Found 1301 Articles for MCA

Differentiate between SSL and TSL secure layers

Bhanu Priya
Updated on 15-Sep-2021 07:45:21

407 Views

Secure Socket Layer (SSL) and Transport security layer (TSL) are internet security protocols used for secured communication between the web-browser and the webserver. SSL is the predecessor of TLS so logically TLS is more secure than SSL.DifferencesLet us discuss the differences between SSL and TSL in point wise manner −Point 1TLS establishes communication in two steps.Step 1 − Handshaking to authenticate the server &Step 2 − Actual message transfer.So, it’s slower than SSL.Point 2TLS is based on the SSL v3.0 protocol with some enhancements.SSL was developed with communication needs and related issues.Point 3TLS v1.0 is prone to BEAST attacks but ... Read More

What is ESP in tunnel and transport mode and the difference between AH and ESP?

Bhanu Priya
Updated on 15-Sep-2021 07:42:58

4K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorized receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ... Read More

What is Encapsulating Security Payload(ESP)?

Bhanu Priya
Updated on 13-Sep-2021 13:16:58

9K+ Views

Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorised receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ... Read More

What is Authentication Header (AH) format?

Bhanu Priya
Updated on 13-Sep-2021 13:14:52

11K+ Views

Authentication Header (AH) is used to provide integrity and authentication to IP datagrams. Replay protection is also possible. The services are connectionless, that means they work on a per-packet basis.AH is used in two modes as follows −Transport modeTunnel modeAH authenticates are the same as IP datagram. In transport mode, some fields in the IP header change en-route and their value cannot be predicted by the receiver. These fields are called mutable and they are not protected by AH.Mutable IPv4 fieldsThe mutable IPv4 fields are as follows −Type of service (TOS)FlagsFragment offsetTime to live (TTL)Header checksumTo protect these fields, tunnelling ... Read More

What is IPsec in computer networks?

Bhanu Priya
Updated on 13-Sep-2021 13:11:27

3K+ Views

IP Security (IPSec) is a collection of protocols which is designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level. It helps to create confidential and authenticated and packets for the IP layer as shown in below diagram −IPSec protocol aim is to provide security services for IP packets like encrypting sensitive data/packets, authentication, and protection against replay and data confidentiality. It can be configured to operate in two different modes −Tunnel ModeTransport mode.The original packet is generated as follows −IP HeaderUDP HeaderDataLet us discuss each mode in detail.Tunnel modeIPSec tunnel mode is ... Read More

What is a DNS Name Resolution and explain the cache poisoning attack in DNS?

Bhanu Priya
Updated on 13-Sep-2021 13:07:59

300 Views

Let us understand what the domain name system (DNS) is.Domain Name SystemAll the web servers connected to the internet have a unique IP address in textual form. Now, the process of translating the textual form into an IP address is called DNS or DOMAIN NAME SERVICE name resolution.Theoretically during the name resolution process the program that wishes for the name translation contacts a DNS server that returns the translated IP address, but in reality the entire translation may not occur at a single DNS server, rather the DNS server contacted first will recursively call upon other DNS servers to complete ... Read More

Differentiate between domain and domain name server and components of DNS

Bhanu Priya
Updated on 13-Sep-2021 13:05:23

5K+ Views

The main difference between domain and domain name server (DNS) is that the domain could be a piece of string that helps to spot a specific web site while the DNS (Domain Name System) could be a server that translates the domain to the corresponding ip address to supply the specified webpage.There are several websites on the globe Wide internet (WWW) as well as education, e-commerce, government, and entertainment sites. It’s necessary for every website to have its own website name. It helps to spot the web site.The domain is exclusive to a specific user and others cannot use that ... Read More

What is a Domain Name System?

Bhanu Priya
Updated on 13-Sep-2021 13:03:53

5K+ Views

The acronym for Domain Name System is DNS. It is a naming system that works hierarchically and is decentralized for computers, servers (web servers), services, resources, network devices and components that are present on large networks such as the public Internet.For example, in layman terms, it is a phonebook for computers on the Internet.It translates and maps alphabetic domain names (websites' web addresses or names) to the numeric Internet Protocol (IP) addresses of computers or servers. And it also does the reverse process. DNS uses User Datagram Protocol (UDP). DNS service uses port number 53.Technically, computers or technically the routers ... Read More

What is RPC Implementation?

Bhanu Priya
Updated on 13-Sep-2021 13:02:34

2K+ Views

When a program present in one computer wants to request something from another program which is running on another computer in a different network, then the protocol that the program may use is called Remote Procedure Call.By using this protocol, the program doesn't have a need to know the network details.Applications of RPCSome of the applications of RPC are as follows −Active Directory service in windows uses this protocol.Most of the MMC terminals also use this protocol.Many of the DCOM components are based on RPC.Some utilities such as "Windows Computer Management", "registry editor", etc let us contact a remote system. ... Read More

What is Remote Procedure Call?

Bhanu Priya
Updated on 13-Sep-2021 13:00:04

1K+ Views

Remote Procedure call (RPC) is the type of call which is used to access the programs from the network services.When a computer program is to access or need to be executed from another service network instead of sending and receiving from that network the call has been taken up by the server itself to take that call and access that program in that network service only, without the help of any programmer from any remote location. This all helps in making the local procedure call to be taken up by the server from any remote location.When the remote call is ... Read More

Advertisements