Premium Essay

Internet Protocol Security

In:

Submitted By AdrianMusyoka
Words 1373
Pages 6
MEANING OF INTERNET PROTOCOL SECURITY
Internet Protocol Security is a framework of open standards for ensuring private secure connections over internet protocol (IP) networks through the use of cryptographic security services. It encrypts and authenticates each communication package on the network in a communication session. It can be used to protect communication between data hosts, security gate ways or security gateway and host. It has been deployed widely to implement virtual private networks.
It supports two encryption modes, tunnel and transport. The transport mode encrypts only the data section of each packet while the tunnel mode encrypts both the header and the data section. On the receiving side, an Internet protocol security compliant device decrypts both the header and the data portion to present it to the user in a format he can understand.
In the recent past there has been a lot of development in the information technology sector. Much if this development is based in information. It is therefore important to protect the information since it is not only precious and private, but if found in the wrong hands, it could be used to do a lot of damage for example terrorism. It has forced tech companies to develop secure ways of transmitting information without the interception of non-intended users. Information is a strategic resource. A significant portion of organizational budgets is spent on managing information. Hence information is a huge business where loads of money are spent to protect it. Information has several security related objectives, confidentiality- protecting the value and secrecy of information, integrity-protect information for accuracy and availability-ensuring that the right information is delivered to the right user at the right time.
It therefore follows that information needs to be protected by all the available resources to an

Similar Documents

Free Essay

Huffman Trucking Service Request Sr-Ht-010

...Huffman Trucking Service Request SR-ht-010 NTC/361 Huffman Trucking Service Request SR-ht-010 Huffman Trucking is a national transportation company that provides carrier services for various vendors, including the United States Government. At present the company has a main office in Cleveland Ohio and hubs located in California, Missouri, and New Jersey (Apollo Group, Inc., 2012) . The ability to remain competitive relies on capable employees and efficient systems that operate at full capacity. The company is in the midst of developing the yearly budget and is examining all of the current systems in place. The Chief Information Officer (CIO) has requested a full review of all the current telephone and data network systems in all locations. Along with the review, recommendations for changes are also required. This document will outline Huffman Trucking’s systems and identify areas for improvement to maintain the company’s high level of service. Telephone Systems Looking at the current systems in the four plants and offices one can see that all four of the offices and plants have different telecommunication systems. Huffman Trucking has locations in four states with offices and plants located in California, Missouri, New Jersey, and Ohio. Many of the locations are using wiring that is not adequate for the system to have the capabilities to function in a business capacity. The California and New Jersey locations use a plain old telephone system (POTS), Private Branch Exchange...

Words: 3605 - Pages: 15

Premium Essay

Work

...Unit 1 discussion 1: familiar protocols Q 1) What role does TCP/IP play for internet communications? TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. Q 2) What role does IP play in data transfer over the internet? IP is a protocol. Simply said, a protocol is a set of rules governing how things work in a certain technology, so that there is some kind of standardization. When put into a network communication context, a protocol is the set of rules governing how packets are transmitted over a network. When you have a protocol, you are sure that all machines one a network (or in the world, when it comes to the Internet), however different they might be, speak the 'same language' and can integrate into the whole framework. IP is probably the most common protocol over the Internet. It is the set of rules governing how packets are transmitted over the Internet. The IP protocol standardizes the way machines over the Internet or any IP network forward or route their packets based on their IP addresses. Q 3) How does Dynamic host configuration protocol ease management of IP addresses...

Words: 573 - Pages: 3

Premium Essay

Samplefile

...stands for 1x Evolution - Data Voice, and is characterized by a maximum data rate of 5.2 Mbps and the ability to support wireless Voice over IP (VoIP) services. 1xRTT. The first phase of CDMA2000, characterized by the ability to support a maximum data rate of 1.44 Kbps. 1xRTT stands for 1x, denoting the one radio channel of 1.25 MHz in Radio Transmission Technology. 2G. The second generation of wireless technology that was characterized by its use of digital transmissions rather than analog methods. Radio bandwidth is used for data transmissions. Data transmissions are limited to a maximum rate of 1.44 Kbps for CDMA 2G services (9.6 Kbps for GSM 2G). Radio bandwidth is consumed whenever the Mobile Node (MN) is connected to the Internet, regardless of whether it is receiving or transmitting data. This is based on the IS-95A standard for CDMA. 2.5G. An evolutionary step between 2G and 3G wireless services wherein two enhancements were introduced over 2G. The first is that the MN only consumes radio bandwidth when data is being transmitted or received. The second is that the maximum data rate increased to approximately 64 Kbps. Most 2.5G services only support data rates between 1.15 Kbps and 384 Kbps. This is based on the IS-95B standard for CDMA. 3G. The third generation of wireless technology, wherein data services are packetized, with speeds up to 2 Mbps. Based on the CDMA2000 standards. 3GPP. Third Generation Partnership Project. A group of organizational...

Words: 7125 - Pages: 29

Premium Essay

Network Design

...Security Proposal Nickolas Dunkle Isaac Mundt Michael Yeager Thomas Sevastos John Dyer Jacob Skrzynski Joseph Weidner Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing...

