merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
Virtual Private Networks (VPNs) cont. � IPsec � Performs both encryption and authentication to address the inherent lack of security on IP-based networks � Three characteristics � Sender authentication, message integrity, and data confidentiality � No modification to user applications � Two security mechanisms � Authentication Header (AH) � Encapsulating Security Protocol (ESP) © Pearson Education Information Security: Principles and Practices 36
Virtual Private Networks (VPNs) cont. � IPsec cont. � Authentication Header (AH) � Modifies IP datagrams by adding an additional field that enables receivers to check the authenticity of the data within the datagram � Encapsulating Security Protocol (ESP) � Operates under the principle of encapsulation: encrypted data is sandwiched between an ESP header and ESP trailer © Pearson Education Information Security: Principles and Practices 37
- Page 1 and 2: Information Security Principles and
- Page 3 and 4: Network Security in Context � Con
- Page 5 and 6: OSI Reference Model cont. © Pearso
- Page 7 and 8: OSI Reference Model and TCP/IP cont
- Page 9 and 10: OSI Reference Model and TCP/IP cont
- Page 11 and 12: OSI Model and Security � Security
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19 and 20: Firewalls � Firewalls typically r
- Page 21 and 22: Firewalls cont. � Bastion Hosts
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33 and 34: Intrusion Detection Systems (IDS) c
- Page 35: Virtual Private Networks (VPNs) �
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
Virtual Private Networks (VPNs)<br />
cont.<br />
� IPsec cont.<br />
� Authentication Header (AH)<br />
� Modifies IP datagrams by adding an additional<br />
field that enables receivers to check the<br />
authenticity of the data within the datagram<br />
� Encapsulating Security Protocol (ESP)<br />
� Operates under the principle of encapsulation:<br />
encrypted data is sandwiched between an ESP<br />
header and ESP trailer<br />
© Pearson Education Information Security:<br />
Principles and Practices 37