3.0 Implementation Flashcards
network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data
And uses port 22
SSH Secure Shell
A set of specifications for securing electronic mail and a technology that allows you to encrypt your emails. based on asymmetric cryptography to protect your emails from unwanted access.
Now a successor for PEM
Secure/Multipurpose Internet Mail Extensions S/MIME
The protocol provides encryption, confidentiality, message authentication, and replay protection to your transmitted audio and video traffic
Uses UDP protocol
SRTP Secure Real Time Transport Protocol
is an open and cross platform protocol used for directory services authentication
uses port 389
Lightweight Directory Access Protocol
is an open and cross platform protocol used for directory services authentication however its over SSL
uses port 636
LDAP Secure
standard communication protocol used for the transfer of computer files from a server to a client on a computer
uses port 21 and 20
FTP File Transfer Protocol
standard communication protocol used for the transfer of computer files from a server to a client or client to server however its add on encryption
Uses port 990
FTPS Secure
a network protocol for securely accessing, transferring and managing large files and sensitive data and uses ssh
Uses port 22
SSH FTP
an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN)
includes new security features that add support for authentication and encryption of messages as well as protecting packets during transit
Use port 161 and 162
simple network management protocol v3
What protocol uses port 80?
HTTP
What protocol uses port 443?
HTTPS
a group of networking protocols used for setting up secure encrypted connections, such as VPNs, across publicly shared networks
IPSec
protocol provides data origin authentication, data integrity, and replay protection. However, it does not provide data confidentiality, which means that all of your data is sent in the clear
Authentication Header
protocol provides data confidentiality, and also optionally provides data origin authentication, data integrity checking, and replay protection
ESP encapsulating security payload
IPsec mode sets up a secure connection
IP Tunnel
IPsec Mode only encrypts the data being sent without establishing a secure connection
IP Transport mode
commonly used message request protocol in the Internet world for transferring messages from an e-mail server to an e-mail client.
uses port 110
Post Office Protocol
a protocol where email clients to retrieve email messages from a mail server over a TCP/IP connection
uses port 143
Internet Message Access Protocol (IMAP)
a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop
Anti Virus
a type of software program created to protect information technology (IT) systems and individual computers from malicious software
anti malware
an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware
endpoint detection and response
makes sure that users do not send sensitive or critical information outside the corporate network
data loss prevention
third generation of firewall technology, designed to address advanced security threats at the application level through intelligent, context-aware security features
next generation firewall NGFW
an approach to security that relies on third-party software tools to identify and prevent malicious activities. prevention systems are typically used to protect endpoint devices
Host IPS Intrusion Base Prevention System