Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber Res Video. Siris on the Company of Security plus 5 +01 Certification and Exam.
00:06
I'm your instructor around Warner.
00:09
This video is on section 2.6. Given a scenario, implement Secure Protocols.
00:15
This is the last section for domain to on technologies and tools. In this video, I'll be talking about different security protocols, and they're used cases in computer science. A protocol. It's a set of rules or procedures for transmitting data between electronic devices or computers.
00:33
For computers to exchange information, there must be a pre existing agreement. And as to how it will be structured and the transmission method,
00:41
the security plus exam requires you to understand common security protocols such as those listed on the screen.
00:48
You also need to be familiar with how, where and when these protocols are used. As I walk through. The protocols also talked through some of the use cases.
00:57
Many of these are also covered in other sections of security. Plus,
01:00
the first set of protocols I'll be discussing are those dealing with Web security, encryption, authentication and certificates.
01:08
SSL secure sockets layer Latest version is three Dato, although it's now been depreciated, but they buy the I E T f and should not be used.
01:19
It uses certificates for authentication and encryption for message, integrity and confidentiality.
01:26
SSL and Transport Layer Security T L s are the standard security technologies for establishing an encrypted link between a server and the client,
01:37
usually a Web server, and were website and a browser.
01:41
T L s Transport Layer Security is based on SSL three Dato.
01:46
The most current version as of this video is version 1.3, although mostly that 1.2 is in use.
01:53
Provides privacy through symmetric encryption message integrity through message authentication code and authentication. Using P k I digital certificates
02:05
forward secret See ensures that any future disclosure of encryption keys cannot be used to decrypt any T. L s communications recorded in the past and should be included within your security infrastructure. When enabling t l s
02:19
https uses SSL and teal us to secure the Web communication leveraging X 509 digital certificates and 256 bit encryption keys refer to domain six where I talk about encryption and cryptography.
02:35
Some of the use cases is associated with S S, L T L s and https include user credentials which are required in a transaction such as e commerce or bank websites. Anything accepting credit card payments. Another use case. Our session cookies in which user credentials are stored.
02:53
Cloud based environment communications
02:55
will also use S S L T L s.
02:59
Google now requires t l s for any website utilizing its service is
03:04
next topic is the NSX domain name service de ns is like the Internet phone book where you equate I P address with a common name like a u r l
03:15
D N s Does not check for any credentials before accepting and an answer.
03:20
Attackers can exploit this basic vulnerability or an attacker can cause de ns poisoning by delegating a false name to the domain server and providing a false address for for that server.
03:32
See the previous sessions on different attacks types for D. N s poisoning.
03:38
To prevent this from happening, the d n a security extensions DNA SEC protocol was developed. It protects against such attacks by providing a validation path for records. The NSX does not encrypt data. It provides a way to validate the addresses of a site by using a sequence of digital signatures
03:57
through the D. N s hierarchy,
03:59
all individual domain levels are in control of their own signature generating keys.
04:04
Secure shell is another protocol you need to be aware of.
04:08
It replaces Tell Net for remote communications. Telnet is an original UNIX command, which allowed one system to connect to another system, but it did it with all clear text credentials.
04:20
SS Age establishes a session between the client and host computers using authenticated and encrypted connection.
04:29
It uses a symmetric public. He R s a cryptography for both the connection and authentication relies on digital certificates as well to connect to the remote host. It's often used for remote administration of Lennox servers. Note that other protocols can also tunnel their service is through Sssh!
04:47
There's some protocols you need to be aware of associated with securing e mail.
04:53
The first is Esme I. It's the standard for encryption and signing of mime or email data
05:00
because S mime is a client based protocol. The most common use case for this protocol is securing internal client messages.
05:09
The client side is responsible for protecting the message.
05:12
The message is protected until the authorized recipient opens it
05:16
organizations choose s mime when they want to secure messages from client to client because it is the most cost effective way to implement encryption and digital signing of email.
05:28
Pop three and I'm maps are mainly used as a method to secure connection between client machines and their associate ID servers. It uses SSL to ensure emails and transit between Ah Pop or I'm APP Server and the client.
05:44
For example, it's used mostly with external email,
05:47
FTP or file transfer protocol is another old UNIX based protocol and service
05:56
challenges. It passes all their credentials and clear text.
06:00
We often see FTP servers out on the Internet toe upload to Web server data.
