StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Securing Data Using IPSEC VPN over Satellite Communication - Research Paper Example

Cite this document
Summary
This reseaerch paper 'Securing Data Using IPSEC VPN over Satellite Communication' intents how internet protocol security virtual private network (IPSEC VPN) secures the procedure of data transmission over other methods like satellite communication systems; and discusses the various significant…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Securing Data Using IPSEC VPN over Satellite Communication
Read Text Preview

Extract of sample "Securing Data Using IPSEC VPN over Satellite Communication"

Securing Data Using IPSEC VPN over Satellite Communication The prime intent of this research paper is to determine how internet protocol security virtual private network (IPSEC VPN) secures the procedure of data transmission over other methods like satellite communication systems. In order to fulfill this objective, various significant aspects will be discussed in the research paper. These aspects comprise elaborating the functions of VPN, techniques to be used for securing valuable data and analyzing the facets of VPN over the system of satellite communications. In order to determine the aforesaid objective of the study, a qualitative approach of research method will be used. In this regard, it can be asserted that the qualitative research method primarily relies on reviewing varied literatures including peer reviewed journals, articles and books among others that will help in gaining broad idea about the respective subject matter of the study. Based on the research study, it can be stated that internet protocol security is a set of secure networking protocol through which sensitive information can be shared more securely. Moreover, through the conduct of the research study, it can be perceived that ‘virtual private network’ tunnel may help the users to transform sensitive information from one place to other by effectively using encoding as well as decoding procedure. In this regard, cryptography mechanism plays an imperative role towards transforming and most vitally securing data from one specific location to other. Introduction The notion of VPN is denoted as a ‘Virtual Private Network’, which is usually used for conducting various telecommunication related services through the assistance of internet network. Through the help of this communication medium, huge number of data can be transformed from one place to other. Evidently, during the early 21st century, numerous individuals and organizations have relied on VPNs for the purpose of transferring data. Simultaneously, IPSEC VPN is represented as ‘Internet Protocol Security Virtual Private Networks’, which aids in transferring data through the network of cryptographic protocols in order to protect ‘Internet Protocol’ (IP) traffic. In this regard, encrypted texts are often viewed to get utilized for transferring data or information through varied internet networks (Service Star, n.d.). Problem Statement During the modern era, popularity of internet has increased substantially. At the same time, the essentiality of maintaining privacy of the information has elevated at a large extent. In this regard, several organizations have witnessed the intrusion of unethical and unauthorized accesses on their respective essential information, which certainly hampered their operational requirements at large. It is thus crucial to prevent unauthorized access towards varied internet networks, which has certainly created multiple challenges for the modern civilization by raising varied criminal offences like computer hacking and different forms of cyber attacks among others (Service Star n.d.). Aims and Objective of the Paper Wit this concern, the prime intent of the research paper is to find out how IPSEC VPN aids in securing the network prevailing between the two sides i.e. the sender and the receiver. Various significant aspects that entail identifying the functions of VPN over satellite communication, determining the techniques that will be suitable for securing data and recognizing the unique features of using VPN over the satellite will also be discussed in the research paper. Literature Review According to the viewpoints of Noubir & Allmen (n.d.), cyber attack has emerged as a threat for the modern civilization in this present day context as compared to earlier years, which is duly considered to be one of the crucial issues persisting in this modern IT and telecommunication industry segment. Due to the advancement of various technological aspects or methods, it can be apparently observed that the number of cyber criminals intercepting and corrupting the transmitted data over internet networks in the form of having illicit access to such data. Thus, data transmission and communication are duly considered to be certain potential factors that with the help of satellite mechanism prevent in lessening the threat of cyber violence. Moreover, these factors are also recognized in enhancing the confidentiality and the ethnicity of the stored as well as transmitted data by a certain level (Noubir & Allmen, n.d.) Securing the Network between the Two Sides (Sender and the Receiver) With the increased level of globalization, the incorporation of certain effective technological advancements like VPNs has certainly became the prime motive of every business organizations of this 21st century. Over the preceding decade, growth of global business enterprises and commercialization has certainly driven organizations to select appropriate internet networks as an effective communication mode. Thus, the importance of information system security has become one of the most indispensable aspects of modern business organizations. In this regard, it can be asserted