NETWORK + III Assignment Module 8
NETWORK + III Assignment Module 8
Harrison Valetski
October 16,2015
Harrison Valetski
October 16,2015
1. How does a Virtual Private Network provide security over the internet?
A non private network can be made secure using a tunneling protocol acheived by implementing secure socket layer and cryptography protocols together. Tunneling is a process of encapsulating one protocol within another and is typically used for secure data transfer through an unsecure network. VPN is a specific tunneling protocol with encryption.
2 .Define and explain IPSec
IPSec is a framework of protocols that is designed to provide secure authentication and secure data transfer between two computers. It works at the Network layer of the OSI model and can be used to secure practically all TCP/IP-related communications including tunnels. It has three main security services: data verification, protection from tampering, and privacy of transactions.
3. Discuss methods to implement wireless security measures and network access security.
Tunneling, encryption and access control lists are techniques of network access security. access control lists might be applicable to protocols, ports, source and/or destination ip addresses, or destination mac addresses. What is identified and filtered will largely depend upon the type of device on which the list is configured. For example, ACLs on switches are very different from ACLs on routers.
Tunneling, encryption and access control lists are techniques of network access security. access control lists might be applicable to protocols, ports, source and/or destination ip addresses, or destination mac addresses. What is identified and filtered will largely depend upon the type of device on which the list is configured. For example, ACLs on switches are very different from ACLs on routers.