Page 202 - CISSO_Prep_ Guide
P. 202

bank. The client can use this public key to encrypt a session
            (symmetric) key and send that to the bank. The session key can
            now be used by both the bank and the client to encrypt the
            banking data they are sharing. This is an example of the use of
            asymmetric cryptography (for key management) to enable the
            use of symmetric key cryptography (fast, confidentiality) for
            data communications.

            In the future, we may see the use of mutual authentication for
            TLS. This means that in addition to the bank sending a
            certificate to the client to prove their identity, the client would
            also have to send a certificate to the bank, proving who they are.

            SSH2
            SSH (Secure Shell) and its successor SSH2 provide an
            encrypted channel (tunnel) for logging into another computer
            over a network, executing commands on a remote computer, and
            moving files from one computer to another. SSH provides
            strong host-to-host and user authentication as well as secure
            encrypted communications over the Internet.



            Virtual Private Networks (VPNs)
            It was once eloquently written that a VPN was designed to
            "carve a tunnel through the internet." The internet is an insecure
            place, and it is rather simple to listen in on traffic passing over
            the internet or other connections such as wireless, satellite, or
            microwave. The use of a VPN to create a tunnel for the
            exclusive use of the two endpoints is a wise decision. Though ,
            it should be pointed out that not all tunnels are encrypted. Layer
            2 Forwarding (L2F), Layer 2 Tunneling Protocol (L2TP), and
            Point to Point Tunneling Protocol (PPTP) do not provide
   197   198   199   200   201   202   203   204   205   206   207