that in order to secure data transfer, there often lays the requirement of maintaining and understanding the principles of network security during the data transfer. Thus, in order to meet this particular aim, individuals and organizations must follow ethical security norms and applications while conducting their respective operations. Apart from this, in order to maintain the confidentiality of the data, organizations must incorporate cryptography concepts during data transfer. Moreover, for preserving authenticity and message integrity, individuals and organizations need to emphasize developing the identities of senders as well as receivers (Perrig et al., 2014). The concept of cryptography is quite interesting and finds significant level of applicability in the area of securing data through the help of IPSEC VPN over satellite communication. In this regard, it can be asserted that cryptography concept can be executed properly with the help of three forms of data transmission. The first form can be termed as stored or dormant form. In this form, the data either remains stored within certain storage devices or stays unused. Simultaneously, the second form denotes the transmission stage, wherein the data undergoes transmission from one point to other. Moreover, the third or the final stage is the data processing stage, wherein the data undergoes simultaneous processing as well as storage (Stallings, 2014). This can be better understood with the help of the following diagrammatical representation: Fig.1: Cryptography Concept for Securing Data Source: (The Government of the Hong Kong Special Administrative Region, 2008) Among all the stages of data existence, only the first and the second stages are vulnerable towards data hampering activities. As a corrective measure, data in these two stages are often subjected to encryption procedure. Thus, it can be asserted that in relation to the encryption process, valuable or confidential data can be prevented from unauthorized sources and the same can be easily accessed. In precise, the notion of cryptography can be described as the procedure of hiding data from unethical access of cyber criminals. Thus, it can be asserted that through cryptography mechanism, the authenticity of data can be persevered at large. In this context, certain sorts of cryptographic algorithm assist in maintaining the privacy of the data, which has been depicted below in the form of a graphical representation. Fig.2: Application of Encrypted Text Transferring Source: (The Government of the Hong Kong Special Administrative Region, 2008) Most importantly, file transfer can be secured by establishing an authenticate communication between the respective users. In this regard, data security can be ensured by the identification of users or hosts connections’ authentication in case of file sharing process. Moreover, by improving the network layers, secured data transmission can be ensured in case of forming effective communication over varied internet networks. At the same time, satellite communication is regarded as one of the significant mediums based on which global communication can be conducted more effectively. Thus, security maintenance is highly essential for lessening the interruption and the modification of the transmitted data by a certain degree (Fereidooni et al. 2012; Noubir & Allmen, n.d.). Functions of VPN over Satellite Communication In order to determine the functions of VPNs over satellite communication, it can be affirmed that VPNs are the only way through which information can be protected adequately. It can be asserted that transmission of protected data over varied internet networks can be made secured through the help of ‘virtual private network’ technology. In order to perform its function, the users often found a virtual private “tunnel” for entering into diverse internal networks more securely. At the same time, VPN technology assists users to access the stored resources more efficiently. Apart from this, data sharing and communication can also be conducted securely through the help of VPN technology (Walker, 2012; Olechna & Feighery, 2001). It is worth mentioning that tunneling protocol is one of the key components through which it is possible to secure data more effectively. At the same time, tunneling protocol supports the users to convey the encapsulated packets from sender to receiver without any unauthorized access during the travel through the tunnel. It can also be asserted that through the help of logical path, encapsulated packets reach into their respective destinations with utmost ease. In this regard, IPSEC, L2TP, PPTP and SSL are visualized as certain examples of tunneling protocols that are often used in the case of internet networking (Walker, 2012). In order to secure the procedure of data transmission by using IPSEC VPN, encryption mechanism can be taken into concern with the help of preparing a new encapsulated (wrapped) packet. It can be apparently recognized in this similar circumstance that unprotected data transmission is risky due to the presence of ‘evil ways’ in varied internet networks. Thus, it can be asserted that IPSEC VPN ensures the development of required infrastructure in alignment with internet networks during data sharing or accessing. Thus, in order to highlight the function of ‘virtual private network’ over satellite communication, it can be apparently asserted that private or governmental enterprises are operating their respective business or essential operations along with communication via the help of ‘virtual private network’ (Fereidooni et al. 2012). This can be better understood with the help of the following diagrammatical illustration: Fig.3: Applications or functions of VPN Technology Source: (Service Star, n.d.) The tunneling protocol technologies are commonly