Category: SECURITY

Internet news, Insights and Analysis

How IPSEC works?

I could see that, an explanation to IPSEC is not explained well in all the articles I’ve read. I’ll try to explain IPSEC as simple as possible. IPSEC is having two Phases. First is IKE Phase 1. IKE Phase 1: The two end points need to Authenticate first. Authentication can be performed using 3 methods,…
Read more

How Kerberos works?

Let me try to explain Kerberos today. Kerberos is based on Needham–Schroeder protocol. Kerberos is designed to protect from password sniffing attacks, MITM etc. All the user credentials is stored in a Centralised location. The disadvantage is that, this also leads to single point of failure. In the case of Kerberos, the user sends the Principal…
Read more