Page 335 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 335

charges. In contrast, Hypertext Transfer Protocol (HTTP) transmits
               data in cleartext.

               Almost all HTTPS transmissions use Transport Layer Security (TLS

               1.1) as the underlying encryption protocol. Secure Sockets Layer (SSL)
               was the precursor to TLS. Netscape created and released SSL in 1995.
               Later, the Internet Engineering Task Force (IETF) released TLS as a
               replacement. In 2014, Google discovered that SSL is susceptible to the
               POODLE attack (Padding Oracle On Downgraded Legacy Encryption).

               As a result, many organizations have disabled SSL in their
               applications.

               Organizations often enable remote access solutions such as virtual
               private networks (VPNs). VPNs allow employees to access the
               organization’s internal network from their home or while traveling.
               VPN traffic goes over a public network, such as the internet, so
               encryption is important. VPNs use encryption protocols such as TLS

               and Internet Protocol security (IPsec).

               IPsec is often combined with Layer 2 Tunneling Protocol (L2TP) for
               VPNs. L2TP transmits data in cleartext, but L2TP/IPsec encrypts data
               and sends it over the internet using Tunnel mode to protect it while in
               transit. IPsec includes an Authentication Header (AH), which provides
               authentication and integrity, and Encapsulating Security Payload
               (ESP) to provide confidentiality.

               It’s also appropriate to encrypt sensitive data before transmitting it on

               internal networks. IPsec and Secure Shell (SSH) are commonly used to
               protect data in transit on internal networks. SSH is a strong
               encryption protocol included with other protocols such as Secure Copy
               (SCP) and Secure File Transfer Protocol (SFTP). Both SCP and SFTP
               are secure protocols used to transfer encrypted files over a network.
               Protocols such as File Transfer Protocol (FTP) transmit data in

               cleartext and so are not appropriate for transmitting sensitive data
               over a network.

               Many administrators use SSH when administering remote servers.
               The clear benefit is that SSH encrypts all the traffic, including the
               administrator’s credentials. Historically, many administrators used
               Telnet to manage remote servers. However, Telnet sends traffic over a
   330   331   332   333   334   335   336   337   338   339   340