Network Security Protocols and Technologies
Match networking protocols with their security functions and characteristics. Students will connect protocols and technologies with their appropriate security applications, encryption standards, and network protection capabilities.
802.1X
TLS
PGP
S/MIME
VPN
SSL
IPSec
SSH
RADIUS
Kerberos
WPA2
Implements port-based network access control through authentication protocols
Delivers centralized authentication, authorization, and accounting services
Authenticates users with a ticket-based system for enhanced security
Offered encryption for web traffic, now largely replaced by TLS
Secures IP communications with encryption and integrity verification
Secures wireless networks using AES encryption standards
Offers public key cryptography for securing emails and files
Protects email communications with digital signatures and encryption
Enables secure web communication through data encryption and authentication
Provides secure remote access and file transfer capabilities
Creates secure tunnels for remote network access via encrypted connections