You are on page 1of 9

SECURE

NETWORKING
PROTOCOLS
01 HTTPS
Clear text Clear text

User Encrypted Text Server

Encryption key Decryption key

In Hyper Text Transfer Protocol, the web browser and the


website's server use a secret code to scramble your
communication so that no one else can understand it
02 TLS
1. Hello, Key share
User Server
2.Key share, Certificate verify

3.Get HTTP

4.HTTP Answer

TLS works by encrypting the data that is exchanged


between a server and a client. TLS is like a locked box that
keeps your message safe as it travels across the Internet
03 SSH
1. Connection Initiation
User Server
2. Server Public Key

3. Parameters Negotiation

4. Secure Access to Server

Imagine you have a Locker at school, SSH is like a special


combination lock that only you know. When you use SSH,
you can securely access your locker from anywhere, even if
you're not physically at school
04 VPN
VPN Client

User Internet
Clear text Encrypted

Imagine you have a diary in which you write all your thoughts
and secrets. A VPN is like a secret lock for your diary. It
Encrypts all your internet traffic and keeps your online
activities private
05 IP SEC
User User

IPSEC Tunnel

Encrypted Encrypted

Router Router

Imagine you are having a secret conversation with


your friend, IPsec is like a secret language that is
used to protect your online conversations
06 SMTPS
Sender Receiver

SMTPS

Encrypted Encrypted
Sender Mail Receiver Mail
Server Server

Imagine you want to send an email to your friend. So, you


put the email in a locked box and send it through the mail.
SMTPS is like the special key that your friend uses to
unlock the box
06 SFTP
User Server

SFTP

Encryption Decryption
Router

Imagine you need to send a large file to a friend. SFTP


works by converting the message into a secret code that
only you and the recipient can understand
DID YOU LIKE OUR PLAYBOOK
AND DO YOU NEED MORE?

CHECKLISTS | WHITEPAPERS
TEMPLATES | PLAYBOOKS

FOLLOW US ON

SECURITY & PRIVACY MADE EASY

You might also like