Many protocols secure your data or information over the internet. Due to emerging a number of hacking activities, it is required keeping a security protocol for your server, network, or website. Below are some protocols that are used for different purposes.
HTTPS protocol is used for the protection of internet traffic, it assures about the data integrity and data protection. An outsider cannot intercept the data that transmitted via HTTPS. SSL Protocol establishes a secure connection between two servers or a customer’s browser and the company’s web server. In SSL protocol, two keys (symmetric and asymmetric) works to encrypt and decrypt the message. SSL is based on integrity and authenticity that boost the confidence of a customer. For authenticity and integrity there is a short piece of information called MAC (Message Authentication Code) that is used to authenticate a message. In MAC, both sender and receiver use the same key to initiate the communication.
Firewall is a renowned technology that is used to protect online information. In E-commerce, firewall is used to protect E-commerce components such as Internet Payment Gateway, Server Based Wallet, and Payment Server.
Most firewalls can be divided into three categories:
- Packet filter (without memory);
- Filter circuit level;
- Application-layer filters.
Packet filtering blocks or passes data packets as they pass through a network interface,which include IP-address and port numbers and destination.This type of firewall is the easiest to implement and maintain, and almost no effect on network performance but its protection level is very low.
Filter Circuit level is an intermediate between the packet filter and application layer. Filter circuit-level monitors handshake (handshake) between the authorized client and the external host that determines whether the requested session is valid.Information delivered to a remote computer over a circuit level gateway seems to have originated from the gateway; such it hides the information on protected networks. Such circuit level is inexpensive and suitable for protecting private network. It does not filter individual packets.
Application-level filters provide a high degree of protection, but it is expensive and can increase complexity. Such filters are implemented as a dedicated firewall. The server application is located on a private network behind a firewall. In fact, the client cannot find the application proxy (proxy application server) with the firewall. In contrast to the filter circuit level, application-level intermediaries allow only packets that they were assigned to work. Application-level intermediaries check the contents of each packet passing through the gateway.
It encrypts data at the network level that consists of three protocols: Authentication Header, Encapsulating Secure Payload (ESP), and Internet Key Exchange (IKE).
- The Authentication Header provides data origin authentication, data integrity, and protection from the burden of repeated messages. The AH protocol authenticates every packet, which makes ineffective the program, and tries to seize control of the session.
- ESP offers validation and integrity for the payload and not for the IP header.ESP protocol provides encryption of data streams. It uses SHA and MD5 standard algorithms.
- IKE protocol solves the problem of key distribution protocol based on Diffie-Hellman. It establishes security association (SA) in the IPsec. It uses DNS and a Diffie-Hellman key exchange to establish a shared secret session.
IPSec has spread in two main configurations. First configuration carries Network Layer Protocol that uses for data transfer between gateways for local networks that support IPv4 for unencrypted transmission of network. Second configuration is for closing the data within the network, for that all the jobs and the web server must support the protocol IPSec. Today, most modern operating systems (Windows 2000, Linux, and Solaris) protocol supports IPSec.
If we talk about PCT (Private Communication Technology), it works same as SSL. The main difference between PCT and SSL is the message size. PCT has a smaller set of message compared to SSL.PCT supports algorithms RSA, Diffie-Hellman, Fortezza key management; DES, RC2 and RC4 – data encryption; DSA and RSA – for digital signature.PCT is implemented in Microsoft Internet Explorer version 3 and above, as well as Microsoft Internet Information Server version 2 and above. PCT has more options in the negotiation of an algorithm and data formats. While authenticating and encrypting the message, it requires two separate key in PCT. However, in SSL both need a single key.
As you can see
There are emerging risks for online threats and server vulnerability that can damage your network or can steal your data. Either firewall, HTTPS, or IPSec warn about possible violations of security. However, PCT has been replaced by SSLv3 and TLS (Transport Layer Security). Today if we see, SSLv3 is the best security used for server, network, and browser security and many organizations, institutes and corporate have started to adopt SSL technology. Even social media and giant search engines have taken a step in the direction of protecting their business with SSL.