Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Network security protocols form the backbone of every secure digital interaction you'll encounter—from logging into a remote server to browsing a website to sending encrypted email. You're being tested on your ability to understand where these protocols operate in the network stack, how they achieve confidentiality, integrity, and authentication, and why certain protocols are chosen for specific use cases. These concepts connect directly to broader themes in cryptography: symmetric vs. asymmetric encryption, key exchange mechanisms, digital signatures, and the CIA triad (confidentiality, integrity, availability).
When exam questions ask about network security, they're rarely looking for simple definitions. Instead, you'll need to compare protocols operating at different layers, explain why one protocol might be preferred over another, and identify vulnerabilities that each protocol addresses. Don't just memorize what each protocol does—know what cryptographic principles each one demonstrates and what attack vectors it defends against.
These protocols secure data at the higher layers of the network stack, protecting communication between applications and ensuring end-to-end encryption for user-facing services. They rely on the underlying network infrastructure being functional, then add security on top.
Compare: SSH vs. SFTP—both use the same underlying SSH protocol and port, but SSH provides interactive shell access while SFTP handles file operations. If a question asks about securing remote administration, SSH is your answer; for secure file transfers, it's SFTP.
These protocols operate at the IP layer, securing packets regardless of the application generating them. This provides transparent security—applications don't need modification to benefit from protection.
Compare: IPsec Tunnel Mode vs. VPN protocols—IPsec provides the cryptographic foundation, while VPN protocols like OpenVPN add user-friendly configuration, cross-platform support, and additional features. Many VPNs actually use IPsec underneath (L2TP/IPsec), so understand the layered relationship.
Wireless protocols face unique challenges because radio signals can be intercepted by anyone within range. These protocols must assume an adversary can capture every transmitted packet.
Compare: WPA2 vs. WPA3—both use AES encryption, but WPA3's SAE handshake protects against offline brute-force attacks on captured handshakes. If asked about modern wireless security best practices, WPA3 is the current standard.
These protocols focus specifically on proving identity, often using clever cryptographic techniques to avoid transmitting passwords directly. Authentication is distinct from encryption—you can have one without the other.
Compare: Kerberos vs. public-key authentication (like SSH keys)—Kerberos uses symmetric cryptography and a trusted third party, while SSH keys use asymmetric cryptography without requiring a central authority. Kerberos scales better for enterprise environments; SSH keys work well for individual server access.
These protocols protect the fundamental services that make networking function, ensuring that basic operations like name resolution and email remain trustworthy.
Compare: DNSSEC vs. HTTPS certificates—both use digital signatures and chains of trust, but DNSSEC protects the name-to-IP mapping while HTTPS certificates protect the subsequent connection. A complete secure browsing session requires both working correctly.
| Concept | Best Examples |
|---|---|
| Transport Layer Encryption | SSL/TLS, HTTPS |
| Network Layer Security | IPsec, VPN protocols |
| Secure Remote Access | SSH, SFTP |
| Wireless Protection | WPA2, WPA3 |
| Ticket-Based Authentication | Kerberos |
| Infrastructure Integrity | DNSSEC |
| End-to-End Message Security | PGP |
| Hybrid Encryption (symmetric + asymmetric) | TLS handshake, PGP |
| Digital Signatures for Authentication | DNSSEC, PGP, TLS certificates |
Which two protocols both use SSH as their underlying transport mechanism, and what distinguishes their primary use cases?
Compare IPsec Transport mode and Tunnel mode—when would you choose each, and what specific data does each mode encrypt?
If a user connects to a coffee shop Wi-Fi protected by WPA2-Personal and then establishes an OpenVPN connection, which protocol protects against which threat? Explain the layered security model.
Both Kerberos and PGP solve authentication problems, but they use fundamentally different trust models. Compare the "trusted third party" approach versus the "web of trust" and identify one advantage of each.
A company wants to ensure employees visiting internal websites aren't redirected to phishing sites through DNS attacks. Which protocol addresses this specific threat, and what cryptographic mechanism does it use to provide protection?