Monday, June 10, 2019

Internet Protocol Security (IPsec) Research Paper

meshwork Protocol Security (IPsec) - Research Paper ExampleIn order to ensure credentials of information over the Internet various pledge technologies have been proposed that usually work on the higher layers of the OSI model and provide security in cost of authentication, confidentiality, integrity and availability. IPSec is one such security technology that operates on the IP layer and provides confidentiality, integrity and authentication. As it operates at the IP layer, its implementation provides security in the higher layers as well. And its implementation is such that the existing setup of Internet does not have to be changed in order to implement it. This report pre displaces an overview of the IPSec technology. It discusses the world-wide architecture of the technology, briefly covering its technical details and its operation modes. Furthermore the report discusses how IPSec can be integrated into the existing Internet setup. 1. Introduction The security of information is defined by four attributes confidentiality, integrity, privacy and availability (Adeyinka, 2008). In the past, when computers were not that common a commodity let alone the Internet, virtual underground networks were formed through installation of dedicated leased lines between the hosts e.g. networking of remote offices (Liska, 2003). gens 1 Dedicated Leased Lines VPN Since these lease lines were private the information sent or retrieved remained within the related parties and so the communication was fast and secure. Thus private networks were formed. But the setup was costly and very few companies could afford it. later(prenominal) on, in order to accommodate the mobile enjoymentrs, the companies installed dedicated remote dial-in servers (Remote Access Servers) that had modem(s) each connected to a separate dedicated phone line (Liska, 2003). Figure 2 Dial-up VPN Although the networking was achieved, yet the effort was not that useful as the speed of these networks was ve ry slow. With the advent of the Internet and its global web servers that provided larger and easier access worldwide, the use of leased lines became an expensive burden and remained limited to very few resourceful companies. In view to the easy access to worldwide communication granted by the Internet, the element of security whatsoeverwhat lost its significance and every other school, office, company and business sought out to be connected through the Internet. The instances of some serious cyber crimes (Cyber Crime Stories) led to the realization that the Internet is not at all secure. Being a public medium, the information sent across the Internet in the form of data packets passes through various networks until they reach their intended destination. Since the Internet protocol (IP) offers no built-in security, this plain text data in the IP datagram cannot be prevented from unauthorized access from the public network. Any third party can easily inspect, even modify or generate traitorously data and compromise system security. For instance the passwords that are sent can be tracked and looked into (packet-sniffing), IP packets

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.