Security Protocols and Their Implementation
In Chapter 1, Data Centers and the Enterprise Network Architecture and its Components, we talked about the network architecture, while in Chapter 2, Network Protocol Structures and Operations, we talked about protocols. In this chapter, we will talk about security protocols, including their pillars, and deep dive into the bits and bytes. This will help us understand how to use these protocols and methods to protect our network resources.
We will start with the basic definitions, continue with the algorithms and higher-level protocols that are used in modern networks, and finish up with network security components, how they work, and how they are used to protect our network resources.
In this chapter, we're going to cover the following main topics:
- Security pillars – confidentiality, integrity, and availability
- Encryption basics and protocols
- Public key infrastructure and certificate authorities
- Authentication...