06:06
F D P s is an FTP extension that adds S S L T L s protocols
06:13
provides mutual authentication of the parties through certificates
06:16
did a confidentiality or encryption and integrity is also leveraged through f t p s
06:24
f T P s implicit uses port 990 while FTP s explicit goes over. The traditional port 21
06:32
s f t p is different than f t p s sftp secure FTP uses SS H to transfer files using SSL encapsulation so f T P s focuses solely on using SS lt L s well s FTP
06:51
tunnels through sssh.
06:54
Today's networks are often used for video and voice transmissions. Voice and video calls are established with session initiation protocol or S I P, and data is transmitted with real time transfer protocol. RTP.
07:09
Therefore, s R T P is the secure real time transfer protocol.
07:15
It's an extension to our teepee and is intended to provide encryption method, message authentication and integrity.
07:21
It also provides replay attack protection to the RTP data in both you know, cast and multicast applications.
07:30
If you recall from our studies, L dap is a directory protocol. It can contain sensitive information about the organization systems and users.
07:41
Attackers may sniff the network to read unencrypted held up traffic or Attackers may try to corrupt and l dap query
07:49
l'd app es el that security uses S S L T l s and leverages TCP ports 6 36
07:59
s and M p. Simple Network Management protocol is used to manage networks. Each managed device has a software agent reporting configuration settings and alerts. The alerts are also known as traps toe a centralized s and M P management server
08:16
with S and M P versions. One in two.
08:18
All data was sent this clear. Text
08:22
S and M p version three also encrypts the data
08:24
S and M P. V three is designed to provide added security to earlier versions of the S and P Protocol. When the network is publicly accessible, it's best to use S and P V three, which provides more secure access and encryption.
08:39
Some use cases includes validating that a packet has not been modified in transit,
08:43
eliminating plain text S and P data on the network
08:48
and securely monitoring interface counters bend with usage, CPU, load and traps.
08:54
We'll transition to talking about other use cases.
08:58
First, his network address allocation. This is how do you allocate I P addresses normally within an internal network.
09:05
D H CP is dynamic host control Protocol and it assigns internal I P addresses. A D. H E P Server dynamically assigns an I P address and other network configuration pet parameters to each device on the network so they can communicate with other I p networks.
09:22
Another method for network address allocation is the use of network sub nets.
09:28
It's used to segregate multiple hosts and control network traffic.
09:31
Splitting one network into two or more and using routers to connect each sub net or V lands on switches means that broadcasts and traffic can be limited to a specific area on the network known as the sub net.
09:45
Sub net divisions could be based on business goals and security policy objectives.
09:50
For example, perhaps you use contract workers want to keep them on a separated network from organizational employees.
09:58
Organizations with branches often use sub nets to keep each branch separate.
10:03
Be familiar with a different I p V. For address classes as shown on your screen,
10:09
an additional common security challenge is time synchronization across the network
10:15
and keep e network time. Protocol is a UDP protocol used to synchronise time, often based on the electronic clock. You'll have a centralized Auntie P server, which will pull from, say, a service out in Boulder, Colorado, run by NIST, that has the official atomic clock time.
10:33
NTP servers should be redundant and secure. You don't want that server corrupted, and then time will be corrupted across your network.
10:43
Another use case. Our subscription service is often these air. Those cloud service is I've talked about in previous videos.
10:50
One is being software as a service s a s. For example, Cloud email. Google, Gmail and Microsoft Office 3 65 Were your purchasing a particular software application and use it across the Internet as a service. You also see subscription service is associated with network defenses.
11:09
For example, firewall ideas. I ps.
11:13
You can have a centralized service managing all of your firewall capabilities. This could include Web, an application filtering rather than maintaining your own patch capabilities. You can also use a subscription service for a patching across your network and last is anti virus and malware detection.
11:33
These were all use cases forces subscription service. Is that air quite common within the business world?
11:39
In this video, I discussed numerous security protocols and use cases.
11:43
Refer to the protocol list on your screen. The use cases are all common within businesses.
11:50
Let's practice on a sample test question
11:52
question. With this protocol, each managed device has a software agent reporting configuration settings and alert or traps to a centralized management server.
12:03
The Inter is A s, an MP simple network management protocol
12:11
question, too.
12:11
This is a client base protocol used for securing email. The most common use case for this protocol is securing internal client messages.
12:22
The answer is B s. My s mime is for internal. While I maps is external, the others don't have anything to do with e mail.
12:31
This concludes the video for section 2.6. Given a scenario, implement secure protocols.
12:39
Refer to your study material for more information on these concepts.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor