Securing N/w Communication (OBJ 3.2) Flashcards
1
Q
Site to Site VPN
A
Secures traffic, but may slow down users due to the extra data transfer
2
Q
Client to Site VPN
A
Connects devices directly to the headquarters, enabling remote users to access the network.
3
Q
Clientless VPN
A
Secures remote access through browser-based VPN tunnels without needing client software or hardware configuration.
This is used everyday when you connect to an ecommerce site.
4
Q
IPSEC Internet Protocol Security
A
A protocol suite for secure communication through authentication and data encryption in IP network.
5
Q
IPSEC - 5 steps of setting up a VPN using IPSEC
A
- Request to start Internet Key Exchange (IKE)
- IKE Phase 1 - authenticate parties and establish a channel for negotiation.
- IKE Phase 2 - negotiate security association parameters and fully establish the secure tunnel
- Data transfer between the two parties to occur over the secure tunnel using the keys established in IKE Phase 2.
- Tunnel termination - security association is terminated due to mutual agreement or one party became non responsive
6
Q
A