Question
Earlier this year the average volume of encrypted traffic surpassed the average of unencrypted volume, according to Mozilla. Yes, the Internet is going dark and
Earlier this year the average volume of encrypted traffic surpassed the average of unencrypted volume, according to Mozilla. Yes, the Internet is going dark and more traffic is being encrypted using SSL/TLS. Mass adoption of technologies is always followed closely by efforts to exploit it. SSL is no exception and has experienced a number of highly publicized vulnerabilities. Beside the data compromising vulnerabilities, SSL-based DDoS and DoS attacks target the SSL handshake mechanism, send garbage data to the SSL server, or abuse functions related to the SSL encryption key negotiation process. SSL attacks are popular because they are asymmetric: each SSL session handshake consumes 15 times more resources from the server than it does from the client. Furthermore, with the increase of encrypted traffic on the Internet, cyber attackers have found a new channel through which they can mask and further complicate attack detection in both network- and application-level threats. Existing attack mitigation solutions require real-time visibility into traffic traveling through the network over encrypted outbound sessions where the organization may not have access to the servers encryption keys. This challenge is especially relevant for data leakage prevention (DLP), intrusion prevention systems (IPS) and firewalls which normally do not have visibility into encrypted traffic, creating significant blind spots in the protection they provide. Furthermore, protecting inbound sessions requires each and every device that inspects the traffic to have the servers private keys, which can pose a burden on the management of more complex perimeters. In which ways does this affect the threat landscape and how should people protect themselves? Please do some research and provide a researched-based reply
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started