used in ‘virtual private network’ in order to perform wide internet networking access more sensitively. This can be justified with reference to the fact that the users can enter into the system servers and communicate via internet by the assistance of VPN gateway. In this regard, internet protocol security transforms the communicated messages or data into a new encapsulated (wrapped) packet, which remains encrypted until it reaches to the destination or the end point of network routing. Use of Different Techniques to Secure the Data According to Dennin & Dennin (1979), data security has become one of the crucial aspects for every individual while performing any function through internet medium. It has been quite evident that the cyber criminals can enter into systems server and thus corrupt or modify the stored data in an unauthorized manner. At the same time, it can also be ascertained that cyber criminals often hack confidential data or information from system servers. In this context, most of the global organizations in the form of users are viewed to face several difficulties during the conduct of the operations like transferring sensitive information or online money transactions through internet. Thus, in order to reduce the unethical and unauthorized access on distinct internet networks, “Internet Engineering Task Force” (IETF) has introduced certain adequate techniques for addressing along with mitigating the same (Dennin & Dennin, 1979). As IETF has recognized that data or information over the internet domain needs to be highly secured, utmost preference is given towards maintaining greater security level on its database in order to avoid the threat of the opposition countries (Noubir & Allmen, n.d.). By taking into concern the above discussed steps, it can be ascertained that the technological tool of IPSEC VPN provides interoperable secured host pipes through which valuable information are usually transformed from one destination to other. Specially mentioning, ‘virtual private network’ technology assists users to transmit the encapsulated packet through the tunneling protocol, which eventually ensures the protection of the sensitive data in the form of determining the internet protocol layer effectively (Service Star, n.d.). With regards to the report published by Service Star (n.d.), the internet protocol security system i.e. IPSEC possesses an internet protocol ‘Encapsulating Security Payload’ (ESP) along with an ‘Authentication Header’ (AH) through which the cryptographic algorithms are formatted. Moreover, the report of Service Star (n.d.) also claimed that ‘virtual private network’ technology supports the interoperability of data during the transformation of data through the tunnel described above. Similarly, multiple algorithms are supported by cryptographic algorithm that aid in maintaining traffic protection within the framed internet protocol security framework (Service Star, n.d.). In relation to the above analysis, Kayarkar (2014) claimed that the following techniques may help in securing data more effectively. These techniques have been explained in detail in the following: Cryptography. Cryptography is an effective technique, which has the ability of encrypting texts or messages of the users into a new encapsulated (wrapped) packet. Specially mentioning, the technique delivers the encapsulated (wrapped) packet to the destination internet protocol with the intention of protecting unauthorized access of any third party towards valuable information. At the same time, due to the conversion of actual data into encrypted format, it is obfuscated and non-readable for the others. In case of cryptography mechanism, encrypted data often allows the users to segment diverse networks into two networking levels such as data-link layer and network layer (Kayarkar 2014). In this regard, according to the report published by Prism Net (n.d.), it can be ascertained that during the use of cryptographic method in daily operations, users generally obtain several significant benefits due to the availability of specific mechanisms. In order to highlight the biggest advantage of using cryptographic process, the report of Prism Net (n.d.) highlighted that the private key of cryptography process is the most secured item in terms of its nature. Moreover, the report has also deciphered the fact that the cryptography mechanism cannot be used by any individual during the data transmission procedure through the tunnel. At the same time, in case of signature authorization, its digital certification and timestamp mechanism can be found to be quite unique, which eventually make the technique quite effective in its execution (Prism Net, n.d.). On the other hand, in order to highlight the limitations or disadvantages of the aforesaid technique, it can be asserted that the transmission of large data/information is prohibitive in case of cryptography mechanism. At the same time, the report of Prism Net (n.d.) also asserted the fact that public-key cryptography is comparatively less secured mechanism than that of the private-key cryptography process. This can be justified with reference to the fact that the actual key of encapsulated (wrapped) packet is transmitted within the network tunnel, which can be easily accessed in an unauthorized manner. Additionally, the key size of symmetric cryptography is found to be comparatively low, which signifies low protection over the internet network tunnel (Prism Net, n.d.). Hashing. Apart from the technique of cryptography, hashing is an appropriate mechanism through which it can be possible to transform length data into a fixed length sequence. In this regard, hashing can be defined as the transformation through which authorized retrieval of data is restricted for third-party operators (Kayarkar, 2014). Similarly, in order