Join Lisa Bock for an in-depth discussion in this video Protocol good practices, part of IT Security Foundations: Operating System Security (2015).
- When talking about protocol good practices,…there's a couple of things…the network administrator and you can do.…First of all, use protocols that can provide encryption,…such as HTTPS,…which is HTTP over Secure Socket Layer…or Transport Layer Security, which effectively…creates a VPN between the server and the client,…encrypting all data, and also Secure Shell.…Now, this is used with Telnet.…Telnet isn't used as often anymore,…but there may be a reason that you have to use Telnet,…so you should use a Secure Shell application, such as PuTTY.…
Let's take a look.…Now, PuTTY will help to encrypt your data…if you do have to use Telnet, and it's a free download.…This will be able to secure your communication.…Network Time Protocol is used…to provide automated time synchronization.…Now, Network Time Protocol is a great protocol to use…because some protocols, such as Kerberos,…require synchronized time on the network.…A network administrator has a resource,…which is called the NTP Pool Project,…where they can obtain synchronized time for their system.…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Apply security principles to create a strong password.
- Define RADIUS.
- Describe how permissions work.
- Review how to save and secure audit files.
- Explain hardening, updates, and patches.
- Identify ways to protect the email server.