2.11.1 TLS & SSL Digital certificates allow for the secure exchange of public keys over otherwise untrusted networks. Types of encryption Symmetric Encryption: The same key is used for encryption and decryption. The issue with this method is that the key must shared to with the sender and receiver. Asymmetric Encryption (Public key): The recipient generates two keys. The public…
Month: December 2019
Security+ Course – 2.10 Mobile Device Security
2.10.1 Mobile Connection Methods Cellular Networks Available in most urban and suburban areas 1 single tower can cover distances of up to 20 miles Rated according to the generation of services WIFI Networks These cover shorter distances with greater bandwidth. Satellite Communications This works almost anywhere but is expensive and slow. Near File Communications (NFC) This covers distances measures in…
Security+ Course – 2.9 Host Security
2.9.1 – Operating System Security Security Settings There are many OS security settings. You should establish a baseline for OS security settings that are used in your environment. One of these might be removing users from the local administrators group. This can be done using Group Policy. Patch Management Applying patches is critical to avoid known vulnerabilities being exploited. You can…