to highlight the advantages of hashing, it can be asserted that hash mechanism is appropriate, when the number of entries is large during the data transmission. On the other hand, hash technique is one of the most difficult mechanisms to implement during the procedure of data transmission through the tunnel. This can be duly considered as one of the crucial disadvantages of hashing (Kayarkar, 2014). Steganography. Through the help of steganography mechanism, it is possible to process the sensitive information in any type sort of internet networking communication procedure. In this regard, it has been revealed that the data or information travel through internet network in a concealed manner (Kayarkar, 2014). As per the viewpoints of Das & et al. (2008), steganography is an appropriate mechanism, through which confidential data can be hidden from the illicit access over the internet networking transmission. Moreover, in this regard, Kuo et al. (2008) claimed that during the transmission of data over varied internet network, steganography mechanism divided the actual message into several numbers of blocks that usually increase the holding capacity of data at large. In this similar context, it can be asserted that steganography mechanism has the capability of breaking larger information into small blocks that can be apparently noted as still images, audios and videos among others (Das et al., 2008; Kuo et al., 2008). At the same time, steganography mechanism has few advantages in the domain of IPSEC VPN. Specially mentioning, encrypted message is unbreakable due to the presence of steganography mechanism in internet networking. Thus, it can be asserted that steganography mechanism is one of the most secured mechanisms during data transmission from one end to the other. On the other hand, it generates certain crucial problems particularly during network surveillance and monitoring, as it becomes quite difficult to detect the actual data/information (Das et al., 2008; Kuo & et al., 2008). Access Control. Apart from this, access control is the unique mechanism of data securing, which assists the authorized users to prevent or restrict the unofficial access on internet database or information. In terms of advantages, it can be asserted that through the help of access control mechanism, it is possible to retrieve all the accessed data or executable objects more easily during network surveillance and monitoring process. On the other hand, access control mechanism has the limitation towards determining sensitive information up to a limited range (Kayarkar 2014). Based on the above discussed techniques, it can be asserted that cryptography process is one of the most effective techniques of data securing on ‘virtual private network’ over satellite communications mechanism as compared to others. Justifiably, it can be asserted that this specific mechanism has a unique private key based on which valuable data can be accessed. Moreover, the private key can also be converted into an encrypted text during the procedure of data transmission through the ‘virtual private network’ tunnel. Thus, it can be affirmed that the security of data transmission is quite high in case of cryptography mechanism in comparison with other techniques like access control and steganography among others (Kayarkar 2014; Prism Net, n.d.). Unique Features of Using VPN over Satellite Communications During the early 21st century, the technology of satellite communications has been incorporated for the purpose of eradicating ‘evil ways’ over various internet networking channels. Simultaneously, it has perceived that the above discussed communication technology has been assisting diverse internet networking channels in providing greater connectivity to wide number of areas (Ground Control 2003). With the gaining momentum of globalization and technological advancements, the demand of internet networking has increased in this present day context as compared to earlier years. In order to address the need of varied internet networks, satellite communications can be regarded as an appropriate one to deal with this situation more effectively. In this regard, the North American based “Internet Engineering Task Force” (IETF) has introduced “Very Small Aperture Terminal” (VSAT), which holds the potentiality in forming greater connections over varied internet networks more effectively and securely. In order to perform the task of internet networking, satellite communication systems often receive signals from satellite dishes along with the associated electronics instruments (Ground Control, 2003). With regards to the notion of internet connectivity, ‘virtual private network’ receives signal from satellites and thus establish greater communication between senders and receivers. In this regard, it can be asserted that transmission control protocol / internet protocol suite helps the users to communicate within broad range of geographical areas through web browsing. Apart from this, transmission control protocol / internet protocol suite also assists individuals and organizations to send sensitive data and receive confidential information over internet networking. This internet connectivity is generally formed by the help of encapsulated (wrapped) packets of data. Moreover, during the transmission of data, the encapsulated (wrapped) packets of data are viewed to build up a stream or bursts, ensuring that the information is stored within packet headers. At the same time, these also guarantee the deliverance of appropriate data to correct destinations without any error (Sonnet, n.d.). The following diagram denotes the internet connection over the VPN tunnel: Fig.4: The Virtual Private Network Tunnel Source: (Sonnet, n.d.) Based on the above discussion, it can be affirmed that the unique features of VPN