A security protocol is a set of rules and procedures that governs how data is transmitted securely over a network. Security protocols ensure authentication, encryption, and data integrity so that information cannot be intercepted, altered, or forged during transmission.
Without security protocols, data sent over the internet travels as plain text and can be read or modified by any attacker who intercepts it. Security protocols address three core goals — the CIA Triad:
| Goal | Meaning |
|---|---|
| Confidentiality | Only authorised parties can read the data |
| Integrity | Data is not altered during transmission |
| Availability | Authorised users can access data when needed |
A key concept in CS-12 is that stronger security often reduces usability:
| Security Measure | Security Gain | Usability Cost |
|---|---|---|
| Multi-Factor Authentication (MFA) | High | Requires extra step each login |
| Strong encryption (AES-256) | High | Slight processing overhead |
| SSH over Telnet | High | Requires key management |
| HTTPS over HTTP | High | Minimal — nearly transparent to users |
When recommending cybersecurity measures, factors to consider include efficiency, cost, privacy, and ethics.
| Protocol | Layer | Primary Use |
|---|---|---|
| TLS/SSL | Transport/Application | Encrypts web traffic (HTTPS) |
| HTTPS | Application | Secure web browsing |
| IPsec | Network (Layer 3) | VPNs, securing all IP traffic |
| SSH | Application | Secure remote login & file transfer |
| WPA2/WPA3 | Data Link | Securing Wi-Fi networks |