3.1 - 3.2 Flashcards
Secure real tine protocol
Take non encrypted convos and add encryption to it it uses AES to encrypt audio and video
Hmac-sha1 hashing
Time synchronization
Ntpsec from ntp has cleaned up vulnerabilities
S/mime
Public private key encryption for emails and includes digital signatures
Pipulat to use pop3 with start tls and ssl
With imap can use secure imap
Briwsers should always use ssl
Ssl/tls
Secure sockets layer replaced by transport layer security via http
Ipsec tunnel
Security for osi layer
Encryption and packet signing
First authentication header, then encapsulation payload for encryption
Ftps and sftp
Ftps uses uses ssl
Sftp - ssh file transfer protocal, more management capabilities, listing interruptions, manipulate file system
Ldap
Lightweight directly access protocol
Standard for having a directory on network, used tcp/ip
Ldap secure - uses ssl for secure communication
Sasl is used by ldap and is a simple authentication and security layer
Ssh and dns
Secure shell replaces old telnet
Domain name system originally had no security to be redirected by hackers. Dns sec extension is added to validate info given to ensure it came from the place requested without changes in transit
Routing and switches
Snmpv3 protocol uses queuing and confidentiality of data simple network management protocol v3
Https not http
Dhcp
Automatically assigns ip to netwrok and device
Hackers can manipulate so controls are added in active directory, assigns devices with permissions
Untrusted interfaces get blocked
Defense in deptg
Multifaceted defense
End point detection and response
Attacks usually from signatures but edr uses what the file is doing and other methods rather than block signature it blocks action
Data loss prevention
Preventing data transfer from being seen, in the clear or encrypted form
Maybe a firewall cloud or clients system
Ngfw
Next gen firewalls identifies apps regardless of hiding ip address can block at network level, includes decrypt and encrypt capability
Host base firewalls
Firewalls also running on end points supported By host based firewall
Another is host bast intrusion detection system or host based intrusion prevention system
Can be integrated in host basted detection system