Chapter 32 - Security in The Internet
Chapter 32 - Security in The Internet
32.2
32.4
32.5
Note
IPSec in the transport mode does not protect the IP header; it only protects the information coming from the transport layer.
32.6
32.7
32.8
Note
32.9
32.10
Note
The AH Protocol provides source authentication and data integrity, but not privacy.
32.11
32.12
Note
32.13
32.14
32.15
Note
32.16
32.17
32.18
32.19
32.20
32.21
32.22
32-2 SSL/TLS
Two protocols are dominant today for providing security at the transport layer: the Secure Sockets Layer (SSL) Protocol and the Transport Layer Security (TLS) Protocol. The latter is actually an IETF version of the former.
Topics discussed in this section:
SSL Services Security Parameters Sessions and Connections Four Protocols Transport Layer Security
32.23
32.24
32.25
32.26
Note
The client and the server have six different cryptography secrets.
32.27
32.28
32.29
32.30
32.31
32-3 PGP
One of the protocols to provide security at the application layer is Pretty Good Privacy (PGP). PGP is designed to create authenticated and confidential e-mails.
32.33
Note
In PGP, the sender of the message needs to include the identifiers of the algorithms used in the message as well as the values of the keys.
32.34
32.35
32.36
32.37
Note
In PGP, there can be multiple paths from fully or partially trusted authorities to any subject.
32.38
32-4 FIREWALLS
All previous security measures cannot prevent Eve from sending a harmful message to a system. To control access to a system, we need firewalls. A firewall is a device installed between the internal network of an organization and the rest of the Internet. It is designed to forward some packets and filter (not forward) others. Topics discussed in this section:
Packet-Filter Firewall Proxy Firewall
32.39
32.40
32.41
Note
32.42
32.43
Note
32.44