Network Infrastructure
Protocols
The internet is able to function because of the various protocols that run the internet. Protocols are rules for how information is transported, encrypted, and stored. The TCP protocol is a widely used rules that sets standards for how data is sent. Data sent through this method has a high reliability because of the multiple "handshakes" that confirm data transport. Another widely used protocol is UDP. It sets standards for how data is sent but does not have a high reliability because information is not confirmed. Port numbers are usually associated with protocols, allowing for easy identification and routing.
Domains
Pieces of website names are called domains. Domains are used to classify and organize the kind of services that the site has. Each part of the website URL qualifies as a part of domain. A top-level domain name is the end of a website name(.com, .gov, .edu, etc). This allows users and programs to determine the purpose of the website and act accordingly. The end of each section is marked with a period. Subdomains are sections to the left of the top level domain. Put together, a fully qualified domain name is created. A DNS server is used to resolve IP addresses into a FQDN, allowing the computer to properly route to the correct website server.
The Internet
The internet is a collection of networks that transfer information between one another. Protocols determine how a computer accesses a server. Other factors such as authentication determine whether the user can access the server. Domain names are used to clarify the server to users. However, malicious people can create legitimate looking domains that redirect the user to a hostile server, allowing the server to collect personal information.
Data that secure and important must be protected. Data protection is done by encrypting and hiding the data. Even if someone captured the valuable information, it would be useless because the data would be unreadable. If the encryption is strong, then only the intended recipient can read the data because of a decryption key they hold. Another way of securing data is through the use of authorization, meaning only people with a specific level of authorization or trust, can access the data. This reduces the chance that a rogue user damages or destroys data critical to a company.
Data that secure and important must be protected. Data protection is done by encrypting and hiding the data. Even if someone captured the valuable information, it would be useless because the data would be unreadable. If the encryption is strong, then only the intended recipient can read the data because of a decryption key they hold. Another way of securing data is through the use of authorization, meaning only people with a specific level of authorization or trust, can access the data. This reduces the chance that a rogue user damages or destroys data critical to a company.