Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.3.2 - Coggle Diagram
1.3.2
Encryption
- Data is translated into a code that needs a specific decryption key to access.
- Secures data sent over a a network which limits the effectiveness of data interception attacks.
- Secures data stored on the network which limits the effectiveness of SQL injection
-
-
Key - sequence of letters, numbers and other characters used to encrypt or decrypt
-
-
-
-
Protocols and layers
Protocol - special set of rules that end points in a telecommunication connection use when they communicate
Network standard - a set of agreed requirements for hardware and software that allows different manufacturers to make compatible products.
A network layer - a division of network functionality. This is where jobs/processes are split up
Post office protocol (POP) - retrieves emails from the server which deletes the email after you have downloaded it.
-
-
Hyper text transfer protocol secure (HTTPS) - encrypts website information sent and retrieved for security
-
File transfer protocol (FTP) - accesses, edits and moves files between devices on a network
Transmission control protocol (TCP) - sets rules for how devices connect to a network. Splits and reassembles data packets. Checks their sent and delivered.
Instant messaging access protocol (IMAP) - retrieves emails from a server which holds it until you delete it.
Advantages of network layers:
- reduces complexity of the problem because the problem is broken down into smaller more manageable parts e.g. facilitates modular engineering
- layers can be updated/repaired/modified etc. without affecting other layers
- interoperability - layers allow different vendors and systems to work with each other