This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 29 lines
!!! Overview
[{$pagename}] (or Secure [Channel]) is a [network] connection that is [encrypted] by one or more [security] [protocols] to ensure the [security] of [data In Transit] for [End-to-End Communications]
[{$pagename}] [MUST] be able allow [Alice] to send [Bob] a [message] and:
* maintain [confidentiality] of [data In Transit]
* maintain [integrity] of the [data In Transit]
[{$pagename}] can be performed by many [protocols] and most of them involve data [encryption].
[{$pagename}] is usually provided by:
* [Transport Layer] [{$pagename}] is provided by [Transport Layer Security] ([TLS]/[SSL]) [End-to-End Communications]
* [Application Layer] [{$pagename}] is provided by [Application Layer Security] ([End-to-end Encryption])
!! [{$pagename}] [Vulnerabilities|Vulnerability]
Some [{$pagename}] [Vulnerabilities|Vulnerability]:
* [Man-In-The-Middle]
* [SSL-TLS Interception] ([TLS Proxy])
* [Public Key Infrastructure Weaknesses] - as [TLS] is most popular method for [{$pagename}] and [TLS] often relies on [Public Key Infrastructure]
!! [{$pagename}]
[Transport Layer Security] ([TLS]) is the most popular [Protocol] for [{$pagename}].
Alert (TA15-120A) Securing [End-to-End Communications] is provided by the [United States Department of Homeland Security] for Securing End-to-End Communications [1]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Alert (TA15-120A) Securing End-to-End Communications|https://www.us-cert.gov/ncas/alerts/TA15-120A|target='_blank'] - based on information obtained 2017-06-25-