Transport Level Security
34 Questions
12 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does SSL do?

Provides security services between TCP and applications that use TCP

What is the internet standard version called?

Transport Layer Services

Why are protocol mechanisms involved in SSL/TLS?

Protocol mechanisms to enable 2 TCP users to determine the security mechanisms and services they will use

What are the threats in web security in terms of integrity?

<p>Change in user data, trojan horse browser and modification of memory</p> Signup and view all the answers

What are the consequences in web security in terms of integrity?

<p>Information being lost, machine is compromised, become vulnerable to threats</p> Signup and view all the answers

What are the countermeasures in web security in terms of integrity?

<p>Crytographic checksums</p> Signup and view all the answers

What are the threats in web security in terms of Confidentiality?

<p>Network being eavesdropped, info from server being stolen, data from client being stolen, info about network configuration</p> Signup and view all the answers

What are the consequences in web security in terms of confidentiality ?

<p>Information and privacy being lost</p> Signup and view all the answers

What are the countermeasures in web security in terms of confidentiality ?

<p>Encryption and web proxies</p> Signup and view all the answers

What are the threats in web security in terms of denial of service?

<p>Machine is filled with ridiculous requests, filling up disk or memory, isolating machine by DNS attacks</p> Signup and view all the answers

What are the consequences in web security in terms of denial of service?

<p>Annoying, could not get work done, disruptive</p> Signup and view all the answers

What are the countermeasures in web security in terms of denial of service?

<p>Difficult to prevent</p> Signup and view all the answers

What are the threats in web security in terms of authentication?

<p>Impersonation of legitimate users, data forgery</p> Signup and view all the answers

What are the consequences in web security in terms of authentication?

<p>Misrepresantation of user, believing false info</p> Signup and view all the answers

What are the countermeasures in web security in terms of authentication?

<p>Cryptographic techniques</p> Signup and view all the answers

What is the adavantage IP/IPSec in the network level of TCP/IP protocol stack?

<p>It is transparent to end users and applications and provides a general purpose solution</p> Signup and view all the answers

What are the advantages of SSL or TLS in the transport level of TCP/IP protocol stack?

<p>Transparent to applications or embedded in specific packages</p> Signup and view all the answers

What are the securiy features in application level of TCP/IP protocol stack?

<p>Kerberos, S/MIME, PGP, SET. They are embedded within an application. Service can be tailored to specific needs of a given application</p> Signup and view all the answers

How is SSL designed?

<p>SSL is designed to make use of the TCP to provide a reliable end to end secure service. It is a two layer protocol</p> Signup and view all the answers

What is SSL handshake protocol used for?

<p>Management of SSL exchanges</p> Signup and view all the answers

What is the used of SSL record protocol?

<p>Provides basic security to various higher layered protocols</p> Signup and view all the answers

What is the handshake protocol?

<p>Negotiation of security algorithm and parameters, key exchange, server authentication and optionally client authentication</p> Signup and view all the answers

What is the record protocol?

<p>Fragmentation, compression, message authentication and integrity protection, encryption</p> Signup and view all the answers

What is the Alert protocol?

<p>Error messages</p> Signup and view all the answers

What is the change cipher spec protocol?

<p>A single message that indicates the end of a SSL handshake</p> Signup and view all the answers

What is a SSL session?

<p>A session created between the server and the client using the handshake protocol. A session defines a set of cryptographic security parameters which can be shared among multiple connections.</p> Signup and view all the answers

What is SSL connection?

<p>A connection is transport that provides a suitable type of service</p> Signup and view all the answers

What are the parameters defining an SSL session?

<p>Session identifier, peer ceritificate, compression method, cipher spec, master secret, is resumable</p> Signup and view all the answers

What are the parameters defining a SSL connection state?

<p>Server and client random, server write MAC secret, client write MAC secret, server write key, client write key, initialisation vectors, sequence numbers</p> Signup and view all the answers

What is the confidentiality service provided by the SSL handshake protocol?

<p>Defines a shared secret key that is used for conventional encryption of SSL payloads.</p> Signup and view all the answers

What is the message integrity service provided by the SSL handshake protocol?

<p>Defines a shared key that is used to form a message authentication code(MAC)</p> Signup and view all the answers

What is transport layer security?

<p>Derived from secure sockets layer and used to provide security at the transport layer</p> Signup and view all the answers

What does TLS prevent and who does it protect?

<p>Eavesdropping, tampering and message forgery. Protecting communicating applications and their users on the internet</p> Signup and view all the answers

Why is the handshake protocol the most complex part of SSL?

<p>Allows the server and client to authenticate each other. Negotiation of encryption, MAC algorithm and cryptographic keys. Used before any application data is transmitted.</p> Signup and view all the answers

More Like This

Chronic Kidney Disease and Urate
36 questions
Railway Administration Rules
40 questions

Railway Administration Rules

SolicitousOklahomaCity avatar
SolicitousOklahomaCity
Creativity Exercise - Level 6
4 questions

Creativity Exercise - Level 6

InvincibleCreativity avatar
InvincibleCreativity
Use Quizgecko on...
Browser
Browser