Data leakage of sensitive information is MOST often concealed by which of the following?
A. Secure Sockets Layer (SSL)
B. Secure Hash Algorithm (SHA)
C. Wired Equivalent Privacy (WEP)
D. Secure Post Office Protocol (POP)
2 Comments on “which of the following?”
herman Rensinksays:
In order to obfuscate data, a user may attempt to utilize a public proxy service via an SSL connection (often called ProxyAvoidance). They access the proxy service via a browser, type in the URL of the site they wish to visit, and their entire session is then encrypted. A Stateful Packet Inspection firewall will not be able to examine the data as it will be encrypted. Consequently sensitive information may be leaked through this medium without detection.
In order to obfuscate data, a user may attempt to utilize a public proxy service via an SSL connection (often called ProxyAvoidance). They access the proxy service via a browser, type in the URL of the site they wish to visit, and their entire session is then encrypted. A Stateful Packet Inspection firewall will not be able to examine the data as it will be encrypted. Consequently sensitive information may be leaked through this medium without detection.
© SANS Institute 2007: Reference: https://www.sans.org/reading-room/whitepapers/awareness/data-leakage-threats-mitigation-1931. Page 13-14.
0
0
phen375 Reviews
http://www.XquielQMVW.com/XquielQMVW
0
0