Flashcards in chapter 13 Deck (33):
what is access control list (ACL)?
An access control list (ACL) is a table that tells a computer, routers and more operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list.
the Allowing or blocking network packets into or out of a device or the network based on their application (port number).
encapsulating one protocol within another to ensure a transmission is secure is called what?
it is a special connection made over a network between two computers or network devices.
what are the tunneling protocol that we need to know about?
-virtual private network (VPN)
- Secure Socket Layer, SSL
- Layer 2 Tunneling Protocol (L2TP)
-The Point-to-Point Tunneling Protocol (PPTP)
- Generic Routing Encapsulation (GRE)
virtual private network (VPN)
a method employing encryption to provide secure access to a remote computer over the Internet.
4 categories of VPN, what are they
host to host VPNs ( remote access VPNs )
host to host VPNs
Sit to sit VPNs
Extranet VPNs ( B2B)
Secure Socket Layer, SSL
SSL is a protocol based on RSA, it is used to enable secure the session layer connection over the internet between a web browser and a web server
the SSL was merged with other Transport layer security protocol to form a new protocol named what?
Transport layer Security TLS
what is the latest version of TLS?
Layer 2 Tunneling Protocol (L2TP):
Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
The Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
What is Generic Routing Encapsulation (GRE)?
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
IP Security, IP sec is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of packets at the IP layer.
in which layer of the OSI model does IPSec work?
it work at the net work layer( layer 3), it secures all applications of that layer and the layers above it.
IPSec can work with IPv4 and IPV6. T/F
their are 2 protocol working in IPSec, what are they/
The authentication header ( AH )
encapsulation security payload ( ESP)
AH protocol within IPSec is compatible with network running NAT ( network address Translation). T/F
AH provides Authentication services only. T/F
ESP provides authentication and encryption abilities. T/F
IPSec works in 2 mode what are they?
it create secure tunnel between 2 devices end to end.
, that mean the packet is protected.
it is created between 2 endpoints like; 2 routers or 2 gateway servers, all the traffic going through the tunnel is protected.
what is encryption?
The process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents. Encrypted data is generated using an encryption program such as PGP, encryption machine, or a simple encryption key and appears as garbage until it is decrypted. To read or use the data, it must be decrypted, and only those who have the correct password or decryption key can make the data readable again.
what is an Encryption Key?
An Encryption Key is a random string of characters that is used with the encrypted algorithm to encrypt or decrypt data.
the encryption Key is unique to each transaction. T/F
Encryption Key come in 2 flavors what bare they?
public and private.
3 encryption standard, what are they?
Symmetric encryption key is ____
- Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way.
- both the sender and the receiver have the same key and use it to encrypt and decrypt all messages.
what can we say about DES, data encryption standard?
-uses lookup and functions
-uses 56 bit key
-works much faster then other complex systems.
-it is not exactly secure.
what is Triple DES?
Triple DES (3DES) is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
how many bits are in the 3DES?
56x3 = 168
of the 168 bit key of the 3DES how many are effective?