support@cybershakha.com
Gujarat,India
+91 70466 47894
Your trusted ally in the digital realm.
support@cybershakha.com
Gujarat,India
+91 70466 47894
Communications security
Communication security means providing security when the communication is done between two parties. The co
Communications security
Communication security means providing security when the communication is done between two parties. The communication done should be secured so that no other person can know the talk between them. It prevents the MITM attack leading to protect the communication against eavesdropping.
Communication protocols enhance system security in several ways:
1. Encryption
It provides encryption when the communication is done. The messages sent, the password and other sensitive information is encrypted so that the attacker can’t find it in plain text.
2. Authentication
Before establishing communication between two parties, authenticity of both the parties is checked. There are various methods with which authentication can be performed. They are biometrics, password, MFA (multi factor authentication), smart card, SSO (single sign on). A combination of any of two or three can also be used.
3. Integrity checking
It checks the reliability of the data. There are various methods with which the data integrity can be checked. By doing integrity checking we can know if there is any modifications or tampering done with the data or not.
4. Secure channels
Secure channels are required for transmitting the data in a safe manner. It makes the communication easier as all the communication done through secure channel remains encrypted. TLS (Transport Layer Security) and SSL (Secure Socket Layer) are the protocols which provides encryption during data transmission in secure channels protecting data from interception and manipulation.
5. Access control
Access control means allowing access to authorized personnel only. It restricts the access to sensitive data for the normal user. The user has the permission of using the resources regarding his work only and not to other resources preventing security breaches.
6. Protection against attacks
Secure communication also provides protection against attacks. As security is pre-established the steps for the upcoming threats can be taken.