Professional Documents
Culture Documents
Endpoint Security and Authentication
Endpoint Security and Authentication
Endpoint authentication:
Endpoint security:
Which of the following kinds of firewall can explicitly target HTTP protocol
attacks?
Stateless firewall
Stateful firewall
Circuit-level gateway (THIS ONE)
Application proxy
Access Management:
Monitors traffic
An IDS cannot take immediate action
A Virtual Private Network (VPN) provides the same network connectivity for
remote users over a public infrastructure as they would have over a private
network
VPN services for network connectivity include: authentication, data integrity,
confidentiality
Lower cost, More flexible, simpler management, tunnel topology
Site-to-site VPNs:
This mode is applicable only for host-to-host security. Here protection extends
to the payload of IP data. The IP addresses of the hosts must be public IP
addresses
Tunnel Mode
This mode is used to provide data security between two networks. It provides
protection for the entire IP packet and is sent by adding an outer IP header
The IPsec transform set specifies the cryptographic algorithms and functions
(transforms) that a router employs on the actual data packets sent through
the IPsec tunnel. These algorithms include the encryption, encapsulation,
authentication, and data integrity services that IPsec can apply
3DES
Cryptography
Cryptoanalysis
SIGINT
COMINT
ELINT