2 cissp ® Official Study Guide Eighth Edition


Protecting Data with Transport Encryption



Download 19,3 Mb.
Pdf ko'rish
bet179/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   175   176   177   178   179   180   181   182   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Protecting Data with Transport Encryption
Transport encryption methods encrypt data before it is transmitted, providing protection of 
data in transit. The primary risk of sending unencrypted data over a network is a sniffing 
attack. Attackers can use a sniffer or protocol analyzer to capture traffic sent over a network. 
The sniffer allows attackers to read all the data sent in cleartext. However, attackers are un-
able to read data encrypted with a strong encryption protocol.
As an example, web browsers use Hypertext Transfer Protocol Secure (HTTPS) to 
encrypt e-commerce transactions. This prevents attackers from capturing the data and 
using credit card information to rack up charges. In contrast, Hypertext Transfer Protocol 
(HTTP) transmits data in cleartext.
Almost all HTTPS transmissions use Transport Layer Security (TLS 1.1) as the underly-
ing encryption protocol. Secure Sockets Layer (SSL) was the precursor to TLS. Netscape 
created and released SSL in 1995. Later, the Internet Engineering Task Force (IETF) 
released TLS as a replacement. In 2014, Google discovered that SSL is susceptible to the 
POODLE attack (Padding Oracle On Downgraded Legacy Encryption). As a result, many 
organizations have disabled SSL in their applications.


178
Chapter 5 

Protecting Security of Assets
Organizations often enable remote access solutions such as virtual private networks 
(VPNs). VPNs allow employees to access the organization’s internal network from their 
home or while traveling. VPN traffi c goes over a public network, such as the internet, so 
encryption is important. VPNs use encryption protocols such as TLS and Internet Protocol 
security (IPsec). 
IPsec is often combined with Layer 2 Tunneling Protocol (L2TP) for VPNs. L2TP trans-
mits data in cleartext, but L2TP/IPsec encrypts data and sends it over the internet using 
Tunnel mode to protect it while in transit. IPsec includes an Authentication Header (AH), 
which provides authentication and integrity, and Encapsulating Security Payload (ESP) to 
provide confi dentiality. 
It’s also appropriate to encrypt sensitive data before transmitting it on internal networks. 
IPsec and Secure Shell (SSH) are commonly used to protect data in transit on internal net-
works. SSH is a strong encryption protocol included with other protocols such as Secure 
Copy (SCP) and Secure File Transfer Protocol (SFTP). Both SCP and SFTP are secure 
protocols used to transfer encrypted fi les over a network. Protocols such as File Transfer 
Protocol (FTP) transmit data in cleartext and so are not appropriate for transmitting sensi-
tive data over a network. 
Many administrators use SSH when administering remote servers. The clear benefi t is 
that SSH encrypts all the traffi c, including the administrator’s credentials. Historically, 
many administrators used Telnet to manage remote servers. However, Telnet sends traffi c 
over a network in cleartext, which is why administrators understand it should not be used 
today. Some people suggest that using Telnet within an encrypted VPN tunnel is accept-
able, but it isn’t. Yes, the traffi c is encrypted from the client to the VPN server. However, it 
is sent as cleartext from the VPN server to the Telnet server. 
Secure Shell (SSH) is the primary protocol used by administrators to 
connect to remote servers. Although it is possible to use Telnet over an 
encrypted VPN connection, it is not recommended, and it is simpler to 
use SSH.
Determining Ownership 
Many people within an organization manage, handle, and use data, and they have different 
requirements based on their roles. Different documentation refers to these roles a little differ-
ently. Some of the terms you may see match the terminology used in some NIST documents, 
and other terms match some of the terminology used in the European Union (EU) General 
Data Protection Regulation (GDPR). When appropriate, we’ve listed the source so that you 
can dig into these terms a little deeper if desired. 
One of the most important concepts here is ensuring that personnel know who owns 
information and assets. The owners have a primary responsibility of protecting the data 
and assets. 


Determining Ownership 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   175   176   177   178   179   180   181   182   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish