Chapter 12- Secure Communications and Network Attacks Flashcards
- List some protocols that provide security services for application specific communications i.e. secure communications protocols: Internet Protocol Security (IPSec)
- Kerberos
- Secure Shell
- Signal Protocol
- Secure Remote Procedure Call (S-RPC)
- Secure Socket Layer (SSL)
- Transport Layer Security (TLS)
- Describe IPSec:
Internet Protocol Security (IPSec) uses public key cryptography to provide encryption, access control, non-repudiation and message authentication all using IP based protocols.
- Describe Kerberos:
Kerberos offers a single sign on solution for users and provides protection for log on credentials.
- What is Secure Remote Procedure Call (S-RPC)?
Secure Remote Procedure Call (S-RPC) is an authentication service and is simply a means to prevent unauthorised execution of code on remote systems.
- What is Secure Socket Layer (SSL)?
Secure Socket Layer (SSL) is an encryption protocol to protect communications between web server and web browser.
• SSL can be used to secure web, email, File Transfer Protocol (FTP) or even Telnet
- What is Transport Layer Security (TLS)?
Transport Layer Security uses stronger authentication and encryption protocols.
- Similarities of TSL and SSL: both secure client server communications across insecure network
- Support one way authentication
- Support 2way authentication using digital certificates
- Implemented at the initial payload of a TCP package, alloing it to encapsulate higher payloads
- Can be implemented at lower levels (e.g. layer 3) i.e. open VPN
- Advantages of TLS:
it can be used to encrypt User Datagram Protocol (UDP) and Session Initiation Protocol (SIP)
- List some authentication protocols:
CHAP, PAP, EAP
- Explain Challenge Handshake Authentication Protocol (CHAP):
Challenge Handhsake Authentication Protocol (CHAP) is on of the protocols uses over Point-to-Point Protocol (PPP)
• Encrypts user names and passwords
• This activity is transparent to the user.
- What is Point-to-Point Protocol?
Point-to-Point Protocol is a data link 2 communication protocol between 2 routers directly without any host or any other networking in between.
- What is Password Authentication Protocol (PAP)?
Password Authentication Protocol (PAP) is a standardised authentication protocol for PPP. PAP offers no encryption.
- What is Extensible Authentication Protocol?
Extensible Authentication Protocol (EAP) is a framework for authentication rather thana protocol. It allows customised authentication security solutions e.g. tokens, biometrics etc.
- PBX means
Private Branch Exchange
- PSTN means
Public Switched Telephone Network (PSTN)
- Vulnerabilities of Public Branch Exchange (PBX) and Public Switched Telephone Network (PSTN) are voice communications are vulnerable to
interception, eavesdropping, tapping etc.
- Phreakers are:
Phreakers are malicious attackers that abuse phone systems. Phreakers may be able to gain unauthorized access to personal voice mailboxes, redirect messages, block access, and redirect inbound and outbound calls.
- What is Instant Messaging (IM)?
Instant Messaging (IM) is a mechanism that allows for real time text based chat between 2 users located anywhere on the internet. E.g. Facebook, Skype, Google hangouts etc.
- Use of Simple Mail Transfer Protocol (SMTP) are:
Simple Mail Transfer Protocol (SMTP) are used to accept messages from clients, transport those messages to servers and deposit them into user’s server based inbox transfer.
• Sender Policy Framework can be used to configure SMTP servers to protect against Spam and email spoofing
- _________ is the most common SMTP server for Unix systems, and ________ is the most common SMTP server for Microsoft systems.:
Sendmail, Exchange
- List some email security solutions:
Secure Multipurpose Internet Mail Extensions (S/MIME).
- Describe Secure Multipurpose Internet Mail extension (S/MIME) messages:
: S/MIME Signed messages: provides integrity, sender authentication and nonrepudiation.
• An enveloped message provides integrity, sender authentication and confidentiality.
- MOSS means
MIME Object Security Services (MOSS)
• *MIME means Multipurpose Internet Mail Extensions
• MOSS used RC4, MD2, MD 5, RSA and DES
- MIME Object Security Services (MOSS) can provide ____,____,____and ____ for email messages.
authentication, confidentiality, integrity, and nonrepudiation