Words: 5812 - Pages: 24

Premium Essay

Virtual Private Network

...(VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations are able to add large amounts of...

Words: 6523 - Pages: 27

Free Essay

Use of Ipsec in Mobile Ip

...Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: ...

Words: 9748 - Pages: 39

Premium Essay

Network Plus

...(N10-004). If you would like to report an error or contribute additional information, please use the contact link at the bottom of the site, or post in our forums. We hope you find this guide useful in your studies. Sponsor Domain 1.0: Network Technologies Domain 1.1: Common Networking Protocols TCP - TCP breaks data into manageable packets and tracks information such as source and destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of the data. IP - This is a connectionless protocol, which means that a session is not created before sending data. IP is responsible for addressing and routing of packets between computers. It does not guarantee delivery and does not give acknowledgement of packets that are lost or sent out of order as this is the responsibility of higher layer protocols such as TCP. UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery. ICMP - Internet Control Message Protocol enables systems on a TCP/IP network to share status and error information such as with the use of PING and TRACERT utilities. SMTP - Used to reliably send and receive mail over the Internet. FTP - File transfer protocol is used for transferring files between remote systems. Must resolve host name to IP address to establish communication. It is connection oriented (i.e....

Words: 1264 - Pages: 6

Free Essay

Infinite

...Technical security officer: responsible for the configuration, design, deployment and maintenance of information security program, including policies, procedures, technical systems, and workforce training in order to maintain the confidentiality, integrity, and availability of data within the company. ABOUT ETIHAD: founded on 2003, based on Abu Dhabi. Slogan: “from AD to the world”. Etihad Airways is the 4th largest airline in the Middle East and 2nd largest airline in the UAE, after Emirates airlines….James Hogan Chief Executive Officer on 2006…sponsored many sports events such as rugby and formula 1 Abu Dhabi Grand Prix.…..received many awards such as “Best First Class", "Best First Class Seats" and "Best First Class Catering" 2010 opened route from AD to Seoul….Last week sign agreement with Korean air… #1) What attracted you to the field of Information Security? #2) What brings you to us? #3) Do you pursue any information security research outside of your current employer? I like to see candidates who enthusiastically brag about their test lab at home, or what they have recently done at an Information Security conference or convention. I want people on my team who take pride in their work, not a ticket pusher who is just in it to close as many tickets as possible and go home. #4) Why would you like to work in this position? - To help the organization succeed with their achievements by securing their confidentialities and ease to communicate with outsiders. #5) How...

Words: 1244 - Pages: 5

Premium Essay

Nt1310 Unit 7

...Austrie Unit 8Assignment Purdue University IT279 Certified Information Systems Security Professional 2 Professor Laurent Boucard 6/13/18 1) What is a common implementation for the IPSec protocol? The best and commonly used implementation for the IPSec is VPN that uses the Cisco routers to protect the system against risk vulnerabilities. There are four major basic steps applied in utilizing IPSec VPN protocol that ensures the system is same and free from external attacks. The four steps include the encryption of data transmission, validation of data integrity, authentication of data source, as well as ensuring data integrity (International Council of E-Commerce Consultants, 2010). 2). which command should you use?...

Words: 921 - Pages: 4

Premium Essay

Ipv6

...Mr. McClain April 8, 2013 IPv6 What does IPv6 stand for? What exactly is IPv6? IPv6 stands for Internet Protocol version 6. IPv6 is the next generation internet protocol that is in the making of taking over the current internet protocol which is IPv4 or Internet Protocol version 4. Continue reading to learn more about IPv6. “The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years - especially by population dense countries like India and China. The impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4. With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns. IPv6 uses a128-bit address size compared with the 32-bit system used in IPv4 and will allow...

Words: 950 - Pages: 4

Free Essay

W1F1M1

...Jashawn Dixon CSCI 501: Overview of Computer Security Discussion Board One Dr. Huggins July 1, 2015 Since the birth of the internet, we have seen numerous changes within the world progress day to day and along with these changes, we have seen issues that have also had effects on the security feature of numerous assets that works side by side with the operation of the internet. This week’s discussion board question ask for a summary of a recent security incident and to link that information to a topic from Chapter 1 of our text, along with a biblical example that could be tied to the topic at hand. My current event computer security incident comes from Computer Weekly and the post is on how “Most VPNs leak user details, study shows” by Warwick Ashford. Ashford posting is about virtual private network (VPN) and it speaks on how 80 percent of the tested VPN providers, has shown some form of user’s information being leaked by their software, due to a vulnerability known as IPv6 leakage. According to Kim & Solomon (2014) text under Wide Area Network (WAN) Domain connects, “a VPN is a dedicated encrypted tunnel from one endpoint to another.” The purpose of a VPN is to ensure the proper level of security to the connected systems when the primary network set-up alone cannot provide it. The term vulnerability is known as “a weakness that allows a threat to be realized or to have an effect on an asset;” according to Kim & Solomon (2014) text and this IPv6 leakage occurred...

