Page 198 - CISSO_Prep_ Guide
P. 198

payment devices. For most devices, the data is encrypted over
            the wireless link and then decrypted at the wireless gateway
            before being re-encrypted to transmit over the internet to the
            bank. If a person taps into the wireless access point, then they
            can capture the payment card data at that moment that it is
            unencrypted.


            Network Layer Encryption

            Encryption at the network layer is done using IPsec (Internet
            Protocol Security). IPsec has several modes of operation that
            can be used; Authentication Header (AH) and Encapsulating
            Security Payload (ESP). Each mode has a different function.

            Authentication Header is used to do what its name says -
            authenticate the IP header information. In the IP header are
            several fields, including the source and destination addresses,
            and a checksum that is used for integrity.

            IPSEC is designed to ensure the integrity and authentication of
            two parties that are communicating over the internet - a
            connectionless communications process. How can we know
            whom we are talking to (preventing masquerading, man-in-the-
            middle, or spoofing) and know that our communications have
            not been altered en route? This is what AH can do for us.

            The first step in establishing an IPsec tunnel is using IKE
            (internet key exchange) to exchange a SA (security association)
            via Oakley and ISAKMP (Internet Security Association Key
            Management Protocol). Oakley is an implementation of the
            Diffie-Hellman key agreement protocol and sets up the
            encryption keys to be used. The SA is used in IPsec to validate
   193   194   195   196   197   198   199   200   201   202   203