Cryptopgraphic Protocols (Encryption Protocols): SSL/TLS - Secures communication over a network; encrypts data in transit., IPSec - Provides secure IP communication using authentication and encryption., SSH - Secure remote access and file transfer over an encrypted connection., PGP/GPG - Encrypts and signs emails using public-key cryptography., S/MIME - Secures email communication with encryption and digital signatures., WPA3 - Wi-Fi security protocol using robust encryption (replaces WPA2)., IKEv2 - Part of IPSec suite; negotiates security associations for VPN connections., SRTP - Secures real-time voice and video traffic over IP (VoIP)., Authentication Protocols (that use Encryption): RADIUS - Centralized authentication for network access; combines Authentication, Authorization, and Accounting (AAA)., TACACS+ - Cisco protocol that separates AAA functions and encrypts the entire payload., LDAPS - Protocol used to access and manage directory information, commonly for user authentication., SAML - XML-based framework for Single Sign-On (SSO), commonly used in web applications., OAuth 2.0 - Authorization framework that allows third-party access to resources without sharing passwords., OpenID Connect - Identity layer built on OAuth 2.0, used for user authentication., CHAP - Challenge-Handshake Authentication Protocol; uses a challenge-response mechanism to prevent replay attacks., PAP - Password Authentication Protocol; sends credentials in plaintext (insecure)., Kerberos - Authentication protocol using tickets and symmetric-key cryptography., MS-CHAPv2 - Microsoft version of CHAP; provides mutual authentication and stronger encryption., Kerberos - Uses tickets and symmetric key cryptography to authenticate users securely.,

Security+ 4.1 Wireless Security Settings - Authentication Protocols vs. Cryptographic Protocols (EASY)

Leaderboard

Visual style

Options

Switch template

Continue editing: ?