Week 10
Week 10
Javed Iqbal
[email protected]
Week 10
• TLS operates at the transport layer of the TCP/IP protocol suite and is widely
used to secure various applications, including web browsing, email, instant
messaging, and file transfers.
Continue…
• TLS is the successor to the Secure Sockets Layer (SSL) protocol, and the
terms SSL and TLS are often used interchangeably.
• The latest version of TLS is TLS 1.3, which provides improved security
and performance compared to earlier versions.
Key Components of TLS
Handshake Protocol
Once the secure connection is established, the TLS record protocol is used
for data encapsulation, encryption, integrity checks, and authentication. It
takes the application data and divides it into manageable units called
records, which are then encrypted and sent over the network. On the
receiving end, the records are decrypted, and integrity checks are performed
to ensure the data's integrity.
Change Cipher Spec Protocol
• IDPS can identify and defend against various attacks, such as DoS (Denial of
Service), DDoS (Distributed Denial of Service), and network-based intrusions.
Routing Protocol Security