4.5 Secure Protocols Flashcards

(5 cards)

1
Q

Unencrypted network data

A

Network traffic is important data– Everything must be protected
* Some protocols aren’t encrypted– All traffic sent in the clear– Telnet, FTP, SMTP, IMAP
* Verify with a packet capture– View everything sent over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol selection

A
  • Use a secure application protocol– Built-in encryption
  • A secure protocol may not be available. This may be a dealbreaker.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Selection (see example in notes)

A
  • Secure and insecure application connections may be
    available– It’s common to run secure and insecure on different ports
  • HTTP and HTTPS– In-the-clear and encrypted web browsing– HTTP: Port 80– HTTPS: Port 443
  • The port number does not guarantee security– Confirm the security features are enabled– Packet captures may be necessary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport method

A
  • Don’t rely on the application– Encrypt everything over the current
    network transport
  • 802.11 Wireless– Open access point: No transport-level encryption– WPA3: All user data is encryp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual private network (VPN)

A

– Create an encrypted tunnel– All traffic is encrypted and protected– Often requires third-party services and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly