3.1 - Secure Protocols Flashcards
1
Q
SRTP
A
- Secure Real- Time Transport Protocol
- Goal is to take RTP and add encryption (think of voice or video calls)
- Keep conversations private
2
Q
AES
A
- Advance Encryption Standard
- Encryption method used for SRTP (Secure Real-Time Transport Protocol)
- symmetrical
3
Q
HMAC-SHA1
A
- Hash-based message authentication code using SHA1 (hashing protocol)
- With SRTP, it’s not just the communication that needs to be secure, but also authentication, integrity, and reply protection
4
Q
NTP
A
- Network Time Protocol
- Classic NTP has no security features
- Exploited as amplifiers in DDoS attack
- NTP was around before 1985, example of a legacy protocol (never originally designed with security features)
5
Q
NTPSec
A
- Secure Network Time Protocol
- Added many security features and cleaned up old code
- Development began in 2015
6
Q
S/MIME
A
- Secure/Multipurpose Internet Mail Extensions
- A way to keep email secure
- Public key encryption on digital signing of mail content
- Requires a PKI (public key infrastructure) or similar organization of keys
7
Q
POP3
A
- Secure POP
- Use a STARTTLS extension to encrypt POP3 with SSL
8
Q
Secure IMAP
A
- Uses IMAP with SSL to make it more secure
9
Q
SSL/TLS
A
- Secure Socket Layer/ Transport Layer Security
- SSL is the older version, TLS is the updated version
- If your mail is browswer based, always encrypt with SSL
10
Q
HTTPS
A
- If you’re sending secure communication over SSL/TLS then you’re using HTTPS (stands for Http over TLS or SSL)
- HTTP over TLS / HTTP over SSL / HTTP Secure
- most common for of HTTPS will use public key encryption, private key on the server, symmetric session key is transferred using asymmetric encryption, security and speed
11
Q
IPSec
A
- Internet Protocol Security
- an encrypted tunnel allows you to send information over the layer 3 internet but encrypt it
- Security for OSI Layer 3
- Authentication and encryption for every packet
- includes encryption and packet signing for anti-replay features
- Very standardized (can use different manufactures equipment), makes it easy to use, multi-vendor implementations
- 2 core protocols: AH (Authentication Header) and ESP (Encapsulation Security Payload)
12
Q
AH
A
- Authentication Header
- provides integrity
- One of two IPSec protocols (Other is ESP - Encapsulation Security Payload)
13
Q
ESP
A
- Encapsulation Security Payload
- provides the encryption
- one of two IPSec protocols (other is AH - Authentication Header)
14
Q
FTPS
A
- File Transfer Protocol Secure
- Secure way to transfer files
- FTP over SSL = FTP-SSL (uses SSL to encrypt the file that’s being sent via the FTP client)
- One of the most common (the other is SFTP) - but they use completely different mechanisms to communicate
15
Q
SFTP
A
- SSH File Transfer Protocol
- This uses SSH to securely transport (not SSL like FTPS)
- Provides file system functionality
- Includes additional management capabilities: Resuming interrupted transfers, directory listings, remote file removal