▶ 13.6 Cryptographic Security Requirements
We began the chapter with a review of network security risks, and we end with an overview of objectives tied to those security risks. This section summarizes security requirements that apply network cryptography to those objectives.
Protect selected network traffic from sniffing or eavesdropping.
Allow filtering and review of network contents. This is the opposite of preventing sniffing. If we allow sniffing, we also allow filtering content review.
Automate the encryption decision for users.
Permit or deny internet access to users.
Provide end-to-end crypto.
Simplify key management.
The specific network crypto solutions examined include the following:
■ Link layer encryption on a wireless LAN ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.