2 cissp ® Official Study Guide Eighth Edition


Password Authentication Protocol (PAP)



Download 19,3 Mb.
Pdf ko'rish
bet491/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   487   488   489   490   491   492   493   494   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Password Authentication Protocol (PAP)

This is a standardized authentication protocol 


for PPP. PAP transmits usernames and passwords in cleartext. It offers no form of encryp-
tion; it simply provides a means to transport the logon credentials from the client to the 
authentication server.
Extensible Authentication Protocol (EAP)

This is a framework for authentication instead 


of an actual protocol. EAP allows customized authentication security solutions, such as 
supporting smart cards, tokens, and biometrics. (See the sidebar “EAP, PEAP, and LEAP” 
for information about other protocols based on EAP.)
These three authentication protocols were initially used over dial-up PPP connections. 
Today, these and many other, newer authentication protocols (such as openID, OAuth, and 
Shibboleth) and concepts (such as authentication federation and SAML) are in use over a 
wide number of distance connection technologies, including broadband and virtual private 
networks (VPNs), as well as expanding support and using traditional authentication
services, such as Kerberos, Remote Authentication Dial-in User Service (RADIUS), and 
even Terminal Access Controller Access Control System Plus (TACACS+).
eAP, PeAP, and leAP
Protected Extensible Authentication Protocol (PEAP)
encapsulates EAP in a TLS tunnel. 
PEAP is preferred to EAP because EAP assumes that the channel is already protected 
but PEAP imposes its own security. PEAP is used for securing communications over 
802.11 wireless connections. PEAP can be employed by Wi-Fi Protected Access (WPA) 
and WPA-2 connections.
PEAP is also preferred over Cisco’s proprietary EAP known as 
Lightweight Extensible 
Authentication Protocol (LEAP)
. LEAP was Cisco’s initial response to insecure WEP. LEAP 
supported frequent reauthentication and changing of WEP keys (whereas WEP used 
single authentication and a static key). However, LEAP is crackable using a variety of tools 
and techniques, including the exploit tool Asleap.


Secure Voice Communications 
525
Secure Voice Communications
The vulnerability of voice communication is tangentially related to information technology 
(IT) system security. However, as voice communication solutions move on to the net-
work by employing digital devices and VoIP, securing voice communications becomes an 
increasingly important issue. When voice communications occur over the IT infrastruc-
ture, it is important to implement mechanisms to provide for authentication and integrity. 
Confidentiality should be maintained by employing an encryption service or protocol to 
protect the voice communications while in transit.
Normal 
private branch exchange (PBX)
or 
POTS/public switched telephone network 
(PSTN)
voice communications are vulnerable to interception, eavesdropping, tapping, 
and other exploitations. Often, physical security is required to maintain control over voice 
communications within the confines of your organization’s physical locations. Security of 
voice communications outside your organization is typically the responsibility of the phone 
company from which you lease services. If voice communication vulnerabilities are an 
important issue for sustaining your security policy, you should deploy an encrypted com-
munication mechanism and use it exclusively.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   487   488   489   490   491   492   493   494   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish