Secure Protocols Flashcards
4.1.3
What do secure protocols do
Provide security services for communications channels as well as secure authentication services
Secure Shell (SSH)
Remote management protocol which replaced Telnet. It operates over TCP/IP. All communications are encrypted. Primarily used by IT administrators to manage devices such as servers and network devices.
What does SSH protect against
Eavesdropping
DNS and IP spoofing
MITM attacks
Transport Layer Security (TLS)
Data protection used for protecting website transactions (banking, ecommerce
Secure Socket Layer (SSL)
Legacy data protection protocol used for protecting website transactions (banking, ecommerce). Replaced by TLS
What are some SSL and TLS features
Both offer data encryption, integrity, and authentication.
Prevent tampering, spoofing, and eavesdropping
Support one and two way authentication using digital certificates
Can be implemented at lower layers such as network layer to operate as a VPN.
Kerberos
Standard based network authentication protocol used in many products (Microsoft Active Directory Domain Services AD DS)
Mostly used in LANs for organization wide authentication, single sign on and authorization
Internet Protocol Security (IPSec)
standard suite of protocols that is used to connect nodes (computers or office location) together.
It provides confidentiality, integrity, and authentication. Widely used in VPNs
Authentication Header (AH)
A part of IPSec that provides assurance of message integrity and nonrepudiation. Also provides authentication and access control preventing replay attacks
Encapsulating Security Payload (ESP)
A part of IPSec that performs authentication for the sender, also it encrypts the data being sent. Can also prevent replay attacks but not to the degree of AH
Security Association (SA)
A part of IPSec that provides the bundle of shared security attributes or keys and data that provide the parameters for AH and or ESP operations
Transport Mode
A IPSec mode that only encrypts and authenticates the IP payload (data)
Tunnel Mode
A IPSec mode that will encrypt and authenticate the whole IP packet including the data and routing information (header)
Internet Key Exchange (IKE)
Is a part of IPSec suite and used to establish a secure authenticated communications channel between 2 entities. Uses X.509 PKI certificates for Diffe-Hellman-Merkle key exchange protocol to establish a shared session secret.