paper 2022

   

Added on  2022-10-04

13 Pages3604 Words26 Views
Running head: Https Internet protocol 1
Hypertext Transfer protocol.
Student name
Institution
Location
Lecture’s Name
Date
Hypertext Transfer Protocol Research Paper 2022_1
Https internet protocol 2
Abstract
In this paper, a formal analysis of modern security protocols in computer networking is
presented. Daily advancement in technology and increased use of internet has brought in
cyberbullying, this has created the need to implement https. Https provides security of data by
ensuring that you are using a secure website. On a secure website, cyberbullying will not be
possible because all data will be encrypted and will need decryption before data is read and
edited.This paper describes how HTTP is better protocol that others in network security and also
present its drawbacks.
Hypertext Transfer Protocol Research Paper 2022_2
Https internet protocol 2
Table of content.
Contents
Abstract............................................................................................................................................2
Table of content...............................................................................................................................2
Contents...........................................................................................................................................2
1.0 Introduction................................................................................................................................3
2.0 Hypertext Transfer protocol secure (https)................................................................................4
2.1 The working of https over the network..................................................................................4
2.2 Why Https..................................................................................................................................5
1. How to get Https............................................................................................................6
2.3 How does Secure socket layer work?....................................................................................7
2. The Real Data transfer...................................................................................................7
2.4 Pubic key infrastructure.........................................................................................................7
2.5 Importance of https................................................................................................................8
3. Differences between Http and Https.............................................................................9
2.6 Tips of knowing if you are in a secure website.....................................................................9
2.5 Disadvantages of Hypertext transfer protocol secure..........................................................10
3.0 Conclusion...............................................................................................................................10
4.0 References................................................................................................................................12
Hypertext Transfer Protocol Research Paper 2022_3
Https internet protocol 2
1.0 Introduction
Network security is a vital area of cybersecurity because as technology advances, there is
increase in cyberbullying. This can be controlled by employing different security techniques on
the internet. Internet protocols are among these rules that ensure security and integrity of moving
data over the network, they are made in a way that they do not allow users, applications, and
servers that are not authorized to access the data in the network. Internet protocols are grouped
into different categories which include; mailing protocols and messaging protocols. Some of
these protocols are hypertext transfer protocol (Http), hypertext transfer protocol secure (Https),
Secure socket layer (SSL), Transport layer security protocol (TLS) and File transfer protocol
(FTP). Sethi & Sarangi. (2017). Each protocol has its own areas of application. It is important to
know all these protocols so as to select the best protocol to use.
2.0 Hypertext Transfer protocol secure (https).
This is the secure version of the hypertext transfer protocol. The ‘S' letter is what brings in the
security concept. The Http sends data in HTML format. It employs encryption of HTML texts
between the devices and only the devices involved can do the decryption. This protocol is
applied to the application layer to ensure that data transfer over a network is secured. Http sends
data in the form of clear text, example abc@gmail.com is sent as abc@gmail.com. In this case,
Https is employed to ensure that very critical information like money transactions from the bank
is secured. This is done through data encryption Gundamaraju, Venkatraman & Galecki. (2017).
Encryption is the process by which data is changed from a readable format to a format that its
meaning cannot be understood directly. For the user to access this information, he must decrypt
the information using a given decryption key. Anybody who doesn’t know these keys cannot
access the information. The purpose of encryption in this protocol is to ensure integrity,
confidentiality, and identity of information over the network. Some information is more
important in that the owners are afraid of getting accessed by the third party.
2.1 The working of https over the network
Https works with the features of the HTTP protocol. Http enables the client computer to access
the resources over the internet because it is a protocol that works on the world wide web
(WWW); it comes in after the cryptography layer is brought in. This layer contains SSL (Secure
Hypertext Transfer Protocol Research Paper 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Document on Network and Security
|20
|6226
|54

Enhancing Cyber Security with VPN, SSL and Digital Signatures
|10
|1977
|395

CVE-2014-3566- Executive Summary
|3
|1049
|439

Network Security in SSL Communication
|12
|1639
|396

TCP/IP Network Communication Essay
|19
|5253
|130

Questions & Answers on Symmetric Block Cipher and Encryption Process
|12
|2956
|64