over satellite communications system have the ability to assist the users in conveying their respective messages to the ultimate destinations through varied internet networks. In this regard, transmission control protocol / internet protocol suite generally protects the reliability of sensitive information over the unreliable and congested networks (Sonnet, n.d.). Research Methodology A qualitative approach of research methodology has been undertaken in this study for attaining the above stated aims along with objectives. In terms of rationale, it can be affirmed that this particular research method has been chosen for the research study in order to obtain in-depth understanding about securing the procedure of data transmission by using the technological tool of IPSEC VPN over the satellite communication process. In this regard, the study with the aid of the above stated methodology has endeavored to identify the prevalence of secured networks between a sender and a receiver. Apart from this, the research study has also tried to recognize the functions and most vitally the unique facets of using VPN over the practice of satellite communications. Specially mentioning, there exist certain prime reasons for which the qualitative research approach has been used in the study. In this context, one of such reasons can be noted as that the approach has assisted the individuals as well as the organizations to comprehend the significance of securing the procedure of data transmission with the help of IPSEC VPN over other methods like satellite communications. Most importantly, the research study has also enhanced the essentiality of maintaining confidentiality of the sensitive data by a certain level (Kolb, 2012; Roshan & Deeptee, 2009). From the above analysis and discussion, it will be vital to mention that in order to collect reliable data relevant to the subject matter of the research study i.e. securing data by executing IPSEC VPN over satellite communications system, varied secondary sources including peer reviewed journals, articles and books have been reviewed. In order to determine the above stated objectives of the research study, a brief idea about the particular subject matter of the research study has been obtained from collecting secondary data. In order to identify the procedure of securing data by using IPSEC VPN over satellite communication systems, secondary research has been conducted. It is worth mentioning that during the conduct of the research study, the selected qualitative research approach emphasized maintaining the validity along with the reliability of data for gaining valid outcomes of the research study more effectively. At the same time, various ethical factors have also been taken into concern while conducting the research study in order to evade any sort of research limitation (Halai, 2006). Analysis and Outcome of the Research Discussion From the above analysis, it can be ascertained that cyber attack has become one of the most crucial threats of global enterprises and also for individuals in this present day context as compared to the preceding years. Thus, with this concern, it can be affirmed that intercepting and corrupting the confidential transmitted data have certainly raised most difficult challenges for several organizations and individuals during the early 21st century. In this regard, the North American based “Internet Engineering Task Force” (IETF) has developed an adequate technique with the aim of securing data using IPSEC VPN over the practice of satellite communication (Kayarkar 2014; Noubir & Allmen, n.d.). It is worth mention that the technology of VPN has been introduced in order to allow the internet users to establish a “tunnel” through which internal network sensitive information can be transmitted more securely. According to the study, it can be ascertained that IPSEC VPN system assists the users to convert data into an encapsulated (wrapped) packet format, which is usually transformed through VPN tunnel. At the same time, the message or the document of the users immediately gets transformed into encrypted text through the help of cryptographic algorithm and remains unchanged unit it reaches the destination. It will be worth mentioning that the technological tool of IPSEC divides AN actual message into two parts such as ‘Authentication Header’ (AH) and internet protocol ‘Encapsulating Security Payload’ (ESP) that aids in maintaining utmost security as well as privacy of the relevant contents. Specially mentioning, while identifying and elaborating the functions of IPSEC VPN technology over satellite communications system, it can be apparently noted that cryptography mechanism is the most effective technique based on which confidentiality of data can be maintained more adequately during the conduct of sensitive operations (Kayarkar 2014; Noubir & Allmen n.d.). Results & Findings Based on the above analysis, it can be ascertained that internet protocol security effectively helps in securing varied networks based on which distinct sensitive information can be shared secretly. Moreover, it has been also perceived that through the assistance of internet protocol security, ‘virtual private network’ information can be exchanged securely through following encoding as well as decoding procedure systematically. In this regard, ‘Encapsulating Security Payload’ prevents the interruption on the information from any sort of unauthorized access. At the same time, ‘Authentication Header’ assists internet protocols to identify the internet key exchanges (IEK) of the senders and also receivers during the information transmission process over internet networks. Thus, it can be evidently asserted that the technique of cryptography might play a decisive role in prevent valuable data from getting unauthorized access by