Page 305 - CISSO_Prep_ Guide
P. 305

•  Screened host – uses both packet filtering
                   router and a bastion host.
               •  Screened subnet – two separate packet filters.
               •  3 legged firewall – DMZ.
               •  Firewall virtualization – use if you need VLANs.


               Internet & Web Security Technologies
               •  SSL:
                       •  Record Protocol - used to pass messages.
                       •  Handshake protocol - used to establish
                          an SSL connection.
               •  Transport Layer Security (TLS) – authentication
                   and protection.
               •  WTLS – TLS for cell phones, not wireless LANs.
                       •  Built into the stack, so you just have to
                          turn it on.
                       •  Encryption & authentication.
                       •  Encryption stops at the gateway (SSL
                          from the gateway to the webserver) →
                          version 1 only (but nobody uses v2 yet).
               •  Application layer security protocols
                       •  Secure remote procedure call (S-RPC).
                       •  Dnssec.
                       •  S-HTTP.
                       •  Electronic payment schemes (SET, Ecash,
                          net cash, Mondex, Cybercash, etc.)

               Voice Over IP (VOIP)
               •  Easier to wiretap.
   300   301   302   303   304   305   306