3.2 Secure communication Flashcards

(11 cards)

1
Q

VPN

A
  • Virtual Private Networks– Encrypted (private) data traversing a public network
  • Concentrator– Encryption/decryption access device– Often integrated into a firewall
  • Many deployment options– Specialized cryptographic hardware– Software-based options available
  • Used with client software - Sometimes built into the OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encrypted tunnel

A
  • Keep data private across the public Internet– Encryption is the key
  • Encrypt your data - Add new headers and trailers
  • Decrypt on the other side - Original data is delivered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSL/TLS VPN (Secure Sockets Layer VPN)

A

Uses common SSL/TLS protocol (tcp/443)– (Almost) No firewall issues!
* No big VPN clients– Usually remote access communication
* Authenticate users– No requirement for digital certificates or shared
passwords (like IPSec)
* Can be run from a browser or from a (usually light)
VPN client– Across many operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSL/TLS VPN

A
  • On-demand access from a remote device– Software connects to a VPN concentrator
  • Some software can be configured as always-on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site-to-site IPsec VPN

A
  • Always-on– Or almost always
  • Firewalls often act as VPN concentrators– Probably already have firewalls in place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SD-WAN

A
  • Software Defined Networking in a Wide Area Network– A WAN built for the cloud
  • The data center used to be in one place– The cloud has changed everything
  • Cloud-based applications communicate directly
    to the cloud– No need to hop through a central point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Access Service Edge (SASE)

A
  • Update secure access for cloud services– Securely connect from different locations
  • Secure Access Service Edge (SASE)– A “next generation” VPN
  • Security technologies are in the cloud– Located close to existing cloud services
  • SASE clients on all devices– Streamlined and automatic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Selection of effective controls

A

Many different security options– Selecting the right choice can be challenging
* VPN– SSL/TLS VPN for user access– IPsec tunnels for site-to-site access
SSL/TLS VPN
2
* SD-WAN– Manage the network connectivity to the cloud– Does not adequately address security concerns
* SASE– A complete network and security solution– Requires planning and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL/TLS VPN process.

A
  1. Remote user creates a secure tunnel to the VPN concentrator.
  2. VPN concentrator
    decrypts the tunneled
    traffic and routes it
    into the corporate network.
  3. The process is reversed
    for the return traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Site to Site IPsec VPN process.

A
  1. Traffic is encrypted
    as it passes through the
    local VPN concentrator.
  2. Traffic is decrypted
    in the VPN concentrator
    on the other side of
    the tunnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Access Service Edge (SASE) See course notes example

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly