You are on page 1of 5

CYBER SECURITY MASTER PROGRAM

ASSIGNMENT – 4

20 Protocols with Normal and Secure version


Normal
Protocol Version Secured Version

File Transfer Protocol (FTP) FTP FTPS (FTP Secure)

Hypertext Transfer Protocol (HTTP) HTTP HTTPS (HTTP Secure)

Simple Mail Transfer Protocol (SMTP) SMTP SMTPS (SMTP Secure)

Telnet Telnet STelnet (Secure Telnet)

Secure Shell (SSH) SSH SFTP (SSH File Transfer Protocol)

Post Office Protocol (POP) POP POP3S (POP Secure)

Internet Message Access Protocol (IMAP) IMAP IMAPS (IMAP Secure)

Network File System (NFS) NFS NFSv4 Secure (NFSv4.1+)

Remote Procedure Call (RPC) RPC RPC Secure (RPCSEC_GSS)


Lightweight Directory Access Protocol
(LDAP) LDAP LDAPS (LDAP Secure)

Network Time Protocol (NTP) NTP NTP Secure (NTPS)

Domain Name System (DNS) DNS DNS Secure (DNSSEC)


Simple Network Management Protocol
(SNMP) SNMP SNMPv3

Transmission Control Protocol (TCP) TCP TCP with TLS

User Datagram Protocol (UDP) UDP UDP with DTLS


SRTP (Secure Real-time Transport
Real-time Transport Protocol (RTP) RTP Protocol)

Session Initiation Protocol (SIP) SIP SIPS

Secure Instant Messaging (IM) XMPP XMPP over TLS


Datagram Congestion Control Protocol
(DCCP) DCCP DCCP with TLS
Stream Control Transmission Protocol
(SCTP) SCTP SCTP with DTLS

Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Created by : MOHAMMED IZHAAR UL HAQUE
1. File Transfer Protocol (FTP)

FTP is a protocol used to transfer files between two computers. It is a simple and widely used protocol, but it
is also insecure. FTP does not encrypt traffic, so usernames, passwords, and file contents can be easily
intercepted by attackers.

FTPS (FTP Secure)

FTPS is a secured version of FTP that encrypts all traffic. This makes it much more difficult for attackers to
intercept sensitive information. FTPS uses the SSL/TLS protocol to encrypt traffic.

2. Hypertext Transfer Protocol (HTTP)

HTTP is the protocol that is used to transfer web pages and other resources over the internet. It is a stateless
protocol, which means that each request is independent of any previous requests.

HTTPS (HTTP Secure)

HTTPS is a secured version of HTTP that encrypts all traffic. This is essential for protecting sensitive
information, such as credit card numbers and passwords. HTTPS uses the SSL/TLS protocol to encrypt traffic.

3. Simple Mail Transfer Protocol (SMTP)

SMTP is the protocol that is used to send and receive email. It is a simple and widely used protocol, but it is
also insecure. SMTP does not encrypt traffic, so email messages can be easily intercepted by attackers.

SMTPS (SMTP Secure)

SMTPS is a secured version of SMTP that encrypts all traffic. This makes it much more difficult for attackers
to intercept sensitive information. SMTPS uses the SSL/TLS protocol to encrypt traffic.

4. Telnet

Telnet is a protocol that provides remote access to a computer. It is a simple and widely used protocol, but it is
also insecure. Telnet does not encrypt traffic, so usernames, passwords, and command output can be easily
intercepted by attackers.

STelnet (Secure Telnet)

STelnet is a secured version of Telnet that encrypts all traffic. This makes it much more difficult for attackers
to intercept sensitive information. STelnet uses the SSL/TLS protocol to encrypt traffic.

5. Secure Shell (SSH)

SSH is a protocol that provides secure remote access to a computer. It encrypts all traffic, including
usernames, passwords, and command output. This makes it ideal for tasks such as remote administration, file
transfer, and command execution.

SFTP (SSH File Transfer Protocol)

SFTP is a file transfer protocol that is built on top of SSH. It provides a secure way to transfer files between
two computers. SFTP encrypts all traffic, including filenames and file contents.

Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Created by : MOHAMMED IZHAAR UL HAQUE
6. Post Office Protocol (POP)

POP is a protocol that is used to retrieve email messages from a remote server. It is a simple and widely used
protocol, but it is also insecure. POP does not encrypt traffic, so email messages can be easily intercepted by
attackers.

POP3S (POP Secure)

POP3S is a secured version of POP that encrypts all traffic. This makes it much more difficult for attackers to
intercept sensitive information. POP3S uses the SSL/TLS protocol to encrypt traffic.

7. Internet Message Access Protocol (IMAP)

IMAP is a protocol that is used to access email messages on a remote server. It is a more advanced protocol
than POP, and it allows users to view, manage, and delete messages on the server without having to
download them. IMAP is also insecure, as it does not encrypt traffic.

IMAPS (IMAP Secure)

IMAPS is a secured version of IMAP that encrypts all traffic. This makes it much more difficult for attackers to
intercept sensitive information. IMAPS uses the SSL/TLS protocol to encrypt traffic.

8. Network File System (NFS)

NFS is a protocol that allows users to access files on a remote server as if they were stored on their local
computer. It is a simple and widely used protocol, but it is also insecure. NFS does not encrypt traffic, so file
contents can be easily intercepted by attackers.

