Home » » Protocols and Standards in Cybersecurity

Protocols and Standards in Cybersecurity

Protocols and Standards in Cybersecurity

Cybersecurity is the practice of protecting information systems, networks, and data from unauthorized access, use, modification, or destruction. Cybersecurity is essential for ensuring the confidentiality, integrity, and availability of information and services in the digital world. However, cybersecurity is not a simple task, as cyber threats are constantly evolving and becoming more sophisticated. Therefore, cybersecurity requires the use of various protocols and standards to establish common rules, guidelines, best practices, and technical specifications for securing different aspects of cyberspace.

Protocols are sets of rules or procedures that define how different entities communicate or interact with each other. Protocols can be applied at different layers of the network stack, such as the physical, data link, network, transport, session, presentation, or application layer. Protocols can also be classified into different types, such as routing protocols, encryption protocols, authentication protocols, or key exchange protocols. Some examples of protocols used in cybersecurity are:

  • Hypertext Transfer Protocol Secure (HTTPS): This is an extension of the Hypertext Transfer Protocol (HTTP), which is the standard protocol for transferring data over the web. HTTPS adds an extra layer of security by encrypting the data exchanged between the web browser and the web server using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) protocols. HTTPS helps prevent eavesdropping, tampering, or spoofing of web traffic.
  • Internet Protocol Security (IPsec): This is a suite of protocols that provides security at the network layer by encrypting and authenticating the IP packets exchanged between two or more hosts or networks. IPsec supports two modes of operation: transport mode and tunnel mode. In transport mode, IPsec only protects the payload of the IP packet, while in tunnel mode, IPsec encapsulates the entire IP packet into a new IP packet with a new header. IPsec helps protect data from interception, modification, or replay attacks.
  • Secure Shell (SSH): This is a protocol that provides secure remote access to a host or a network device over an unsecured network. SSH uses public-key cryptography to authenticate the user and the host, and symmetric-key cryptography to encrypt the data transmitted between them. SSH also supports various features such as port forwarding, file transfer, or command execution. SSH helps prevent unauthorized access, disclosure, or modification of data or commands.
  • Kerberos: This is a protocol that provides authentication and authorization services for distributed systems. Kerberos uses a trusted third party called the Key Distribution Center (KDC), which consists of two components: the Authentication Server (AS) and the Ticket Granting Server (TGS). Kerberos works as follows: when a user wants to access a service on a server, the user first requests a ticket from the AS using its username and password. The AS verifies the user’s identity and sends back a ticket-granting ticket (TGT) encrypted with the user’s secret key. The user then requests a service ticket from the TGS using the TGT. The TGS validates the TGT and sends back a service ticket encrypted with the server’s secret key. The user then presents the service ticket to the server to access the service. The server verifies the service ticket and grants access to the user. Kerberos helps prevent impersonation, replay, or man-in-the-middle attacks.

Standards are documents that define specifications, requirements, guidelines, or characteristics that can be used consistently to ensure that products, processes, or services are fit for their purpose. Standards can be developed by various organizations, such as national or international standards bodies, industry associations, or professional societies. Standards can also be classified into different types, such as technical standards, quality standards, or management standards. Some examples of standards used in cybersecurity are:

  • National Institute of Standards and Technology (NIST): This is a federal agency within the U.S. Department of Commerce that develops and publishes standards, guidelines, best practices, and other resources for cybersecurity. NIST standards cover various topics such as cryptography1, risk management2, identity and access management2, privacy engineering2, securing emerging technologies2, trustworthy networks2, and trustworthy platforms2. NIST also develops frameworks such as the Cybersecurity Framework2, which provides a common language and approach for managing cybersecurity risk across different sectors and organizations.
  • International Organization for Standardization (ISO): This is an international standards body that develops and publishes standards for various fields and industries. ISO standards related to cybersecurity include ISO/IEC 27000 series, which provides guidelines for information security management systems; ISO/IEC 27032, which provides guidelines for cybersecurity; ISO/IEC 27034, which provides guidelines for application security; ISO/IEC 27035, which provides guidelines for incident management; and ISO/IEC 29100, which provides a framework for privacy by design.
  • Institute of Electrical and Electronics Engineers (IEEE): This is a professional association that develops and publishes standards for various fields of engineering and technology. IEEE standards related to cybersecurity include IEEE 802.1X, which provides a protocol for port-based network access control; IEEE 802.11i, which provides a protocol for wireless LAN security; IEEE 1619, which provides a standard for cryptographic protection of data on block-oriented storage devices; and IEEE 2600, which provides a standard for security requirements for hardcopy devices.

The use of protocols and standards in cybersecurity is crucial for ensuring the interoperability, compatibility, reliability, and quality of products, systems, processes, and services in the cyberspace. Protocols and standards also help establish common criteria, benchmarks, and best practices for evaluating, testing, and auditing the security performance and compliance of different entities. Moreover, protocols and standards help foster innovation, collaboration, and trust among different stakeholders in the cybersecurity ecosystem.

0 comments:

Post a Comment

Office/Basic Computer Course

MS Word
MS Excel
MS PowerPoint
Bangla Typing, English Typing
Email and Internet

Duration: 2 months (4 days a week)
Sun+Mon+Tue+Wed

Course Fee: 4,500/-

Graphic Design Course

Adobe Photoshop
Adobe Illustrator

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 8,500/-

Web Design Course

HTML 5
CSS 3

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 8,500/-

Video Editing Course

Adobe Premiere Pro

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 9,500/-

Digital Marketing Course

Facebook, YouTube, Instagram, SEO, Google Ads, Email Marketing

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 12,500/-

Advanced Excel

VLOOKUP, HLOOKUP, Advanced Functions and many more...

Duration: 2 months (2 days a week)
Fri+Sat

Course Fee: 6,500/-

Class Time

Morning to Noon

1st Batch: 08:00-09:30 AM

2nd Batch: 09:30-11:00 AM

3rd Batch: 11:00-12:30 PM

4th Batch: 12:30-02:00 PM

Afternoon to Night

5th Batch: 04:00-05:30 PM

6th Batch: 05:30-07:00 PM

7th Batch: 07:00-08:30 PM

8th Batch: 08:30-10:00 PM

Contact:

Alamin Computer Training Center

796, West Kazipara Bus Stand,

West side of Metro Rail Pillar No. 288

Kazipara, Mirpur, Dhaka-1216

Mobile: 01785 474 006

Email: alamincomputer1216@gmail.com

Facebook: www.facebook.com/ac01785474006

Blog: alamincomputertc.blogspot.com

Contact form

Name

Email *

Message *