5.4. Explain and implement protocols.

Cryptographic keys and digital certificates can be used in a wide variety of applications and protocols. Cryptographic keys, both symmetric and asymmetric, are involved in numerous security and protection solutions. These include the following:

  • Virtual private network (VPN) protocols such as IPSec

  • Communication security protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

  • The application of SSL to protect web traffic as in HTTP over SSL (HTTPS)

  • Proprietary web communication security protocols such as Secure HTTP (SHTTP)

  • Secure remote administration solutions, such as Secure Shell (SSH)

  • E-mail security solutions, such as Pretty Good Privacy (PGP) and Secure MIME (S/MIME)

5.4.1. SSL/TLS ...

Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.