Section 27 Security Protocols Flashcards
- Emails
- Websites
- Remote Control
- Remote Access
Important Security Protocols
A standard that provides cryptographic security for electronic messaging.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Cryptographic protocols that provide secure internet communications for web browsing, instant messaging, emails, VoIP, and many other services.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
A protocol that can create a secure channel between two computers or network devices to enable one device to control the other device.
Secure Shell (SSH)
A secure connection between two or more computers or device that are not on the same private network.
Virtual Private Networks (VPN)
A protocol that encapsulates PPP packets and ultimately sends data as encrypted traffic PPTP uses Port 1723.
Point to Point Tunneling Protocol (PPTP)
A TCP/IP protocol that authenticates and encrypts IP packets and effectively securing communications between computers and devices using this protocol.
IPSec
Method used by IPSec to create a secure tunnel by encrypting the connecting between authenticated peers.
Internet Key Exchange (IKE)
Establishes secure connections and shared security information using certificates or cryptographic keys.
Security Association (SA)
Protocol used in IPSec that provides integrity and authentication.
Authentication Holder (AH)
Provides integrity, confidentiality, and authenticity of packets by encapsulating and encrypting them.
Encapsulating Security Protocol (ESP)
Host to host transport mode only uses encryption of the payload of an IP packet but not its header.
Transport Mode