Download - Networking Chapter 11
![Page 1: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/1.jpg)
CompTIA Network+CompTIA Network+in a Nutshellin a Nutshell
Chapter ElevenChapter Eleven
![Page 2: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/2.jpg)
• Discuss the standard methods for securing TCP/IP networks
• Compare TCP/IP security standards • Implement secure TCP/IP applications
ObjectivesObjectives
![Page 3: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/3.jpg)
TCP/IP and SecurityTCP/IP and Security
The “inventors” of TCP/IP did not include any real security
![Page 4: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/4.jpg)
• User names and passwords on FTP, Telnet, etc. do not begin to protect TCP/IP applications
• Today every device with a public IP address on the Internet is targeted
• Data moving between two hosts is intercepted and read
• TCP/IP in its original form does not stop the bad guys
![Page 5: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/5.jpg)
• Making TCP/IP Secure • The four areas of securing TCP/IP A. Encryption -To scramble, mix up, change data
It can be unscrambled by the person receiving it
B. Non-repudiation - Process that guarantees that the data is as originally sent and came from the source you think it came from
![Page 6: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/6.jpg)
C. Authentication -Verifying that whoever accesses the data is the person you want accessing the data/ Classic form: user name and password combination
D. Authorization- Defines what a person accessing the data can do with it
Example: Windows permissions assigned to a user account
![Page 7: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/7.jpg)
• Encryption A. Plaintext and Cleartext
-Two names for same thing Data in easily read or viewed industry-wide standard format -Does not mean that it is just “text”
![Page 8: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/8.jpg)
B. Cipher -series of complex and hard-to-reverse mathematics (an algorithm) -You run the cipher on a string of ones and zeroes to make a new set of ones and zeroes
![Page 9: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/9.jpg)
• Asymmetric-Key Algorithm Standards - Serious drawback to symmetric-key algorithms- Anyone who has the key can encrypt or decrypt data - Forces us to somehow send the key to the other
person • Asymmetric-key algorithms developed as a method
for the encryptor to safely send a key to the decryptor
• 3. Use two different keys (a key pair)
![Page 10: Networking Chapter 11](https://reader036.vdocuments.mx/reader036/viewer/2022082623/547a4cd5b37959652b8b4958/html5/thumbnails/10.jpg)
• Secure TCP/IP Applications A. The applications that use the above standards
and tools B. HTTPS [Introduced in Chapter 9] - HTTPS documents page addresses begin with
https:// -Most browsers also show a lock icon somewhere - HTTPS uses SSL/TLS for authentication/encryption