Protocol
Creating a virtual channel for data exchange between two Internet-connected networks by way of encapsulating traffic inside the IP protocol.
The World Wide Web protocol used for data communication between web servers and clients.
A network protocol used in small-sized networks, such as residential ones, for advertising and discovery of network services, primarily the ones supported by the Universal Plug-and-Play (UPnP) architecture. Features of SSDP are used in DDoS attacks belonging to the SSDP amplification type.
A transport layer protocol in the OSI model, one of the main protocols of the Internet protocol suite.
SSL certificates are used to verify that a public key belongs to its actual owner. The authentication of keys used for data exchange using the protocol is based on asymmetric cryptography.
A mechanism that forces a web client and server to establish an HTTPS-based secure connection at once, without first using the unprotected HTTP protocol. The approach helps to minimize the risk of attacks aimed at wiretapping or tampering with a web connection.
A protocol for sending messages (datagrams) to other hosts without error checking or correction. UDP offers the advantage of being able to quickly process requests from very large number of clients.
An extension of HTTP allowing to secure web traffic using cryptography algorithms based on the SSL and TLS protocols.
A system that keeps the information about Internet domains, with its key function being to provide the IP address of a node or other resource upon receiving its full domain name. The system consists of multiple servers and has a distributed hierarchical architecture. In order to minimize DNS hacking attack risks and ensure the integrity and authenticity of data kept by DNS, its servers use built-in protection and security features, such as DNSSEC, TSIG, DANE, and others.
Border Gateway Protocol (BGP) is a routing protocol that works on an application level. BGP chooses the most efficient routes to deliver Internet traffic.