Page 202 - CISSO_Prep_ Guide
P. 202
bank. The client can use this public key to encrypt a session
(symmetric) key and send that to the bank. The session key can
now be used by both the bank and the client to encrypt the
banking data they are sharing. This is an example of the use of
asymmetric cryptography (for key management) to enable the
use of symmetric key cryptography (fast, confidentiality) for
data communications.
In the future, we may see the use of mutual authentication for
TLS. This means that in addition to the bank sending a
certificate to the client to prove their identity, the client would
also have to send a certificate to the bank, proving who they are.
SSH2
SSH (Secure Shell) and its successor SSH2 provide an
encrypted channel (tunnel) for logging into another computer
over a network, executing commands on a remote computer, and
moving files from one computer to another. SSH provides
strong host-to-host and user authentication as well as secure
encrypted communications over the Internet.
Virtual Private Networks (VPNs)
It was once eloquently written that a VPN was designed to
"carve a tunnel through the internet." The internet is an insecure
place, and it is rather simple to listen in on traffic passing over
the internet or other connections such as wireless, satellite, or
microwave. The use of a VPN to create a tunnel for the
exclusive use of the two endpoints is a wise decision. Though ,
it should be pointed out that not all tunnels are encrypted. Layer
2 Forwarding (L2F), Layer 2 Tunneling Protocol (L2TP), and
Point to Point Tunneling Protocol (PPTP) do not provide