5.4. Explain and implement protocols.
Cryptographic keys and digital certificates can be used in a wide variety of applications and protocols. Cryptographic keys, both symmetric and asymmetric, are involved in numerous security and protection solutions. These include the following:
Virtual private network (VPN) protocols such as IPSec
Communication security protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
The application of SSL to protect web traffic as in HTTP over SSL (HTTPS)
Proprietary web communication security protocols such as Secure HTTP (SHTTP)
Secure remote administration solutions, such as Secure Shell (SSH)
E-mail security solutions, such as Pretty Good Privacy (PGP) and Secure MIME (S/MIME)
5.4.1. SSL/TLS ...
Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.