• R
    Razmik Artonian 0

    Lets say we are given the following info:
    A site-to-site VPN connection using IPsec Tunnel with both AH and ESP enabled to provide authentication and Encryption respectively.
    Looking at the info provided to us can you tell which encryption algorithm is being used? I mean , since IPsec is not an encryption algorithm in itself.

    posted in Security read more
  • R
    Razmik Artonian 0

    I know this might not be the smartest question but I am trying to understand the concept or the theory.

    WPA uses TKIP for encryption protocol. WPA-2 uses CCMP for encryption protocol.
    IPsec is used to encrypt IP traffic or data in transit.
    How can WPA-2 use two encryption protocols simultaneously (CCMP and IPsec) ?
    The same question could be asked about WPA in relation to TKIP and IPsec.

    posted in Security read more
  • R
    Razmik Artonian 0

    I know we can use 802.1x (RADIUS ) for Wireless user authentication with Access Points.
    But can we use VPN for wireless encryption? If so , will we be using IPSEC ?

    posted in Security read more
  • R
    Razmik Artonian 0

    I know SFTP is FTP over SSH and FTPS is FTP over SSL/TLS.
    When do we use SFTP and when do we use FTPS?
    Could you please compare/contrast SFTP and FTPS ?

    posted in Security read more
  • R
    Razmik Artonian 0

    Lets say , I have a DMZ located between Firewall number one facing the Internet and the Firewall number 2 facing the Intranet. I want to add a proxy server (if possible to evaluate two different scenarios of forward proxy and reverse proxy) to this configuration, where should the proxy server be added?

    posted in Security read more
  • R
    Razmik Artonian 0

    While experimenting with CryptoDemo 1.0, I realized that there are different encrypted data outcomes for the same plain text with the same algorithm (3DES) and the same key.
    So does that mean that there are infinite number of Crypto texts which could be decrypted to arrive at the same plain text? (assuming same 3DES algorithm and same key)

    posted in Security read more
  • R
    Razmik Artonian 0

    Can you please explain the difference between "PEAP" and "EAP-TTLS" ?It seems both use TLS tunnel to protect wireless communication. And both require a certificate on the 802.1x server but not for the client.

    posted in Security read more
  • R
    Razmik Artonian 0

    Can someone please explain to me the concept of Perfect Forward Secrecy?

    posted in Security read more
  • R
    Razmik Artonian 0

    Is it accurate to assume that user's information , including username and password, are kept private whenever we use token based authentication?

    posted in Security read more
  • R
    Razmik Artonian 0

    Is it accurate to state Identity federation is a subset of SSO or vice versa?

    posted in Security read more