Which of the following statements are true about an end-to-end security strategy?
A.
End-to-end security and point-to-point security are virtually identical strategies proposed by
different security vendors.
B.
End-to-end security strives to protect data at rest, even in temporary queues.
C.
End-to-end security often involves some form of message-level protection.
D.
When end-to-end security is enabled. Point-to-point transport-level encryption should be
disabledin order to avoid cryptography conflicts between layers.
E.
End to-end security is highly beneficial for distributed computing environments where many
point-point connections and intermediaries exist, because it offers seamless data protection.
Explanation:
B:End to end security is an information-centric perspective of security where
information is protected throughout the entire computing environment. That is, from
the points where system interactions originate, through all points of integration,
processing, and persistence.
End to end security is often associated with the secure transmission, processing, and
storage of data, where at no time are data unprotected
Note:
For a typical web-based application, end to end security generally begins at the
client/browser, and ends at the application database and all external dependencies of
the application.
A common challenge in providing end to end security is finding a suitable way to
secure data in all states and points along the processing path that does not interfere
with any transmission, routing, processing, and storage functions that need to occur
along the way. Sensitive data will usually need to be decrypted at certain points in
order for processing or message routing to occur.