信息安全工程师教程学习笔记之信息安全专业英语(二)

信息安全工程师 责任编辑:长颈鹿 2016-09-09

添加老师微信

备考咨询

加我微信

摘要:全国计算机技术与软件专业技术资格(水平)考试,这门新开的信息安全工程师分属该考试“信息系统”专业,位处中级资格。官方教材《信息安全工程师教程》及考试大纲于7月1日出版,希赛小编整理了信息安全工程师教程学习笔记之Network Security,供大家参考学习。

   

      >>>>>信息安全工程师培训视频

      全国计算机技术与软件专业技术资格(水平)考试,这门新开的信息安全工程师分属该考试“信息系统”专业,位处中级资格。教材《信息安全工程师教程》及考试大纲于7月1日出版,希赛小编整理了信息安全工程师教程学习笔记之Network Security,供大家参考学习。

      Network Security Protocol Introduction

      A security protocol(cryptographic protocol or encryption protocol)is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.

      A protocol describes how the algorithms should be used.A sufficiently detailed protocol includes details about data structures and representations,at which point it can be used to implement multiple,interoperable versions of a program.

      Cryptographic protocols are widely used for secure application-level data transport.A cryptographic protocol usually incorporates at least some of these aspects:

      Key agreement or establishment

      Entity authentication

      Symmetric encryption and message authentication material construction

      Secured application-level data transport

      Non-repudiation methods

      For example,Transport Layer Security(TLS)is a cryptographic protocol that is used to secure web(HTTP)connections.It has an entity authentication mechanism,based on the X.509 system;a key setup phase,where a symmetric encryption key is formed by employing public-key cryptography;and an application-level data transport function.These three aspects have important interconnections.Standard TLS does not have non-repudiation support.

      There are other types of cryptographic protocols as well,and even the term itself has various different readings;Cryptographic application protocols often use one or more underlying key agreement methods,which are also sometimes themselves referred to as"cryptographic protocols".For instance,TLS employs what is known as the Diffie-Hellman key exchange,which although it is only a part of TLS per se,Diffie-Hellman may be seen as a complete cryptographic protocol in itself for other applications.

      In this chapter,Kerberos protocol、SET protocol、SSL protocol、IPSec protocol and IKE Protocol are introduced.


    返回目录:信息安全工程师教程学习笔记之信息安全基础汇总


    希赛软考网,拥有十四年软考培训经验,希赛网一直坚持自主研发,将丰富的软考培训经验有效融入教程研发过程,自成体系的软考在线题库软考历年真题)、软考培训教材软考视频教程,多样的培训方式包括在线辅导面授、和,使考生的学习更具系统性,辅导更具针对性。采用全程督学机制,,软考平均通过率在全国。

更多资料
更多课程
更多真题
温馨提示:因考试政策、内容不断变化与调整,本网站提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

软考备考资料免费领取

去领取

!
咨询在线老师!