Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. Its important to have the big picture

Each of the protocols covered in this chapter plays an important role in securing transmissions between remote locations. Its important to have the big picture in mind regarding how these protocols interact with each other in various parts of the system when troubleshooting connectivity and security issues.

In this project, you will synthesize the major characteristics of each protocol into a single reference table. You can create Table 7-1 below in a word-processing program or a spreadsheet program. Then refer to the information given in this chapter to fill in the missing pieces.

Table 7-1 Notable encryption and authentication methods

Security method

Type

Primary use(s)

Notes

PPP

Connection

Remote access

GRE

Encapsulation

L2TP

Tunneling

VPN

IPsec

Encryption

VPN

SSL

TLS

Secure transmission of HTTP sessions

SSL VPN

SFTP

Encryption

File transfer

SSH

SHA

Hashing

RADIUS

Central authentication point for wireless, mobile and remote users

TACACS+

Authentication, Authorization, and Accounting (AAA)

MS-CHAPv2

Authentication

EAP

802.1x

Authentication

AES

Encryption

Wi-Fi

Kerberos

Verify the identity of clients and to securely exchange information after a client logs on to a system

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Database Relational Model A Retrospective Review And Analysis

Authors: C. J. Date

1st Edition

0201612941, 978-0201612943

More Books

Students also viewed these Databases questions