StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

TLS/SSL and IPSec Paper - Essay Example

Cite this document
Summary
Week 6 DQ By Name Student ID Date DQ1: TLS/SSL vs. IPSec Both TLS/SSL and IPSec provide a security protocol for the Internet protocol suite. Compare these two protocols and discuss the advantages and disadvantages of each protocol from the following angles in particular: Full security?…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
TLS/SSL and IPSec Paper
Read Text Preview

Extract of sample "TLS/SSL and IPSec Paper"

Download file to see previous pages

Accessibility through small preservation required is what makes SSL very admired. Additionally, one of the fundamental advantages of an SSL VPN is that it offers considerable support for rough controls. In addition, if we want to offer a VPN for a specific software application and not for the entire communication network, we can do it using TLS/SSL VPN. So this is the basic reason that TLS/SSL based security structures are becoming extremely popular. Moreover, it is seen that TLS/SSL is used more commonly when its use is associated to a perspm instead of a hardware device (Maalouf, 2010; Dahl, 2004).

However, there is a serious issue with SSL and that is the necessity for PKI. In situations where we are able to bear a slower session, need client authentication and non-repudiation (for example in case of online banking) (Rescorla, 2008). On the other hand, IPsec arrangements are yet the most extensively used technology suits, particularly for large size corporations. In this scenario, the computer connected with an IPsec VPN service is considered a part of the business network and has accurately analogous access as if it was in office.

Additionally, when we need to connect remotely to work from either home or while travelling, we would make use of an IPsec VPN services to communicate. It is observed that IPsec is employed for protecting communication among systems (for example security gateways, proxy servers and edge routers) as compared to some other network communication protocol. However, we do not necessitate client confirmation in these cases because in this scenario data origin verification is enough for communication session.

In addition, with the emergence of new technology based 3GPP communication networks, IPsec was selected over TLS/SSL for a variety of reasons, mainly with such services it does not need PKI to apply and therefore does not need the computation based network communication overhead. IPsec services are as well more flexible for the reason that it can protect UDP, TCP and SCTP (Maalouf, 2010) (Alshamsi & Saito, 2006). DQ2: Single-Sign-On What is the purpose of Single-Sign-On? What are the components of distributed SSO infrastructure?

Provide few examples and possibly compare them. Single Sign on (SSO) is the user’s perceptive of making use of a number of services and systems but only having to 'log-in' once. Basically, the Single Sign on (SSO) (which is also acknowledged as Enterprise Single Sign On or "ESSO") is the facility for a user to make use of the identical id and password to enter into numerous applications in an enterprise. At the same time as passwords are the least protected verification technique, single sign on has at the present time turned out to be known as a reduced sign on (RSO) in view of the fact that more than one type of verification technique is used according to enterprise risk models (Dale, 2009; Authentication World, 2006; The Open Group, 2010).

In addition, Single-Sign-On offers a variety of benefits for instance the capability to implement standardized corporate verification and approval strategies all through the enterprise. In fact, the Single-Sign-On offers end-to-end client review session to improve the security audit and reporting. Additionally, the Single-Sign-On reduces the role of application developers by allowing them to recognize and apply unique

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“TLS/SSL and IPSec Paper Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
TLS/SSL and IPSec Paper Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1455674-week
(TLS/SSL and IPSec Paper Essay Example | Topics and Well Written Essays - 750 Words)
TLS/SSL and IPSec Paper Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1455674-week.
“TLS/SSL and IPSec Paper Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1455674-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF TLS/SSL and IPSec Paper

Project Mercury

The implementation of a national space flight program called Project Mercury started in October 7, 1958 after extensive tests and studies conducted by the government as well as private aerospace industry (Centennial of flight).... The projected life for the project was 4 years and 8 months.... hellip; Mercury was man's first human spacecraft program (Paperlessarchives)....
3 Pages (750 words) Research Paper

Virtual Private Network Tools

The focus in this paper is on a VPN, a network connection that is built on top of already existing publicly accessible telecommunication infrastructure like the internet and is used to provide access to the central organizational network to traveling users and remote offices.... his paper discusses in depth four VPN tools namely, OpenVPN, Cisco VPN Client, LogMeIn Hamachi, and Windows built-in VPN.... In addition to the provision of an alternative to the use of the proxy server for remote access to campus resources, VPN also ensures secure methods to authenticate to the campus wireless network hence data security through the use of encryption technologies such as PPTP, L2TP, ipsec, and SOCKS....
18 Pages (4500 words) Term Paper

An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels

This paper presents a detailed analysis of some of the important aspects associated with wireless networks.... This paper discusses how wireless networks work, what benefits do they offer.... This paper also discusses various types and protocols for wireless networks.... This paper will also discuss a number of security threats associated with these networks.... This paper also discusses various strategies to deal with these security threats....
30 Pages (7500 words) Research Paper

Cryptographic Overhead of IPsec Protocol Suit

Implementation of security through IPSec In their paper, (Zheng & Zhang, 2009) provides a detailed discussion on the working of IPSec and the way it ensures the surety of transmission over a network.... Cryptographic overhead of ipsec Protocol suit By Author Date Introduction Today, the communication between networks, that are being established, have a strong need of good security mechanisms in order to ensure the security, integrity, confidentiality and authenticity between two hosts or two networks....
5 Pages (1250 words) Research Paper

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet Protocol Security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... ipsec is, therefore, a protocol suite that actually secures the Internet Protocol communication between the networks by encrypting and authenticating the data transmitted....
8 Pages (2000 words) Research Paper

Installing and Administering IPSec

This paper "Installing and Administering IPSec" presents an introduction of a security standard, called, IPSec and its capabilities in ensuring secure communication in the network.... ipsec basically uses a combination of protocols such as Authentication Header, Encapsulating Security Payload, etc.... ipsec is usually implemented by maintaining security associations which are stored in a security association database and are retrieved according to the actions specified in the security policies....
9 Pages (2250 words) Term Paper

Analysis of VPN Tools

From the paper "Analysis of VPN Tools" it is clear that reliability, privacy and security of data are some of the key components considered essential with critical data and information being exchanged within an organization's network (Viega & Messier, 2010).... This paper discusses in depth four VPN tools namely, OpenVPN, Cisco VPN Client, LogMeIn Hamachi and Windows built-in VPN.... In addition to the provision of an alternative to the use of proxy servers for remote access to campus resources, VPN also ensures secure methods to authenticate to the campus wireless network hence data security through the use of encryption technologies such as PPTP, L2TP, ipsec and SOCKS....
8 Pages (2000 words) Term Paper

Voice Over Internet Protocol

… The paper "Voice Over Internet Protocol " is a great example of a term paper on logic and programming.... The paper "Voice Over Internet Protocol " is a great example of a term paper on logic and programming.... This paper seeks to look into the various concerns and also the requirements of secure VOIP connections.... The paper reviews some of the most common security vulnerabilities of the VOIP systems and later looks into counter-attacks that are exclusive to the VOIP architecture which is workable in the current systems and most likely to help in the future VOIP security enhancement....
81 Pages (20250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us