any party. Recommendations and Conclusion In terms of recommendations, it can be affirmed that the above identified functions and the facets of IPSEC VPN over the method of satellite communications can be improved by implementing distinct methods of encapsulated (wrapped) packet on transmission control protocol. Moreover, VPN’s performance over satellite communications practice can also be developed by improving the encryption mechanism of transmission control protocol over the data steam. It is worth mentioning that the improvement in the approaches of IPSEC VPN may assist in delivering significant benefits to both the individuals and the organizations in the form of securing their respective valuable or confidential data. In this similar context, it will be vital to mention that this particular function of IPSEC VPN would provide an extra mileage to become much effective in its operations as compared to the method of satellite communications by a considerable extent. From the above research, one of the significant aspects i.e. how network can be secured between the senders and the receivers over the satellite network communication pattern has become quite clear. It is worth mentioning that the study has highlighted the functions as well as the features of IPSEC VPN over the satellite communications mechanism. Besides, the research paper also explained varied techniques of securing data along with their respective advantages and demerits. At the same time, the research study also deciphered how transmission control protocol assists VPN towards making data sharing and data communication procedures more secured. Thus, conclusively, it can be asserted that IPSEC VPN can restrict the crucial concern of accessing unauthorized data by any party in the form of developing more advanced encryption mechanism and transmission control protocol gateway. References Bentley, Walker. (2012). Challenges of VPN over satellite. Retrieved from http://www.bentley-walker.com/articles/101 Das, S., Das. S., Bandyopadhyay, B., & Sanyal, S. (2008). Steganography and steganalysis: different approaches. International Journal of Computers, Information Technology and Engineering, 2(1), 1-11. Dennin, D. E., & Dennin. P. J. (1979). Data security. Computing Survey, 11(3), 227-249. Fereidooni, H., Taheri, H., & Mahramian, M. (2012). E2E KEEP: End to end key exchange and encryption protocol for accelerated satellite networks. International Journal of Communications, Network and System Sciences, 5, 228-237. Ground Control. (2003). Using application layer technology to overcome the impact of satellite circuit latency on VPN performance. IG-VPN, 1-11. Halai, A. (2006). Ethics in qualitative research: issues and challenges. The Aga Khan University, 4, 1-13. Kolb, S. M. (2012). Grounded theory and the constant comparative method: Valid research strategies for educators. Journal of Emerging Trends in Educational Research and Policy studies, 3(1), 83-86. Kuo, W., Jiang, D., & Huang, Y. (2008). A reversible data hiding scheme based on block division. Congress on Image and Signal Processing, 1, 365-369. Noubir, G., & Allmen, L. (n.d.). Security issues in internet protocols over satellite links. Real-Time Software and Networking Group, 1-5. Olechna, P. E., & Feighery, P. (2001). Virtual private network issue using satellite based networks. IEEE Military Communication Conference, 2, 785-789. Perrig, A., Canettiz, R., Song, D., Tygar, J. D., Berkeley, U. C., Fountain, D., & Watson, T. J. (2014). Efficient and secure source authentication for multicast. CMU Electrical & Computer Engineering, 1-12. Prism Net. (n.d.). Cryptography. Retrieved from https://www.prismnet.com/~hcexres/power_tools/hyperweb/website1.PDF Roshan, B., & Deeptee, P. R. (2009). Justifications for qualitative research in organizations: A step forward. The Journal of Online Education, 1-7. Stallings, W. (2014). Cryptography and network security. Chapter 2, 1-68. Service Star. (n.d.). IPSec VPNs over spacenet VSAT networks. Old Meadow Road, 848-1000. The Government of the Hong Kong Special Administrative Region. (2008). VPN security. Retrieved from http://www.infosec.gov.hk/english/technical/files/vpn.pdf Bibliography European Broadcasting Union. (2013). SLA for media transport services – high level guidelines. Geneva: European Broadcasting Union. Sun, Z. (2014). Satellite networking: principles and protocols. Hoboken: Wiley. Zhang, Y. (2011). TCP/IP over satellite. Retrieved from http://csci6433.org/TCP%20IP%20Over%20Satellite--Yi%20Zhang.pdf Zhu, J.-M., & Ma, J.-F. (2004). An Internet key exchange protocol based on public key infrastructure. Journal of Shanghai University, 8, 51-56. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Securing Data Using IPSEC VPN over Satellite Communication Research Paper Example | Topics and Well Written Essays - 4500 words, n.d.)
Securing Data Using IPSEC VPN over Satellite Communication Research Paper Example | Topics and Well Written Essays - 4500 words. https://studentshare.org/information-technology/1839896-securing-data-using-ipsec-vpn-over-satellite-communication
(Securing Data Using IPSEC VPN over Satellite Communication Research Paper Example | Topics and Well Written Essays - 4500 Words)
Securing Data Using IPSEC VPN over Satellite Communication Research Paper Example | Topics and Well Written Essays - 4500 Words. https://studentshare.org/information-technology/1839896-securing-data-using-ipsec-vpn-over-satellite-communication.
“Securing Data Using IPSEC VPN over Satellite Communication Research Paper Example | Topics and Well Written Essays - 4500 Words”. https://studentshare.org/information-technology/1839896-securing-data-using-ipsec-vpn-over-satellite-communication.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing Data Using IPSEC VPN over Satellite Communication

