Chapter Summary

This chapter discussed the importance and functionality of the DES and 3DES encryption algorithms. You saw the complex math involved in each encryption technology to demonstrate the difficulty of cracking them—unless simple passwords are used, such as passwords with all letters.

You can tunnel and protect traffic within a network in several ways, and this chapter covered just two methods: PPTP and L2TP. It discussed each of the benefits and recommended L2TP because it combines the best aspects of both Microsoft and Cisco technologies. This chapter concluded with a discussion of SSH and the value it brings to your information security posture.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.21.152