| Summary | 
| Security methods in a computer network can be applied in the application layer, transport layer, and IP layer. | 
| IP security (IPSec) is a collection of protocols designed by the IETF to provide security for an internet packet. | 
| The Authentication Header protocol provides integrity and message authentication. The Encapsulating Security Payload protocol provides integrity, message authentication and privacy | 
| The Transport Layer Security provides security at the transport layer through its handshake protocol and data exchange protocol. | 
| Pretty Good Privacy (PGP) provides security for the transmission of email. | 
| A firewall ia a router installed between the internal network of an organization and the rest of the internet. | 
| Packet-filter firewall blocks or forwards packets based on information on the network and transport layers. | 
| A proxy firewall blocks or forwards packets based on information in the application layer. | 
Thursday, February 5, 2009
Summary
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment