Secure Communications « K2E Security

By: K2e Security  09-12-2011

As an IT security professional, one of the areas where I gained a significant amount of knowledge and experience in is network security.  Working for a telecommunications company, it’s pretty much a given that if you are working in security, you are dealing with network security protocols such as IPsec, SSL/TLS and SSH.   I started off primarily working with IPsec and eventually was exposed to TLS and finally, SSH.  One of the real issues that I first encountered was differentiating between these network security protocols. It took me time to be able to understand and explain the following:

  • “What is the difference between these network security protocols?”
  • “Which one shall I use?”


Other products and services from K2e Security

09-12-2011

Security Awareness « K2E Security

I see this professional looking window that lists a bunch of file infections and asking for a full scan or for the user to buy the software to remove the viruses that do not even exist. Even before I inspect the computer, I tell her it is probably a fake Anti-Virus trying to trick her into downloading this malicious code. A scanner would show a first threat or infection, launch a scan with a progress bar, and then more infections would be seen.