Narrative

It is no secret that today’s society relies heavily on technology and internet-based communications. There are many American’s who spend over 10 hours a day looking at a screen be it for work, shopping, or entertainment. Have you ever stopped to ask yourself “what keeps my information safe?” The answer to this question is number of security protocols that have been developed and improved since the creation of the internet.

What are Security Protocols? A protocol is a sequence of rules and events that ensure the protection of our data. This is important when we are transferring data from one party to another. These protocols are constantly in use and protect your data every day. The next time you make a purchase on Amazon be thankful these protocols are in place to protect your credit card data.

When it comes to security protocols, they begin sooner than you may think. Our first major taste of protocols came in 1930 when the famous cryptographic device, the enigma machine, was used to protect sensitive tactical information through multiple layers of security.

As time goes on the need for security protocols rises. In 1960 The Cold War saw many more mainframe computers brought online to accomplish sophisticated tasks and to complete a networked communication system. The system ARPANET came online in 1968 and we know it as the internet today.

As technology progresses, the need for standardized controls increases. In 1979 The world gets its first look at the recently declassified Rand Report R-609. This report defines the controls and mechanisms necessary to protect computerized data.

In 1980 Transmission control Protocol and Internet Protocol are developed as the primary protocols for ARPANET and are still used as the primary internet protocols today.

With the increase of computer usage and networked communication the need for regulation is in on the rise. In 1986 The computer Fraud and Abuse Act is declared and is followed up by the Computer Security Act in 1987.

When considering your security while using the computer or browsing the web it is important to account for attacks that you do not see. This is where a Firewall comes in. Firewalls monitor incoming and outgoing network traffic and make a barrier between your internal network and incoming traffic. This helps protect you from malicious things such as viruses and hackers.

Today there are multiple protocols that keep us safe on the internet and they are things we do not often think about. When looking at handshake protocols we must consider SSL and TLS protocols. What these protocols do is establish a secure connection between the client and the server. The client sends a “hello” message, cryptographic algorithms, and it compresses the files in whatever method is supported by the server.

The Server sends back another cryptographic algorithm, the session ID, The server’s Digital certificate, and the server’s public key. Once the client gets this information it was contact the servers CA and verify that the server is legitimate and establishes trust, once this is done keys can be exchanged and messages and can be sent.

When using these protocols an observer can see the start and end points but cannot see the data that is being transmitted.

As security and privacy become more important people are looking towards VPNs. VPNs are virtual private networks that can make your internet usage of a public network much safer using tunneling protocols. These protocols encrypt you sent data and decrypt it on the receiving end. You can also use a VPN to access restricted sites and overcome censorship that may be accruing in your region.

VPNs can function because of security protocols, one of the most common protocols used Is SSTP, or secure socket tunneling protocol. These processes Point to point Protocols through SSL or TLS protocols which, as discussed provide secure transfer and encryption. This means SSTP works a lot like point to point, but allows data to go through an encrypted tunnel which protects your data and activity from you internet security provider and anyone else who may be looking into what you are doing.

This technology allows companies to have their employees work from home. It makes sure the employees can get into the office records that are needed to do their job, but also ensure the company data is still secure.

All the protocols that we have discussed are a big part of how the internet that we know today exists, and how life itself is able to be lived the way it is now. Without these security protocols we would not be able to work from home or live the lifestyle that we have created as a society. We will have to continue to develop protocols to ensure we can stay safe going forward.

There are pros and cons to security protocols. The biggest of the pros being that we can work remotely and life more freely and safely. The cons are that people can exploit security protocols to get things illegally and cover their own tracks when they are doing something illegal. Despite this the pros still outweigh the cons.

Living now during a global pandemic it is easy to see how important these protocols are to people who may not even realize they rely on them. Without security protocols the people working from home during the pandemic likely would not have a job because they would not be able to securely access the required information to be effective at their job.

Thank you