| Summary |
| Security methods in a computer network can be applied in the application layer, transport layer, and IP layer. |
| IP security (IPSec) is a collection of protocols designed by the IETF to provide security for an internet packet. |
| The Authentication Header protocol provides integrity and message authentication. The Encapsulating Security Payload protocol provides integrity, message authentication and privacy |
| The Transport Layer Security provides security at the transport layer through its handshake protocol and data exchange protocol. |
| Pretty Good Privacy (PGP) provides security for the transmission of email. |
| A firewall ia a router installed between the internal network of an organization and the rest of the internet. |
| Packet-filter firewall blocks or forwards packets based on information on the network and transport layers. |
| A proxy firewall blocks or forwards packets based on information in the application layer. |
Thursday, February 5, 2009
Summary
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment