Other Security Devices 2.1 Flashcards

1
Q

SSL Accelerators

A

Massive network systems such as web server farms need tools to help with encryption processing power. This is where SSL Accelerators come in handy. Asymmetric encryption is more intense than symmetric encryption. The SSL accelerator offloads the handshake process to separate hardware to take the load off the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSL Encryption

A

SSL handshake uses asymmetric encryption however must first transfer the symmetric key using asymmetric encryption first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSL/TLS Decryption

A

Another commonly used technique. SSL/TLS relies on trust certificates approved by certificate authorities. The browser will only trust websites trusted by these authorities. The websites pay money for these certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware Security Module (HSM)

A

High-end cryptographic hardware. Used for a large number of web servers and certificates. Usually a stand-alone device however you can get a card that plugs into a firewall or proxy. This is a secure are to backup keys. It can also act as an SSL endpoint to offload CPU processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Media Gateways

A

It’s common for organizations to have a media gateway that converts PSTN (Public Switched Telephone Network) (your traditional telephone line) and VoIP. This gateway device must be secured because an attacker can spy, shut down the service, or use the device for making their own calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly