Data Protection and Security

   

VIII

Standards and Protocols

   
       

VIII.I

Introduction

   

   
 

A “security protocol” is a set of rules determining the steps and formats of security messages exchanged between at least two entities.[more]

 

 

 

 

Sessions: [1]

   
       

VIII.II

Public Key Infrastructure

   

   
 

In Chapter 4, we have seen different public key cryprography algorithms either for encryption and/or digital signatures. In all of these, remember that there are two keys per user. [more]

 

 

 

  Sessions: [1] [2] [3]    
       

VIII.III

Certificate Revocation

   

   
 

If someone realizes his private key has been stolen or if someone gets fired from an organization, it is important to be able to revoke his certificate so that it will no longer be valid. [more]

 

 

 

  Sessions: [1]    
       

VIII.IV

Secure Socket Layer (SSL)

   

   
 

Standards for real-time public key based security protocols include IPsec, SSL/TLS, and SSH. SSL/TLS and SSH are implemented at layer 4, whereas IPsec is implemented at layer 3. [more]

 

 

 

  Sessions: [1] [2] [3] [4]    
       

VIII.V

IPsec

   

   
 

IPsec is an IETF standard for real-time security on the network layer. [more]

 

 

 

  Sessions: [1] [2] [3]    
       

VIII.VI

Summary

   

   
 

We conclude our discussion in this course by introducing some of the most used security protocols and standards in this final chapter. [more]

 

 

 

  Sessions: [1]    
       
       
 
  proceed to first section »