Your SlideShare is downloading. ×
0
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Networking Chapter 11
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Networking Chapter 11

197

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
197
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CompTIA Network+ in a Nutshell Chapter Eleven
  • 2. Objectives• Discuss the standard methods for securing TCP/IP networks• Compare TCP/IP security standards• Implement secure TCP/IP applications
  • 3. TCP/IP and SecurityThe “inventors” of TCP/IP did not include any real security
  • 4. • User names and passwords on FTP, Telnet, etc. do not begin to protect TCP/IP applications• Today every device with a public IP address on the Internet is targeted• Data moving between two hosts is intercepted and read• TCP/IP in its original form does not stop the bad guys
  • 5. • Making TCP/IP Secure• The four areas of securing TCP/IPA. Encryption -To scramble, mix up, change data It can be unscrambled by the person receiving itB. Non-repudiation - Process that guarantees that the data is as originally sent and came from the source you think it came from
  • 6. C. Authentication -Verifying that whoever accesses the data is the person you want accessing the data/ Classic form: user name and password combinationD. Authorization- Defines what a person accessing the data can do with itExample: Windows permissions assigned to a user account
  • 7. • Encryption A. Plaintext and Cleartext -Two names for same thing Data in easily read or viewed industry-wide standard format -Does not mean that it is just “text”
  • 8. B. Cipher-series of complex and hard-to-reverse mathematics (an algorithm)-You run the cipher on a string of ones and zeroes to make a new set of ones and zeroes
  • 9. • Asymmetric-Key Algorithm Standards- Serious drawback to symmetric-key algorithms- Anyone who has the key can encrypt or decrypt data- Forces us to somehow send the key to the other person• Asymmetric-key algorithms developed as a method for the encryptor to safely send a key to the decryptor
  • 10. • Secure TCP/IP ApplicationsA. The applications that use the above standards and toolsB. HTTPS [Introduced in Chapter 9]- HTTPS documents page addresses begin with https://-Most browsers also show a lock icon somewhere- HTTPS uses SSL/TLS for

×