2 cissp ® Official Study Guide Eighth Edition


Transport Layer Security (TLS)



Download 19,3 Mb.
Pdf ko'rish
bet490/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   486   487   488   489   490   491   492   493   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Transport Layer Security (TLS)

TLS functions in the same general manner as SSL, but it 


uses stronger authentication and encryption protocols.
SSL and TLS both have the following features:

Support secure client-server communications across an insecure network while prevent-
ing tampering, spoofing, and eavesdropping.

Support one-way authentication.

Support two-way authentication using digital certificates.

Often implemented as the initial payload of a TCP package, allowing it to encapsulate 
all higher-layer protocol payloads.

Can be implemented at lower layers, such as layer 3 (the Network layer) to operate as a 
VPN. This implementation is known as OpenVPN.
In addition, TLS can be used to encrypt User Datagram Protocol (UDP) and Session 
Initiation Protocol (SIP) connections. (SIP is a protocol associated with Voice over IP [VoIP].)


524
Chapter 12 

Secure Communications and Network Attacks
Authentication Protocols
After a connection is initially established between a remote system and a server or a 
network, the first activity that should take place is to verify the identity of the remote 
user. This activity is known as authentication. There are several authentication protocols 
that control how the logon credentials are exchanged and whether those credentials are 
encrypted during transport:
Challenge Handshake Authentication Protocol (CHAP)

This is one of the authentication 


protocols used over Point-to-Point Protocol (PPP) links. CHAP encrypts usernames and 
passwords. It performs authentication using a challenge-response dialogue that cannot be 
replayed. CHAP also periodically reauthenticates the remote system throughout an estab-
lished communication session to verify a persistent identity of the remote client. This activ-
ity is transparent to the user.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   486   487   488   489   490   491   492   493   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish