Abstract
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer networks and the Internet is undeniably useful. However, as computer and network technology continues to become increasingly advanced, the threat and number of cyber-attacks rises. Without advanced and well-developed security protocols, companies, businesses, colleges, and even ordinary individuals would be at the mercy of malicious hackers. This paper focuses on security protocols such as PGP, 3PAKE, and TLS’s processes, design, history, advantages, and disadvantages. Research for this article was conducted through reading numerous scholarly articles, conference articles, and IT and information security textbooks. The purpose of this article is to expose and elaborate on vulnerabilities in popular security protocols, introduce lesser-known protocols with great potential, and lastly, provide suggestions for future directions and modifications to improve security protocols through qualitative and theoretical research.
Highlights
As technology advances in computers, smart phones, networks, etc. and technological features such as Internet of Things and smart homes are implemented, there is a need for improved and better-updated security for the public
A large portion of our research is to remind and display to others the vulnerabilities that exist in popular security protocols and provide theoretical paths and methods to fix these vulnerabilities
Our research is meant to show that all security protocols have different strengths, weaknesses, and vulnerabilities, and many of them can efficiently reduce cybercrime to a minimum, provided they are continuously researched, updated, and monitored
Summary
As technology advances in computers, smart phones, networks, etc. and technological features such as Internet of Things and smart homes are implemented, there is a need for improved and better-updated security for the public. Technological features such as Internet of Things and smart homes are implemented, there is a need for improved and better-updated security for the public. Various applications on the Internet along with computer operation systems are updated on a regular basis to fix specific, security vulnerabilities which hackers have exploited. Security protocols are responsible for protecting Internet applications and computer operations systems, thereby securing an individual’s confidential data [9]. A large portion of our research is to remind and display to others the vulnerabilities that exist in popular security protocols and provide theoretical paths and methods to fix these vulnerabilities. Our research is meant to show that all security protocols have different strengths, weaknesses, and vulnerabilities, and many of them can efficiently reduce cybercrime to a minimum, provided they are continuously researched, updated, and monitored
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.