Section 11: securing TCP/IP

Get Started. It's Free
or sign up with your email address
Section 11: securing TCP/IP by Mind Map: Section 11: securing TCP/IP

1. 64. Symmetric encryption

1.1. - algorithms is the process that stirs up the values

1.2. - The algorithm we can call it the Key and the key always has to be 8 characters and it has to be a number between 0-9

1.3. - The algorithm works in this way : we run clear text through the algorithm and then we get cyphertext

2. 65. Asymmetric encryption

2.1. - in asymmetric encryption you have two keys :

2.1.1. - 1- public key : can do only encrypt

2.1.2. - 2- private key : can do only decrypt

2.2. - For two people to communicate they must exchange public keys

3. 66. Cryptographic hashes

3.1. - Hash is algorithm that doesn’t encrypt

3.2. - Hash algorithm creates a fixed size hash value

3.3. - Hash used to verify data integrity

3.4. - Hash can use MD5 and SHA1

4. 67.Access control

4.1. - Access control including: authentication and authorization

4.2. - For network plus make sure you have this 3 :

4.2.1. 1-mandatory access control ( uses labels) ,

4.2.2. 2- discretionary access control

4.2.3. 3- role based access control ( uses group)

5. 68.AAA

5.1. - RADIUS provides AAA : authentication, authorization, accounting

5.2. - TACACS + uses TCP port 49

5.3. - RADIUS client ia an intermediate agent between a RADIUS supplicant and RADIUS server

6. 69.kerberos / EAP

6.1. - kerberos is designed to do authentication for local areas network

6.2. - Key distribution center consists of 2 really important services :

6.2.1. - 1- authentication server

6.2.2. - 2- ticket granting service

6.3. - EAP enables flexible authentication

7. 70. Cryptographic tunnels with SSH

7.1. - Tunnels are used to encrypt unencrypted protocols

8. 71.network time protocol

8.1. - the network time protocol tells the current time

8.2. - NTP uses on port 123

8.3. - There are hundreds of NTP servers to choose from worldwide