Chapter 13: Securing the Network Flashcards
Link encryption
encrypts all the data along a specific communication path
E2EE
End-to-end encryption
End-to-end encryption
occurs at the session layer (or higher) and does not encrypt routing information, enabling attackers to learn more about a captured packet and where it is headed
TLS
Transport Layer Security
Transport Layer Security
E2EE protocol that provides confidentiality and data integrity for network communications
SSL
Secure Sockets Layer
Secure Sockets Layer
predecessor of TLS and is deprecated and considered insecure
VPN
virtual private network
virtual private network
secure, private connection through an untrusted network
PPTP
Point-to-Point Tunneling Protocol
Point-to-Point Tunneling Protocol
obsolete and insecure means of providing VPNs
L2TP
Layer 2 Tunneling Protocol
Layer 2 Tunneling Protocol
tunnels PPP traffic over various network types (IP, ATM, X.25) but does not encrypt the user traffic
IPSec
Internet Protocol Security
Internet Protocol Security
suite of protocols which provides authentication, integrity, and confidentiality protections to data at the network layer
TLS can be used to provide … connectivity at layer … in the … model
TLS can be used to provide VPN connectivity at layer 5 in the OSI model
web service
client/server system in which clients and servers communicate using HTTP over a network such as the Internet
SOA
service-oriented architecture
service-oriented architecture
a system as a set of interconnected but self-contained components which communicate with each other and with their clients through standardized protocols
API
application programming interfaces
application programming interfaces
establish a language which enables a system component to make a request from another component and then interpret that second component’s response
HTTP
Hypertext Transfer Protocol
Hypertext Transfer Protocol
TCP/IP-based communications protocol used for transferring data between a server and a client in a connectionless and stateless manner
HTTPS
HTTP Secure
HTTP Secure
HTTP running over TLS
SOAP
Simple Object Access Protocol
Simple Object Access Protocol
messaging protocol which uses XML over HTTP to enable clients to invoke processes on a remote host in a platform-agnostic way
WS-Security or WSS
Web Services Security
Web Services Security
a set of protocol extensions which provides message confidentiality, integrity, and authentication
SOAP security
enabled by Web Services Security
REST
Representational State Transfer
Representational State Transfer
an architectural pattern used to develop web services without using SOAP
DGA
domain generation algorithm