Section 11: securing TCP/IP

Get Started. It's Free
or sign up with your email address
Section 11: securing TCP/IP by Mind Map: Section 11: securing TCP/IP

1. 66. Cryptographic hashes

1.1. - Hash is algorithm that doesn’t encrypt

1.2. - Hash algorithm creates a fixed size hash value

1.3. - Hash used to verify data integrity

1.4. - Hash can use MD5 and SHA1

2. 67.Access control

2.1. - Access control including: authentication and authorization

2.2. - For network plus make sure you have this 3 :

2.2.1. 1-mandatory access control ( uses labels) ,

2.2.2. 2- discretionary access control

2.2.3. 3- role based access control ( uses group)

3. 68.AAA

3.1. - RADIUS provides AAA : authentication, authorization, accounting

3.2. - TACACS + uses TCP port 49

3.3. - RADIUS client ia an intermediate agent between a RADIUS supplicant and RADIUS server

4. 70. Cryptographic tunnels with SSH

4.1. - Tunnels are used to encrypt unencrypted protocols

5. 64. Symmetric encryption

5.1. - algorithms is the process that stirs up the values

5.2. - The algorithm we can call it the Key and the key always has to be 8 characters and it has to be a number between 0-9

5.3. - The algorithm works in this way : we run clear text through the algorithm and then we get cyphertext

6. 65. Asymmetric encryption

6.1. - in asymmetric encryption you have two keys :

6.1.1. - 1- public key : can do only encrypt

6.1.2. - 2- private key : can do only decrypt

6.2. - For two people to communicate they must exchange public keys

7. 69.kerberos / EAP

7.1. - kerberos is designed to do authentication for local areas network

7.2. - Key distribution center consists of 2 really important services :

7.2.1. - 1- authentication server

7.2.2. - 2- ticket granting service

7.3. - EAP enables flexible authentication

8. 71.network time protocol

8.1. - the network time protocol tells the current time

8.2. - NTP uses on port 123

8.3. - There are hundreds of NTP servers to choose from worldwide