Security Protocols

IP Level Security: IPSEC

IP Level Security: IPSEC IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the IP level. IPSec does not define the use of any specific encryption or authentication method. Instead, it provides a framework and a mechanism: it leaves the selection of the encryption, authentication, and hashing …

IP Level Security: IPSEC Read More »

Transport Layer Security

Transport Layer Security Transport Layer Security (TLS) was designed to provide security at the transport layer. TLS was derived from a security protocol called Secure Sockets Layer (SSL), designed by Netscape to provide security on the WWW. TLS is a nonproprietary version of SSL designed by IETF. For, transactions on the Internet, a browser need the following: 1. The customer needs to be sure that …

Transport Layer Security Read More »

Application Layer Security

Application Layer Security Application Layer Security The implementation of security at the application layer is more feasible and simpler, particularly when the Internet communication involves only two parties, as in the case of email and TELNET. The sender and the receiver can agree to use the same protocol and to use any type of security services they desire. In this …

Application Layer Security Read More »

Fire Walls

Fire Walls   Fire Walls All previous security measures cannot prevent Eve from sending a harmful message to a system. To control access to a system we need firewalls. A firewall is-a device (usually a router or a computer) installed between the internal network of an organization and the rest of the Internet. It is designed to forward some packets …

Fire Walls Read More »

Scroll to Top