0
0
Cybersecurityknowledge~6 mins

Common network protocols and vulnerabilities in Cybersecurity - Full Explanation

Choose your learning style9 modes available
Introduction
Imagine sending a letter to a friend but not knowing if it will arrive safely or if someone might read it along the way. Network protocols help computers talk to each other, but sometimes these conversations have weak spots that attackers can exploit.
Explanation
HTTP and HTTPS
HTTP is the basic way web browsers and servers communicate to load websites. HTTPS adds a layer of security by encrypting the data, making it hard for outsiders to eavesdrop. Without HTTPS, sensitive information like passwords can be stolen.
HTTPS protects data by encrypting communication between your browser and websites.
FTP and SFTP
FTP is used to transfer files between computers but sends data in plain text, which can be intercepted. SFTP is a secure version that encrypts the data, protecting files from being read or altered during transfer.
SFTP secures file transfers by encrypting data, unlike FTP.
DNS and DNS Spoofing
DNS translates website names into IP addresses so computers can find each other. Attackers can trick DNS servers to send users to fake websites, a trick called DNS spoofing, which can steal information or spread malware.
DNS spoofing redirects users to fake sites by tampering with DNS responses.
TCP/IP and SYN Flood Attack
TCP/IP is the core protocol that manages how data is sent over the internet. A SYN flood attack overwhelms a server by sending many connection requests but never completing them, causing the server to slow down or crash.
SYN flood attacks disrupt services by overloading servers with fake connection requests.
Wi-Fi Protocols and Weak Encryption
Wi-Fi uses protocols like WPA2 to secure wireless connections. Older protocols like WEP have weak encryption that attackers can break easily, allowing them to access the network and data.
Using strong Wi-Fi protocols like WPA2 is essential to prevent unauthorized access.
Real World Analogy

Imagine sending postcards (HTTP) versus sealed letters (HTTPS). Postcards can be read by anyone, while sealed letters keep your message private. If someone changes the address on your letter (DNS spoofing), it might end up with a stranger. Flooding a mailbox with fake letters (SYN flood) can stop real mail from getting through.

HTTP and HTTPS → Postcards versus sealed letters showing the difference between unprotected and protected messages
FTP and SFTP → Sending files as open postcards versus sealed envelopes
DNS and DNS Spoofing → Changing the address on a letter to send it to the wrong person
TCP/IP and SYN Flood Attack → Flooding a mailbox with fake letters to block real mail
Wi-Fi Protocols and Weak Encryption → Using a strong lock on your mailbox versus a weak one that can be easily picked
Diagram
Diagram
┌─────────────┐       ┌─────────────┐       ┌─────────────┐
│   Browser   │──────▶│   Internet  │──────▶│   Web Server│
└─────────────┘       └─────────────┘       └─────────────┘
       │                    │                     │
       │ HTTP/HTTPS         │                     │
       │ encrypted data     │                     │
       ▼                    ▼                     ▼
┌─────────────┐       ┌─────────────┐       ┌─────────────┐
│   FTP/SFTP  │──────▶│    DNS      │──────▶│   TCP/IP    │
└─────────────┘       └─────────────┘       └─────────────┘
       │                    │                     │
       │ file transfer       │ address lookup      │
       ▼                    ▼                     ▼
┌─────────────┐       ┌─────────────┐       ┌─────────────┐
│ Wi-Fi Router│──────▶│   Attacker  │       │   Server    │
└─────────────┘       └─────────────┘       └─────────────┘
This diagram shows how different network protocols connect devices and where attackers can exploit vulnerabilities.
Key Facts
HTTPA protocol for loading web pages without encryption.
HTTPSA secure version of HTTP that encrypts data between browser and server.
DNS SpoofingAn attack that redirects users to fake websites by altering DNS responses.
SYN Flood AttackA denial-of-service attack that overwhelms servers with fake connection requests.
WPA2A strong Wi-Fi security protocol that encrypts wireless network traffic.
Common Confusions
Believing HTTP is secure because it is widely used.
Believing HTTP is secure because it is widely used. HTTP does not encrypt data; only HTTPS provides encryption and security.
Thinking FTP is safe for transferring sensitive files.
Thinking FTP is safe for transferring sensitive files. FTP sends data in plain text; SFTP should be used for secure file transfers.
Assuming all Wi-Fi networks are equally secure.
Assuming all Wi-Fi networks are equally secure. Older Wi-Fi protocols like WEP are weak; WPA2 or newer protocols are needed for strong security.
Summary
Network protocols like HTTP, FTP, DNS, and TCP/IP enable communication but can have security weaknesses.
Secure versions like HTTPS and SFTP protect data by encrypting it during transfer.
Attackers exploit vulnerabilities such as DNS spoofing and SYN flood attacks to steal data or disrupt services.