This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Introduction to Cryptography
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Secure Socket Layer (SSL)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Authentication and Access Control Chapter 13 Networking Essentials Spring, 2013.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Network Security David Lazăr.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security Infrastructure Services Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Using CertificatesPlan infrastructure services server.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Install AD Certificate Services
Presentation transcript:

This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to accompany the courseware may be copied, photocopied, reproduced, or re-used in any form or by any means without permission in writing from a director of gtslearning International Limited. Violation of these laws will lead to prosecution. All trademarks, service marks, products, or services are trademarks or registered trademarks of their respective holders and are acknowledged by the publisher. All gtslearning products are supplied on the basis of a single copy of a course per student. Additional resources that may be made available from gtslearning may only be used in conjunction with courses sold by gtslearning. No material changes to these resources are permitted without express written permission by a director of gtslearning. These resources may not be used in conjunction with content from any other supplier. If you suspect that this course has been copied or distributed illegally, please telephone or gtslearning. 5.2 Remote Access Services CompTIA Server+ Certification (Exam SK0-004)

Objectives Understand the use of encryption and hashing technologies and PKI Identify the use of protocols to configure a remote access server or VPN 5.2 Remote Access Services 396

Encryption o Scramble a message (plaintext) in such a way (ciphertext) that it can only be unscrambled with the key Confidentiality / privacy / integrity o Users cannot read the messages without the key o Users should be confident the message is as the sender composed it Authentication o Possessing the key might demonstrate that only the holder could have composed a message Digital Security 5.2 Remote Access Services 396

The same key is used both to encrypt and decrypt messages Referred to as secret key or single key Distribution of the key is difficult Symmetric encryption is not processor intensive – suitable for encrypting and decrypting large files quickly DES, AES, RC (Rivest Cipher), IDEA, Blowfish/Twofish, and CAST Key size Symmetric Encryption 5.2 Remote Access Services 396

Uses two linked keys (a key pair) – one to encrypt and the other to decrypt Referred as public key cryptography Public key is distributed to anyone Private key is kept secret by the owner Processor-intensive – only works well on short messages Often used for authentication and exchanging symmetric encryption keys securely Asymmetric Encryption 5.2 Remote Access Services 397

Means of vouching for a subject’s identity A Certificate Authority (CA) issues a Digital Certificates to a web server computer whose identity they have validated The digital certificate contains the server’s public key and is digitally signed by the CA Clients can use the public key to communicate with the server securely Clients can trust that the server is genuine if they trust the CA Clients are installed with the root certificates of CAs that they trust Public Key Infrastructure (PKI) 5.2 Remote Access Services 397

Cryptographic Hashes A hash creates a shorter fixed length digest from an original message A cryptographic creates a one-way digest – the original message cannot be recovered from the digest Secure Hash Algorithm (SHA-1 and SHA-2) Message Digest (MD5) 5.2 Remote Access Services 398

Remote Access Services (RAS) Tunneling / encapsulation Remote Access Services 5.2 Remote Access Services 398

Virtual Private Networks Host-to-site Site-to-site Host-to-host 5.2 Remote Access Services 399

Point-to-Point Protocol (PPP) PPP over Ethernet (PPPoE) Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) IPsec Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Remote Access Protocols 5.2 Remote Access Services 400

Remote Access Servers Dial-up o Configure user rights o Callback o Authentication o Encryption VPN RAS 5.2 Remote Access Services 401

RADIUS and TACACS+ 5.2 Remote Access Services 401

PAP and CHAP Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Standard authentication protocol for PPP Three-way handshake o Challenge o Response o Accept Handshake is repeated during the session to prevent replay MS-CHAP 5.2 Remote Access Services 402

EAP / IEEE 802.1X Extensible Authentication Protocol (EAP) Designed to provide for interoperable security devices and software o Supplicant o Authenticator o Authentication Server EAP-TLS (Transport Layer Security) Protected EAP (PEAP) EAP-TTLS (Tunneled Transport Layer Security) 5.2 Remote Access Services 403

Review Understand the use of encryption and hashing technologies and PKI Identify the use of protocols to configure a remote access server or VPN 5.2 Remote Access Services 405