Secure Protocols & Encryption Flashcards
Valid Modes of Operation used by IPsec
Transport & Tunnel
What does FCS stand for ?
Frame Check Sequence
What protocols are used to make sure data has not been altered during transmission?
Cyclic Redundancy Check - (CRC)
Frame Check Sequence - (FCS)
What does CRC stand for ?
Cyclic Redundancy Check
What does SSL stand for ?
Secure Sockets Layer
What does Secure Sockets Layer/Transport Layer Security do ?
How does it show this ?
Creates an encrypted connection between a client and a server and establish trust.
It shows this through a green padlock or a branded URL bar on a web browser.
What is the SSL key pair ?
What is the name of the process in which SSL uses these to establish a connection ?
A public and Private key that work together to establish an encrypted connection.
An SSL Handshake
What does CSR stand for ?
What does it do ?
Certificate Signing Request
Creates a Public and Private key on your server.
What types of things would SSL/TLS be used for ?
Web browser and web server Mail Server and Mail Client Banking Typing in sensitive information like credit card numbers, Social Security numbers Login Credentials
What do protocols do ?
Describe how Algorithms should be used.
What do SSL/TLS Secure websites begin with ?
HTTPS:
SSL Handshake
BROSWER CONNECTS to a web server (website) secured with SSL (https). Browser requests that the server identify itself.
SERVER SENDS a copy of its SSL Certificate, including the server’s public key.
BROWSER CHECKS the certificate root against a list of trusted CAs and that the certificate is unexpired, unrevoked, and that its common name is valid for the website that it is connecting to. If the browser trusts the certificate, it creates, encrypts, and sends back a symmetric session key using the server’s public key.
SERVER DECYRPTS the symmetric session key using its private key and sends back an acknowledgement encrypted with the session key to start the encrypted session.
Server and Browser now encrypt all transmitted data with the session key.
is SSL or TLS newer ?
TLS
What does TLS Stand for ?
Transport Layer Security
SSL/TLS recommended port number
443
What does HTTP stand for ?
Hyper Text Transfer Protocol
What does SSH stand for ?
Secure Shell
What is Secure Shell used for ?
Secure Remote Login and File Transfer using encryption.
What is the benefit of SSH over Telnet ?
How is Telnet seen in Wireshark ?
It is encrypted.
Telnet can be seen as plain text by anyone sniffing packets.
Where does SSL/TLS reside on the TCP/IP Model ?
The Transport Layer
OSI Layer 2 methods of ensuring that data being transmitted across a LAN is free from errors.
Cyclic Redundancy Check - (CRC)
Frame Check Sequence - (FCS)
What describes how Algorithms should be used ?
Protocols
What does PPP stand for ?
Point to Point Protocol
On what layer do we find PPP
Data Link Layer
Where is Point to Point Protocol widely used ?
Broadband communications.
Over two routers
What does ICMP stand for ?
Internet Control Message Protocol
What are Checksums for ?
To ensure the integrity of data portions for data transmission or storage.
Error checking
On what layer is a Frame Check Sequence used ?
The Data Link Layer
Where is IPsec commonly used ?
In VPN’s
What does IPsec provide ?
Secure encrypted communication between two computers over an Internet Protocol network
What Layer does IPsec work at ?
Network Layer
Which IPsec mode only encrypts the payload
Transport
Which IPsec mode encrypts and authenticates the entire IP packet
Tunnel
What IPsec mode is commonly used to secure VPN’s
Tunnel mode
What is the payload ?
The data that is being transmitted. The message
What does the header on a packet do ?
Makes sure that the packet arrives at the correct destination
What does ESP stand for ?
Encapsulating Security Payload
What does ECP stand for ?
Encryption Control Protocol
What is the Encryption Control Protocol responsible for ?
Configuring and enabling data encryption algorithms on both ends of the point-to-point link.
This protocol is a secure means of logging in to a system using a visual desktop interface (as opposed to the text-based limitations of the SSH protocol).
Remote Desktop Protocol