Network Security 1C, Essay Example

The most surprising thing that was evident in Module A was application standards including HTTP, e-mail, HTML, FTP and HTTP. It was an exciting experience to learn that electronic email was used to assign users distinct addresses which enabled the routing system to direct some messages from one user to the other. The speed, reliability resource efficiency of this application standard was fascinating. The use of File Transfer Protocol, the FTP, was also a surprising adventure as it revealed internet languages that establish the formats of file transfer in the network. It was also amazing to learn that accessing FTP could be done by anonymous user name which was similar to enter private club as guest and any anonymous user had no powers of altering directory content despite the fact that the user is able to download. HyperText Markup Language, HTML, was also a surprising breakthrough in this module as it described the applicable codes that facilitates the display of any document as rich text format. The knowledge of HyperText Transfer Protocol, HTTP, was also surprising. This type of application standard served as the language that World Wide Web applies in the course of transferring some files in a session involving a client and the server.

The most difficult thing that was evident in Module A involved the Network protocols together with associated vulnerabilities. The Network protocols is also commonly addressed as ‘IP’ which implies to a type of connection whose original development is based in United States military whose purpose was network topology applicable in internal communications. Understanding the layered protocol structure associated with the Network protocols in offering network communications was one of the most challenging part in Module A