![]() |
![]() |
- Encryption: When one or more Keys are used to convert clear text via a complex computational process into unreadable encrypted text such that without a Decryption Key, the encrypted text cannot be converted back to it's plain clear text form.
- Packet Padding: When random garbage (non-sense data) is purposefully intermixed with clear data during the encryption process to thwart cryptanalysis attacks.
- User Authentication: A digital method communicated with the other party to confirm their identity.
- Packet Authentication: A digital signature (hashing method) included with the encrypted message to ensure the integrity of the data as well sender has not been modified. If used properly, it can also prevent packet replay as well.
- Routing Access Control: Certain data has pre-defined routes which it takes, and if an attack is attempted, the data route is immediately switched to an alternate route.
- Proxy Authentication: The process of using a neutral party to perform end-to-end authentication of both parties.
(Otherwise known as ________.)
- Event Log Monitoring: Monitoring and analysis of security related events.
- Strong Key Management: Manual Key delivery (incl. Pre-shared Key) is too weak and allows too many loopholes for attack.
Strong "Automated Key Management" is defined in the ANSI (Financial/Banking) specifications and should be used to ensure your system is not compromized by Weak Key Management.
- Prevent Clear Text Transmissions: Ensure that the plain text version of information is NEVER transmitted in the clear. Even one message transmitted in the clear can give cryptanalists enough information to break your security system.
- Change Session Keys Often: It is recommended that sessions keys be changed (at least every 30 minutes) to ensure strong security is maintained.