Copyright Goodheart-Willcox Co., Inc. 488 Networking Fundamentals ■ An asymmetric key is a key classifi cation that uses two diff erent keys to encrypt and decrypt data. ■ Digital certifi cates are issued by certifi cate authorities and are used to verify identities. ■ Th e Secure Socket Layer (SSL) protocol was developed by Netscape to secure transactions between web servers and individuals using the Internet for such purposes as credit card transactions. ■ Transport Layer Security (TLS) was developed after SSL by the Internet Engineering Task Force (IETF). It serves the same purpose as SSL but is more secure. ■ A virtual network connection (VNC) describes a broad category of remote connection systems that allow a user to connect to a network device. ■ IPSec is a protocol designed to secure IP packets on an unsecured network medium. ■ Secure Shell (SSH) is a protocol that provides secure network services over an insecure network medium. ■ Secure Copy Protocol (SCP) provides a secure way of transferring fi les between computers. Wireless Security ■ Wireless networks use a service set identifi er (SSID) to identify the wireless network. ■ A media access control (MAC) fi lter allows or restrict WAP access based on the MAC address of a wireless network card. ■ Wired Equivalent Privacy (WEP) was the fi rst attempt to encrypt data transferred across a wireless network. It was part of the original IEEE 802.11 wireless standard. ■ When vulnerabilities were discovered in the algorithm used for WEP, the Wi-Fi organization developed the Wi-Fi Protected Access (WPA) encryption technique. ■ Wi-Fi Protected Access 2 (WPA2) is an enhanced version of WPA. ■ IEEE 802.11i is a standard that was developed to remedy the original security fl aws in 802.11. ■ 802.1x provides port-based, network access control, which supports authen- tication for Ethernet network access. ■ 802.1x is composed of three components: supplicant, authenticator, and authentication server. ■ A rogue access point is an unauthorized wireless access point that is in- stalled on a network system. Authentication, Authorization, and Accounting ■ AAA represents Authentication, Authorization, and Accounting. ■ RADIUS, Diameter, and TACTACS+ are all models of AAA.