1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Wired Equivalent Privacy (WEP)
Was one of the earliest encryption protocols for wireless networks. However, it’s now considered weak and insecure due to vulnerabilities.
Wi-Fi Protected Access (WPA)
Was introduced to address the weaknesses of WEP. It comes in two versions: WPA and WPA2. WPA2 is the more secure version and is widely used today
Wi-Fi Protected Access 3 (WPA3)
Is the latest standard for Wi-Fi security. It provides
stronger encryption and security features compared to WPA2.
Transort Layer Security (TLS)
Is commonly used to encrypt data transmitted over the
internet. It ensures data integrity and confidentiality between applications and servers.
Secure Socket Layer (SSL)
Like TLS, is used to secure communication over the internet. It encrypts data transmitted between a client and a server, ensuring privacy and integrity.
Virtual Private Network (VPN)
Creates a secure, encrypted connection over a less secure
network, such as the internet. They are commonly used to provide remote access to corporate
networks or to bypass geo-restrictions.
IPsec (Internet Protocol Security)
Is a protocol suite used to secure IP communications. It
can be used to encrypt data at the IP layer, providing network-level security.
SSH (Secure Shell)
Is a cryptographic network protocol used for secure remote access to systems. It encrypts data exchanged between a client and a server, preventing eavesdropping
and tampering.
PGP (Pretty Good Privacy)
Is a data encryption and decryption program that provides
cryptographic privacy and authentication for data communication. It's commonly used for
securing email communication.
S/MIME (Secure/Multipurpose Internet Mail Extensions)
Is a standard for securing email messages using public key cryptography. It allows senders to digitally sign and encrypt email messages for added security and authenticity.