2 cissp ® Official Study Guide Eighth Edition


Know the common applications of cryptography to secure networking



Download 19,3 Mb.
Pdf ko'rish
bet260/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   256   257   258   259   260   261   262   263   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know the common applications of cryptography to secure networking.
The IPsec pro-
tocol standard provides a common framework for encrypting network traffic and is built 
into a number of common operating systems. In IPsec transport mode, packet contents are 
encrypted for peer-to-peer communication. In tunnel mode, the entire packet, including 
header information, is encrypted for gateway-to-gateway communications.
Be able to describe IPsec.
IPsec is a security architecture framework that supports secure 
communication over IP. IPsec establishes a secure channel in either transport mode or tun-
nel mode. It can be used to establish direct communication between computers or to set 
up a VPN between networks. IPsec uses two protocols: Authentication Header (AH) and 
Encapsulating Security Payload (ESP).
Be able to explain common cryptographic attacks.
Brute-force attacks are attempts to 
randomly find the correct cryptographic key. Known plaintext, chosen ciphertext, and 
chosen plaintext attacks require the attacker to have some extra information in addition 
to the ciphertext. The meet-in-the-middle attack exploits protocols that use two rounds of 
encryption. The man-in-the-middle attack fools both parties into communicating with the 
attacker instead of directly with each other. The birthday attack is an attempt to find colli-
sions in hash functions. The replay attack is an attempt to reuse authentication requests.
Understand uses of digital rights management (DRM).
Digital rights management (DRM) 
solutions allow content owners to enforce restrictions on the use of their content by oth-
ers. DRM solutions commonly protect entertainment content, such as music, movies, and 
e-books but are occasionally found in the enterprise, protecting sensitive information stored 
in documents.
Written Lab
1.
Explain the process Bob should use if he wants to send a confidential message to Alice 
using asymmetric cryptography.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   256   257   258   259   260   261   262   263   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish