Security in computer processing

poornima lagadapati

Active member
transport protocol can provide an application with one or more security

services. For example, in the sending host, a transport protocol can encrypt all data

transmitted by the sending process, and in the receiving host, the transport-layer

protocol can decrypt the data before delivering the data to the receiving process.

Such a service would provide confidentiality between the two processes, even if the

data is somehow observed between sending and receiving processes. A transport

protocol can also provide other security services in addition to confidentiality,

including data integrity and end-point authentication,
 
transport protocol can provide an application with one or more security

services. For example, in the sending host, a transport protocol can encrypt all data

transmitted by the sending process, and in the receiving host, the transport-layer

protocol can decrypt the data before delivering the data to the receiving process.

Such a service would provide confidentiality between the two processes, even if the

data is somehow observed between sending and receiving processes. A transport

protocol can also provide other security services in addition to confidentiality,

including data integrity and end-point authentication,


Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
 
Back
Top