Data Encryption and Authentication Methods

Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments.... These mails could be encrypted and sent over a secure network by the sender and again decoded and read by the receiver.... his is a relatively safer way of transmitting information over the internet.... lassification based on keys : Cryptography is the process of disguising data as cipher text before sending it over a network....
5 Pages (1250 words) Term Paper

Network Remote Access

The VPN client creates a tunnel to the VPN server over the Internet connection.... The VPN client has to first establish a connection to the carrier and then the VPN client will create a tunnel to the VPN server over the logical live connection.... The most ideal way of connecting to the office network would to use a virtual private network (vpn) when you are away from the office.... In order to connect to the office vpn server we need to first connect to a local carrier (i....
5 Pages (1250 words) Essay

The Rise, Fall and Resurrection of Iridium:A Project Management Perspective

Some companies wanted to be strategic partners while others chose to invest in satellite technology.... By this time, investors were mainly interested to tie strategic partnerships with Iridium although there were some investors who also expressed their interests in satellite technology as well.... Investors not only scored over financial returns but they even got an opportunity to owe gateways and also distribution rights in a particular area....
5 Pages (1250 words) Coursework

Data Communication Using the Top-Down Approach

This paper “Data communication Using the Top-Down Approach” takes a look at Equity which is a mortgage broker company and their data communication using computer networks.... Data communication Using the Top-Down ApproachAbstractThis paper takes a look at Equity which is a mortgage broker company and their data communication using computer networks.... Each office at Equity first is now self reliant as they do not rely on the main office to ensure maintenance as well as efficient communication....
2 Pages (500 words) Essay

How are derechos detected by weather satellites

satellite imagery is used to see derechos from space.... satellite imagery is used to see derechos from space.... Tropical cyclones utilize satellite imagery caused by infrared lasers.... Figure showing a satellite picture of the Derechos in central Indiana .... The digitalGlobe coverage helps to view image data....
1 Pages (250 words) Research Paper

The First Satellite and its Original Purpose

This essay discusses that the making of the first satellite is not considered a one-man affair.... The original purpose of the satellite was for the observance of various scientific phenomena in space.... Satellites work by receiving radio signals sent from the earth....
4 Pages (1000 words) Assignment

Operational Security

Information and communication are critical factors when it comes to the effective functioning of any law enforcement agencies.... As a result, terrorist tend to target communication networks that belong to law enforcement agencies.... The aim is to ensure communication is impossible.... The presence of an OPSEC would ensure that law enforcement agencies could protect their communication network.... Operations security systems focus on fighting terrorism using proactive measures instead of reactive measures....
2 Pages (500 words) Assignment

Remote Access Risks

This is usually a private communication portal.... A virtual private network… The communication from a client is carried out virtually using the IP.... Even though it is secure way of communication, it is public unlike the dial-up (Lewis, 2006). Some of the most Remote Access Risks Affiliation: Research the different types of VPNs and other relevant remote access applications The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area Network (LAN)....
1 Pages (250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us