Section 27: Security Protocols Flashcards
S/MIME
Secures email by encrypting the contents (downside is it’ll encrypt the malware if it has it, too)
SSL and TLS
Cryptographic protocols that provide secure Internet communications for web browsing, instant messaging, email, VoIP, and many other services
Downgrade Attack
A protocol is tricked into using a lower quality version of itself instead of a higher quality version
SSH (Secure Shell)
A protocol that can create a secure channel between two computers or network devices to enable one device to control the other device
SSH requires
a server (daemon) to be run on one device and a client on the other; operates over port 22
SSH 2.0 uses
Diffie-Hellman key exchange and MACs
VPN
Secure connection between two or more computers or devices that are not on the same private network.
PPTP for VPN
A protocol that encapsulates PPP packets and ultimately sends data as encrypted traffic (port 1723)
L2TP for VPN
Connection between two or more computers or device that are not on the same private network (not secure and doesn’t have any encryption - it’s usually paired with IPsec) (port 1701)
IPSec for VPN
A TCP/IP protocol that authenticates and encrypts IP packets and effectively securing communications between computers and devices using this protocol
IKE
Internet Key Exchange - used by IPSec; has three modes - main, aggressive, quick
SA (Security Association)
Establishment of secure connections and share security information using certificates or cryptographic keys
Authentication Header
Protocol used in IPSec that provides integrity and authentication