Chapter 13 - Supplement - Sheet1 Flashcards
ACL
Access Control List. Reside on routers to determine which packets are allowed to route through based on requesting device’s source or destination IP address
VPN
Virtual Private Network. Makes a local host part of a remote network by using an ecrypted connection over a WLAN link
3 catagories of VPNs
Remote-access VPNS, site-to-site VPNs, Extranet VPNs
Remote Access VPNs
Allow remote users to scecurly access corporate network wherever and wheenever they need to.
Site to Site VPNs
AKA intranet VPNs. Allow a company to connect its remote sites to the corporate backbone securely over a public medium like the Internet.
Extranet VPNs
Allow an org’s suppliers, partners, and customers to be connected to hte corporate network in a limited way for business-to-business
SSL
Secure Sockets Layer. Protocol developed by netscape to encrypt data transmissions
SSL VPN
A method used to establish a secure VPN connection
PPTP
Method for establishing VPNs. Point-topoint tunneling protocol. Developed by Microsoft, Lucent Technologies, 3COM. Not found much anymore.
IPSec
IP Security. Standard protocol for VPNs today.
TWo protocols within IPSec
AH, ESP. Authentication header and Enxapsulating Security Payload
Two modes of IPSec
Transport Mode, Tunneling Mode
ISAKMP
Internet Security Association and Key Management Protocol. Framework for safely transferring key and authentication data
Symmetrical Key Encryption
Sender and receiver have the same key and use it to encrypt and decrypt all meessages.
DES
Data Encryption Standard. Uses symmetrical encryption keys. No longer secure.
3DES
Triple Data Encryption Standard. Improvement on DES. Max encryption of just 168 bits of security (or 112 bits security, relatively speaking)
AES
Advanced Encryption Standard. Official encryption standard i nthe US since 2002. Key lengths at 128, 192, or 256 bits.
Public Key Encryption
Uses the Diffie-Hellman algorithm, which uses a public key to encrypt data and a private key to decrypt it. Sender gets receipient’s public key and encrypts data using it. Receiver decrypts using its private key.
Two types of encryption
Public Key Encryption, Symmetrical Key Encryption