NFSv4 Secure (NFSv4.1+)

NFSv4 Secure is a secured version of NFS that encrypts all traffic. This makes it much more difficult for
attackers to intercept sensitive information. NFSv4 Secure uses the Kerberos protocol to encrypt traffic.

9. Remote Procedure Call (RPC)

RPC is a protocol that allows users to execute remote procedures on a server. It is a simple and widely used
protocol, but it is also insecure. RPC does not encrypt traffic, so procedure calls and return values can be
easily intercepted by attackers.

RPC Secure (RPCSEC_GSS)

RPCSEC_GSS is a security protocol that is used to secure remote procedure calls (RPCs). It is based on the
Generic Security Service Application Program Interface (GSSAPI), which is a framework for providing security
services to applications. RPCSEC_GSS provides authentication, integrity, and confidentiality for RPCs.

10. Lightweight Directory Access Protocol (LDAP)

LDAP is a protocol that is used to access and manage data in a directory service. It is a simple and widely
used protocol, but it is also insecure. LDAP does not encrypt traffic, so directory data can be easily intercepted
by attackers.

LDAPS (LDAP Secure)

LDAPS is a secured version of LDAP that encrypts all traffic. This makes it much more difficult for attackers to
intercept sensitive information. LDAPS uses the SSL/TLS protocol to encrypt traffic.

Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Created by : MOHAMMED IZHAAR UL HAQUE
11. Network Time Protocol (NTP)

NTP is a protocol that is used to synchronize the clocks of computers on a network. It is a simple and widely
used protocol, but it is also insecure. NTP does not encrypt traffic, so time synchronization messages can be
easily intercepted by attackers.

NTPS (NTP Secure)

NTPS is a secured version of NTP that encrypts all traffic. This makes it much more difficult for attackers to
intercept sensitive information. NTPS uses the SSL/TLS protocol to encrypt traffic.

12. Domain Name System (DNS)

DNS is a protocol that is used to translate domain names into IP addresses. It is a simple and widely used
protocol, but it is also insecure. DNS does not encrypt traffic, so DNS queries and responses can be easily
intercepted by attackers.

DNS Secure (DNSSEC)

DNSSEC is a secured version of DNS that encrypts all traffic and provides authentication and integrity
verification. This makes it much more difficult for attackers to intercept or modify DNS data.

13. Simple Network Management Protocol (SNMP)

SNMP is a protocol that is used to manage and monitor network devices. It is a simple and widely used
protocol, but it is also insecure. SNMP does not encrypt traffic, so SNMP messages can be easily intercepted
by attackers.

SNMPv3

SNMPv3 is a secured version of SNMP that encrypts all traffic and provides authentication and authorization.
This makes it much more difficult for attackers to intercept or modify SNMP data.

14. Transmission Control Protocol (TCP)

TCP is a reliable transport protocol that is used for many different applications, including web browsing, email,
and file transfer. TCP encrypts traffic, but it does not encrypt payload data.

TCP with TLS

TCP with TLS is a secured version of TCP that encrypts all traffic, including payload data. TLS is a
cryptographic protocol that provides authentication, encryption, and integrity verification.

15. User Datagram Protocol (UDP)

UDP is an unreliable transport protocol that is used for many different applications, including streaming video
and audio. UDP does not encrypt traffic.

UDP with DTLS

UDP with DTLS is a secured version of UDP that encrypts all traffic. DTLS is a cryptographic protocol that
provides authentication, encryption, and integrity verification.

Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Created by : MOHAMMED IZHAAR UL HAQUE
16. Real-time Transport Protocol (RTP)

RTP is a protocol that is used for real-time audio and video transmission. It does not encrypt traffic.

SRTP (Secure Real-time Transport Protocol)

SRTP is a secured version of RTP that encrypts all traffic. SRTP uses the SRTP profile of DTLS to provide
authentication, encryption, and integrity verification.

17. Session Initiation Protocol (SIP)

SIP (Session Initiation Protocol) is a protocol that is used to initiate, manage, and terminate VoIP calls. It does
not encrypt traffic.

SIPS

The secure version of the Session Initiation Protocol (SIP) is called SIPS. SIPS stands for Session Initiation
Protocol Secure. It is an extension of the SIP protocol that uses the Transport Layer Security (TLS) protocol to
encrypt SIP messages. This protects SIP messages from eavesdropping, tampering, and man-in-the-middle
attacks.

18. Secure Instant Messaging (XMPP)

XMPP (Extensible Messaging and Presence Protocol) is a protocol that is used for instant messaging. It does
not encrypt traffic.

XMPP over TLS

The secure version of the XMPP protocol is called XMPP over TLS. TLS stands for Transport Layer Security,
and it is a cryptographic protocol that provides authentication, encryption, and integrity protection for network
traffic.

19. Datagram Congestion Control Protocol (DCCP)

DCCP is a transport protocol that is designed for streaming applications. It does not encrypt traffic.

DCCP with TLS

DCCP with TLS is a secured version of DCCP that encrypts all traffic. TLS is a cryptographic protocol that
provides authentication, encryption, and integrity verification.

20. Stream Control Transmission Protocol (SCTP)

SCTP is a transport protocol that is designed for reliable and ordered delivery of data. It does not encrypt
traffic.

SCTP with DTLS

SCTP with DTLS is a secured version of SCTP that encrypts all traffic. DTLS is a cryptographic protocol that
provides authentication, encryption, and integrity verification.

Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Created by : MOHAMMED IZHAAR UL HAQUE

You might also like