8: 5 Transport Encryption Flashcards

1
Q

TLS

A

Transport Layer Security - Encrypts network communication over public networks using keys. Uses other cryptographic algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does TLS work

A

Client sends request to server, asking that server initiates a secure session using a list of cypher suites. Server then analyzes the list of suites and sends a message back indicating the preferred list of cypher suites and the server’s digital certificate. Client then validates the certificate using CA’s public key and all information is valid/matches. Then client creates a session key that is encrypted by the server’s public key before being send to the server. Server then decrypts. TLS handshake and key destroyed afterword.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session key

A

Random encryption key that is symmetric that will be used for single session between client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSL

A

Secure Sockets Layer (insecure predecessor to TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OpenSSL

A

Open-source TLS project for every operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL Inspection

A

Performs a friendly man-in-the-middle attack to inspect network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPsec

A

Internet Protocol Security - set of protocols meant to add security to TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ESP protocol

A

Encapsulating Security Payload - used by IPSec to provide confidentiality and integrity protection for packet payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AH protocol

A

Authentication Header - used by IPSec to provide integrity protection for packet headers and payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SA

A

Security Associations - Identifies cryptographic algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Site-to-Site VPNs

A

Encrypted tunnels connecting two networks together in a manner that is transparent to users (tunnel mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

End-User VPNs

A

Provide encrypted remote network access for individual systems (transport mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTPS

A

Adds TLS to web browsing, providing security for entire web session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Telnet vs SSH

A

Both used to connect remotely to systems using command line. Telnet is insecure, SSH is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTP

A

File Transfer Protocol used to send files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS vs SFTP vs SCP

A

FTPS adds TLS to FTP, SFTP transfers files over SSH, and SCP provides secure commanding file transfer over SSH

17
Q

SRTP vs RTP

A

Real Time protocol vs Secure Real Time protocol

18
Q

NTP vs NTPSec

A

Network Time Protocol (to synchronize clocks), secure version is open source project

19
Q

Encrypted versions of email protocols (Ports)

A

POP 110/995
IMAP 143/993
SMTP 25/465

20
Q

LDAPS

A

Secure alternative to LDAP