Education 8.7 Glossary-Chapter 8 adminJan 23, 2020 asymmetric key: An approach to encryption where one (public) key is used to encrypt data prior to transmission and a...
Education 8.8 Questions-Chapter 8 adminJan 23, 2020 You can take this quiz online at http://www.net-intro.com/quiz/ How do we indicate that we want a secure connection...
Education 8.6 Summary-Chapter 8 adminJan 23, 2020 Since the Internet was nearly 20 years old before we needed broadly deployed security, we had to find a way to add...
Education 8.5 Certificates and Certificate Authorities adminJan 23, 2020 While public/private key encryption works to allow the distribution of encryption keys across insecure networks and...
Education 8.4 Encrypting Web Browser Traffic adminJan 23, 2020 Since web browsers and web servers operate at the application layer, we barely notice whether we are using encrypted...
Education 8.3 Secure Sockets Layer (SSL) adminJan 23, 2020 Since network engineers decided to add security nearly 20 years after the Internet protocols were developed, it was...
Education 8.2 Two Kinds of Secrets adminJan 23, 2020 The traditional way to encrypt transmissions is using a shared secret (a password, a sentence, a number) that only the...
Education 8.1 Encrypting and Decrypting Data adminJan 23, 2020 The concept of protecting information so it cannot be read while it is being transported over an insecure medium is...
Education 8 Secure Transport Layer adminJan 23, 2020 In the early days of the Internet, networks were small and all of the routers were in secure locations. As long as...