top of page

Protocols 

Now do not get overwhelmed. There are a lot of protocols analysts use to insure the safety of data getting from point A to point B. I have also described where they are used at to simplify the process and make it easier for you.

​

The true definition of a protocol is the official procedure or system of rule governing affairs of state. Now is the world of cyber it is a little different. 

​

Protocol means a standard set of rules for formatting and processing data. basically what to go by when data travels and or stored anywhere.

Simple Right?

Networking  protocols 

These below are transfer protocols. Used to keep the data you send from point A to point B safe with out any interruption. I have tried my best to give the definition as well as breaking it down to its simplest format while keeping it short hope you enjoy.

DHCP
Dynamic Host Configuration  Protocol 

Network management protocol. Basically controles and assigns IP address to devices connected to a network 

SNMP
Simple Network Management Protocol 

Collects organizes information about managed devices on IP networks and modifies information to change device behavior. bBsically used for communication between routers, switches, firewalls, load balancers, servers, CCTV cameras and wireless devices

UDP
User Datagram Protocol

A communication protocol used to send messages to other hosts on an internet protocol network. Basically sends data directly to a network as fast as it can.

AFTP
Accelerated File Transfer Protocol 

Designed to accelerate fuel transfers. It is 100 times faster than FTP. Works as using two communication channels. A combination of TCP and UDP. In simpler terms it sends faster because majority of the packages being sent are over UDP.

HTTP
Hypertext Transfer Protocol 

Everybody has heard of this acronym. Hopefully right? It's those 4 or five letters before you see the slashes and your web address. That is called hypertext transfer protocol one of the other mostly used protocols for transferring files. But just FTP HTTP lacks security and can vulnerable to bad guys trying to take information.

SCP 
Secure Copy Protocol

Older ancient model of SFTP. That runs by sending files through a SSH server or request files. You have to set up a SSH connection between the lost host and the targeted host before the transfer. In other words SCP transfer files between a trusted and proven connection only. If not trusted it WILL NOT SEND 

SFTP
SSH File Transfer Protocol

SFTP is a network protocol for securely accessing transferring and managing large file and sensitive data. Used over the transport layer is also helps businesses comply with HIPPA and GDPR rulings, as well as many other.  Uses SSH to transfer files and requires the client to be authenticated by the server. Basically verification before sending is complete.

bottom of page