Network Security (3)
There is no such thing as a 100% secure computer system. We can think of security as a triangle with "security", "performance” and "usability" at corners. We cannot be at all corners at the same time
Security specifications:
- IP Sec - IP Security Protocol (IETF); IPSec addresses the issues of encryption and integrity
- ITU X.509 - digital certificate (like identity card authorized by Certifite Authority (CA)). It is based on Public Key
- DES - Data Encryption Standard - private key encryption scheme
- PAP - Password Authentication Protocol
- CHAP- Challenge Handshake Authentication Protocol
- TACACS - authentication for dialing
- RADIUS - Remote Authentication Dial-In User Service
- Secure DNS - is designed to stop DNS spoofing
- PGP / MIME - Pretty Good Privacy; PEM - Privacy Enhanced Mail