Network Security Protocols and Technologies
Match networking protocols with their security functions and characteristics. Students will connect protocols and technologies with their appropriate security applications, encryption standards, and network protection capabilities.
VPN
802.1X
Kerberos
WPA2
S/MIME
RADIUS
PGP
SSH
IPSec
SSL
TLS
Secures IP communications with encryption and integrity verification
Secures wireless networks using AES encryption standards
Implements port-based network access control through authentication protocols
Protects email communications with digital signatures and encryption
Enables secure web communication through data encryption and authentication
Authenticates users with a ticket-based system for enhanced security
Offered encryption for web traffic, now largely replaced by TLS
Provides secure remote access and file transfer capabilities
Offers public key cryptography for securing emails and files
Creates secure tunnels for remote network access via encrypted connections
Delivers centralized authentication, authorization, and accounting services