Section 5.4 is all about knowing specific cryptographic protocols, how they are used, what they do, and the downfalls as well as the positives of each one. It’s important to know how they are implemented and what they are best used for.
- SSL/TLS – Secure Sockets Layer (SSL) is often used to create a secure connection between two TCP machines. As a protocol, it utilizes the handshake method of session establishment. Usually when using SSL a connection is requested from the PC to the server, a secure connect is needed by the server to the PC, the PC offers its security capabilities, the server accepts and a secure connection is set up.
Transport Layer Security (TLS) expands SSL and some believe it may even replace SSL in due time. With TLS a session is established, there is a key-exchange, and then a TLS session is established.
- S/MIME – Secure Multipurpose Internet Mail Extensions (S/MIME) is used for the encryption of email using signature data and has become one of the most widely used and supported protocols. It uses PKCS #7 and provides for integrity, encryption, and authentication as needed.
- PPTP – Point to point tunneling protocol (PPTP) involves encrypting the point-to-point protocol packets (PPP) that are encapsulated in a single point-to-point environment. The negotiation is done out in the open which leaves it open to various attacks such as packet capturing.
- HTTP vs. HTTPS vs. SHTTP – HHTPS is simply HTTP secured.
- L2TP – Layer 2 Tunneling Protocol (L2TP) is a creation of Microsoft and Cisco products combined into one protocol that is used for point-to-point. It is a hybrid of both PPTP and L2F and can be used in IPX, SNA, and IP networks alongside with the common TCP/IP networks. However, L2TP does not provide for any type of data security because the data is not encrypted. To fix this, IPSEC is often used.
- IPSEC – IP Security (IPSEC) is slowly becoming the basis for protocols that allow for authentication, encryption, and integrity over IP. It is often used with VPNs as well as L2TP and others.
- SSH – Secure Shell (SSH) is a tunneling protocol that originated on Unix systems but can now be used across all common environments (Unix & Windows.) the handshake process is very similar to that of SSL but SSH is mostly used for interactive terminal sessions. The connection process takes place in two separate phases the first being the negotiation for the channel connection and the second is using the secure channel to create the connection.
Visit GetCertify4Less or our new site GetCertified4Less to save on your Security+ certification
No comments:
Post a Comment