study_security_l8


"/home/yossef/notes/Su/security/study_security_l8.md"

path: Su/security/study_security_l8.md

- **fileName**: study_security_l8
- **Created on**: 2025-06-02 21:30:30

Network & Email Security Explained Simply

1. Intrusion Detection vs Prevention (IDS vs IPS)

Key Difference: IDS just warns, IPS actively blocks

2. Secure Shell (SSH) - Secure Remote Access

How it works:

  1. You connect to server (e.g., ssh user@server.com)
  2. Server proves its identity with a digital certificate
  3. Your computer and server agree on a secret session key
  4. All communication gets encrypted

Why use it?

3. Port Scanning - Network Reconnaissance

What it does:

Why used:

4. IPsec - Secure Internet Communication

Key Benefits:

Two Modes:

Transport Mode Tunnel Mode
Encrypts just the message content Encrypts entire message + headers
Used between computers Used between networks (gateways)
Transport Tunnel

Services:

5. Email Security (PGP vs S/MIME)

PGP (Pretty Good Privacy):

S/MIME (Enterprise Standard):

How encryption works:

  1. Alice writes email
  2. System encrypts with Bob's public key
  3. Only Bob's private key can decrypt it

Assignment Solutions

1. IDS vs IPS

2. SSH Benefits

3. Port Scanning Uses

4. IPsec Explained

5. Transport vs Tunnel Mode

Key Concepts to Remember

  1. Defense Layers: Use both IDS and IPS together
  2. Encryption Matters: Always use SSH instead of Telnet
  3. VPN Security: IPsec creates secure tunnels over the internet
  4. Email Protection: PGP for personal, S/MIME for work

continue:./study_security_l9.md
before:./study_security_l7.md