Words: 713 - Pages: 3

Free Essay

Paper

...Network Security Planning By: Marticia Goodwin CIS 532 / Professor Danielle Babb August 19, 2012 Strayer University SAFE is a reference architecture that network designers can use to simplify the complexity of a large internetwork in which the architecture lets you apply a modular approach to network design. Traditional point security tools are limited in their ability to support and securing a business transformation, either leaving critical new resources unprotected or preventing the deployment of new services as they do not secure new processes and protocols. At the same time, organizations are facing a host of new threats that target many of these new services and impact network and service availability (Lippis, 2012). With SAFE, you can analyze the functional, logical, and physical components of a network and thus simplify the process of designing an overall enterprise network, but CISCO SAFE architecture is especially concerned with security. SAFE takes a defense in-depth-approach in which multiple layers of protection are strategically located throughout the network and the layers are under unified strategy for protecting the entire network and the various components of the network, including individual network segments, infrastructure devices, network services, endpoints, and applications (Oppenheimer, 2011). SAFE architecture is comprised of the following major modules: core, data center, campus, management, WAN Edge, Internet Edge, branches, extranet, partner...

Words: 974 - Pages: 4

Free Essay

Ipv4 Versus Ipv6

...Internet Protocol is a set of technical rules that defines how computers communicate over a network. There are currently two versions: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was the first version of Internet Protocol to be widely used, and accounts for most of today’s Internet traffic. There are just over 4 billion IPv4 addresses. While that is a lot of IP addresses, it is not enough to last forever. IPv6 is a newer numbering system that provides a much larger address pool than IPv4, amongst other features. It was deployed in 1999 and should meet the world’s IP addressing needs well into the future. The major difference between IPv4 and IPv6 is the number of IP addresses. There are 4,294,967,296 IPv4 addresses. In contrast, there are 340,282,366,920,938,463,463,374, 607,431,768,211,456 IPv6 addresses. IPv6 has many advantages compared with the older Internet protocol IPv4. The most useful advantages of IPv6 are address space extention, and simplified header format for efficient packet handling. Processing packets of IPv6 by routers is easier than processing packets of IPv4, because the hardware program knows in advance that the coming header is static in length. Thus the packet processing speed increases. There are three types of address in IPv6: anycast, unicast and multicast. In IPv4 there are unicast, broadcast, and multicast address. The anycast address is an additional address to IPv6, for sending the packet to the nearest node in the...

Words: 936 - Pages: 4

Free Essay

With the Growth of Internet, Will Ipv4 Survive?

...growth of Internet, will IPv4 survive?” (Focus on security, quality of service, and migration method) “We are about 10.2 percent (IPv4 address space) remaining globally,” John Curran, president and CEO of American Registry for Internet Numbers (ARIN) told InternetNews.com in January 7, 2010. That is means, we will run out of Internet Protocol version four (IPv4) address space and the real difficult part is that there is no exact date. If things continue, we will have to say no for the very first time. Say no to an Internet Protocol version four (IPv4) request will be shocking to some organizations, which is why American Registry for Internet Numbers (ARIN) is trying to get the word out now on the importance of moving to Internet Protocol version six (IPv6). The Internet Protocol version six (IPv6) address space, the next generation of Internet Protocol (IP) addressing, provides 340 trillion trillion trillion (34x10 to the 38th power) internet addresses. The question is what will happen to Internet Protocol version four (IPv4) in future? Is Internet Prorocol version four (IPv4) may be available for a longer period of time? Before further discussing the topic, we should know what is Internet Protocol (IP). Internet Protocol (IP) is a set of technical rules that defines how computers communicate over a network. Now, there are two versions of Internet Protocol (IP), there are Internet Protocol version four (IPv4) and Interner Protocol version six (IPv6). Internet Protocol version...

Words: 3742 - Pages: 15

Premium Essay

Cyptography

...IT 340: Final Project Newton Ad Agency 06/22/15 IT340: Network and Telecommunication Management Professor: Date: To: Newton Ad Agency, Management Team From: Computer Network Enterprises, Bethany A Schub (IT Business Analyst) RE: Networking Proposal Thank you for the opportunity to work with your company. As requested, we have evaluated your company’s business and technical networking requirements. Our analysis is based on current industry products that will provide your company with fast and reliable networking capabilities. Overview Newton Ad Agency has three locations. The main headquarters are located in Austin, TX. A satellite office is located two miles away from the main headquarters and is in clear line of sight between the two offices. The third location is in New York, NY. It is imperative that NY be able to share files with the TX office. The NY office will also require the use of a web server so that its clients can download large media files quickly. IP Address Assignments Main Headquarters, Austin, TX For the Austin, TX site, since there are 500 hosts both wired and wireless, I would separate the IP assignments into 2 separate groups: approximately 250/250. To do this I would assign the IP assignments as follows: 192.168.100.1 through 192.168.100.254 for all the wired hosts and 192.168.101.1 through 192.168.101.254 for all wireless hosts. This location will also need a router. The subnet mask for these locations will be 255...

Words: 995 - Pages: 4