2 cissp ® Official Study Guide Eighth Edition


Secure Communications Protocols



Download 19,3 Mb.
Pdf ko'rish
bet489/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   485   486   487   488   489   490   491   492   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

523
Secure Communications Protocols
Protocols that provide security services for application-specific communication channels 
are called secure communication protocols. The following list includes a small sampling of 
some of the options available:
IPsec

Internet Protocol security (IPsec) uses public key cryptography to provide encryption, 


access control, nonrepudiation, and message authentication, all using IP-based protocols. The pri-
mary use of IPsec is for virtual private networks (VPNs), so IPsec can operate in either transport 
or tunnel mode. IPsec is discussed further in Chapter 7, “PKI and Cryptographic Applications.”
Kerberos

Kerberos offers a single sign-on solution for users and provides protection 


for logon credentials. Modern implementations of Kerberos use hybrid encryption to 
provide reliable authentication protection. Kerberos is discussed further in Chapter 13, 
“Cryptography and Symmetric Key Algorithms.”
SSH

Secure Shell (SSH) is a good example of an end-to-end encryption technique. This 


security tool can be used to encrypt numerous plaintext utilities (such as rcp, rlogin, rexec), 
serve as a protocol encrypter (such as with SFTP), and function as a VPN.
Signal Protocol

This is a cryptographic protocol that provides end-to-end encryption for 


voice communications, videoconferencing, and text message services. The Signal Protocol 
is nonfederated and is a core element in the messaging app named Signal.
Secure Remote Procedure Call (S-RPC)

This is an authentication service and is simply a 


means to prevent unauthorized execution of code on remote systems.
Secure Sockets Layer (SSL)

This is an encryption protocol developed by Netscape to 


protect the communications between a web server and a web browser. SSL can be used 
to secure web, email, File Transfer Protocol (FTP) or even Telnet traffic. It is a session-
oriented protocol that provides confidentiality and integrity. SSL is deployed using a 40-bit 
key or a 128-bit key. SSL is superseded by Transport Layer Security (TLS).

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   485   486   487   488   489   490   491   492   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish