wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
Sign in

Top Users

profile

Enlighten Gaming

@enlightengaming
profile

Marishka Rego

@marishkarego
profile

Mukeshverma

@mukeshverma

Featured Blogs

Traditional UNIX Scheduling

Blog banner

The Memory Hierarchy

Blog banner

Models of Information Security.

Blog banner

Burning Questions

What is Ai & how we can learn Ai ??

Can someone tell me which is the fifth layer in OSI model

Frederick Sanger is a twice recipient of the Nobel Prize for?

Contact Us

|

About Us

|

Points nomenclature

|

Terms of service

|

Privacy Policy

|

Cookie Policy

Pragati

user banner image
profile
Pragati @pragati

Learner

ResumeBlogsQuestions
profile

Pragati

@pragatiDec 22, 2017

List and explain advantages and applications of IPSec

 The applications of IPSe :  (i) Secure Remode Internet Access : Using IPSec, make a local call to our Internet Service Provider (ISP) so as to connect to our organization’s network in a secure fashion from our home or hotel. From there, access the corporate network facilities or access remote desktops/servers. (ii) Secure Branch Office Connectivity : Rather than subscribing to an expensive leased line for connecting its branches across cities/countries, an organization can set up an IPSec-enabled network to securely connect all its branches over the Internet. (iii) Set Up Communication with Other Organizations : Just as IPSec allows connectivity between various branches of an organization, it can also be used to connect the networks of different organizations together in a secure and inexpensive fashion. Following are the main advantages of IPSec.  IPSec is transparent to the end users. There is no need for an user training, key issuance or revocation. When IPSec is configured to work with a firewall, it becomes the only entry-exit point for all traffic; making it extra secure. IPSec works at the network layer. Hence, no changes are needed to the upper layers (application and transport). When IPSec is implemented in a firewall or a router, all the outgoing and incoming traffic gets protected. However the internal traffic does not have to use IPSec. Thus, it does not add any overheads for the internal traffic. IPSec can allow traveling staff to have secure access to the corporate network. IPSec allows interconnectivity between branches/offices in a very inexpensive manner.

2 Discussions
485 Reads
profile

Pragati

@pragatiDec 22, 2017

Describe Digital Certificate creation steps in detail.

Certificate creation steps The creation of a digital certificate consists of several steps. These steps are outlined in the following fig. Step 1 Key Generation The action begins with the subject (i.e. the organization/user) who wants to obtain a certificate. There are two different approaches for this purpose: (a) The subject can create a private key and public key pair using some software. This software is usually a part of the web browser or web server. Alternatively, special software programs can be used for this. The subject must keep the private key thus generated a secret. The subject then sends the public key along with other information and evidences about herself to the RA. (b) Alternatively, the RA can generate a key pair on the subject’s behalf. This can happen in cases where either the user is not aware of the technicalities involved in the generation of a key pair or if a particular requirement that all the keys must be centrally generated and distributed by the RA for the ease of enforcing security policies and key management. Of course, the major disadvantages of this approach are the possibility of the RA knowing the private key of the user, as well as the scope for this key to be exposed to others in transit after it is generated and sent to the appropriate user. Step 2 Registration Assuming that the user has generated the key pair, the user now sends the public key and the associated registration information (e.g. subject name, as it is desired to appear in the digital certificate) and the evidence about herself to the RA. For this, the software provides a wizard in which the user enters data and when all data is correct, submits it. The data then travels over a network to the RA. The format of the certificate requests has been standardized and is called as Certificate Signing Request (CSR). The user must not send the private key to the RA – the user must retain it securely. Step 3 Verification After the registration process is complete, the RA has to verify the user’s credentials. This verification is in two respects , as follows . (a) Firstly, the RA needs to verify the user’s credentials such as the evidences provided are correct and that they are acceptable. If the user were actually an organization, then the RA would perhaps like to check the business records, historical documents and credibility proofs. If it is an individual user, then simpler checks, such as verifying the postal address, email id, phone number, passport or driving license details can be sufficient. (b) The second check is to ensure that the user who is requesting for the certificate does indeed possess the private key corresponding to the public key which is sent as a part of the certificate request to the RA. This is very important, because, there must be a record that the user possesses the private key corresponding to the given public key. Otherwise, this can create legal problems. This check is called as checking the Proof Of Possession (POP) of the private key. How can the RA perform this check? There are many approaches to this, the chief ones being as follows : i) The RA can demand that the user must digitally sign her Certificate Signing Request (CSR) using private key. If the RA can verify the signature correctly using the public key of the user, the RA can believe that user indeed possesses the private key. ii) Alternatively, at this stage, the RA can create a random number challenge, encrypt it with the user’s public key and send the encrypted challenge to the user. If the user can successfully decrypt the challenge using her private key, the RA can assume that the user possesses the right private key. iii) Thirdly, the RA can actually generate a dummy certificate for the user, encrypt it using the user’s public key and send it to the user. The user can decrypt it only if she can decrypt the encrypted certificate and obtain the plain text certificate. Step 4 Certificate Creation Assuming that all the steps so far have been successful, the RA passes on all the details of the user to the CA. The CA does its own verification and creates a digital certificate for the user. There are programs for creating certificates in the X.509 standard format. The CA sends the certificate to the user and also retains a copy of the certificate for its own record. The CA’s copy of the certificate is maintained in a certificate directory. This is a central storage location maintained by the CA

3 Discussions
496 Reads
profile

Pragati

@pragatiDec 19, 2017

Features of IPsec

State and explain Features of IPsec

10 Discussions
654 Reads
profile

Pragati

@pragatiDec 19, 2017

Explain IDS

Explain IDS

4 Discussions
556 Reads
profile

Pragati

@pragatiDec 19, 2017

explain firewall and its types.

explain firewall and its types.

2 Discussions
575 Reads
profile

Pragati

@pragatiDec 19, 2017

Working of S/MIME

 Explain Working of S/MIME and S/MIME certificate

4 Discussions
493 Reads