Day 7 Flashcards
IPsec core protocols
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Authentication Header (AH)
handles authentication services for IPsec
Encapsulating Security Payload (ESP)
encrypts a datagrams payload, ensuring the privacy of the message
IPsec security modes
IPsec provides protection through two security modes: transport and tunnel
Transport Mode
host to host or end to end security.
provides security between any two communicating devices or end-points
only the data is encapsulated
Tunnel mode
protects communication between routers and not the end hosts
IPsec encapsulates the entire payload
CIA triad
confidentiality, integrity, availability
five pillars of information assurance
confidentiality, integrity, availability, nonrepudiation, authentication
hashing
a form of one way encryption where data of variable length is input to a hashing algorithm and a value of fixed length results are output.
hashing provides password authentication and file integrity verification.
password authentication
password is hashed using the same algorithm and compared to the stored hash
file verification
using a hashing algorithm allows a user to verify file integrity regardless of file size.
the hash is also known as a checksum
encryption
a technique of providing confidentiality by converting plaintext, or ordinary data, into ciphertext.
can be done either symmetrically or asymmetrically
symmetric encryption
uses a single key to encrypt and decrypt the data
asymmetric encryption
uses a different key for encryption than is used for decryption.
this key pair consists of both a private key and public key.
PKI uses asymmetric encryption.
digital signatures
utilizes hashing functions to associate a sender with data and to be sure a sender is who they say they are
certificates
electronic documents of credentials usually signed by a third party called a certification authority
authentication, authorization, and accounting (AAA)
a framework for data protection for databases
authentication
presenting credentials for access to the network
authorization
the determination of what tasks are and are not allowed on the network
accounting
keeping a record of such things as login/logoff times, or what services have been accessed.
AAA is suported through two main protocols: RADIUS and TACACS+)
Remote Authentication Dial-In User Service (RADIUS)
an AAA standard used in supporting thousands of access points managed by internet service providers and linking them to a single database.
requests are sent to a Network Access Server (NAS)
the three replies are “Access Accept”, “Access Reject”, or “Access Challenge”
Terminal Access Controller Access Control System Plus (TACACS+
an AAA protocol developed by Cisco to include access to routers and switches.