Secure Communications and Application Vulnerabilities Flashcards
How are secure communications achieved?
Through the design and implementation of protocols
What is the layered model of networking?
Each layer is an abstraction of networking.
Each layer has one or more associated protocols and vertical interfaces.
Where are security protocols implemented?
At each layer of the model
What protocols are implemented at the application layer?
FTP, SMTP, HTTP, DNS, IMAP
What security protocols are applied at the application layer?
PGP
What protocols are implemented at the Transport layer?
TCP, UDP
What security protocols are implemented at the Transport layer?
SSL/TLS
What protocols are implemented at the Network layer?
IPv4, IPv6, ICMP
What security protocols are implemented at the Network layer?
IPSec
What protocols are implemented at the Link layer?
ADSL, Ethernet, WiFi
What security protocols are implemented at the Link layer?
Wireless: WEP, WPA, WPS
What is SSL?
Provides secure programming interface to applications, inserted between the application and transport layers and secures communication.
When is SSL applied to communications?
TCP connection is followed by the SSL protocol handshake and data exchange.
How does the SSL handshake work?
Client sends list of algorithms it supports and a nonce
Server chooses algorithms from list, sends choice + cert + server nonce
Client verifies the cert, extracts the server’s piblic key and generates a pre_master_secret which is encrypted and set to the server.
Server computes encryption and MAC keys from pre_master_secret and nonces
Client and server sends MAC of all handshake messages
What is a cookie?
Text file stored on the client-side after being generated and transmitted from server.