| Security Protocols |
| |
| Summary |
| |
| Security methods in a computer network can be applied in the application layer, transport layer, and IP layer. |
| |
| IP security (IPSec) is a collection of protocols designed by the IETF to provide security for an internet packet. |
| |
| The Authentication Header protocol provides integrity and message authentication. The Encapsulating Security Payload protocol provides integrity, message authentication and privacy |
| |
| The Transport Layer Security provides security at the transport layer through its handshake protocol and data exchange protocol. |
| |
| Pretty Good Privacy (PGP) provides security for the transmission of email. |
| |
| A firewall ia a router installed between the internal network of an organization and the rest of the internet. |
| |
| Packet-filter firewall blocks or forwards packets based on information on the network and transport layers. |
| |
| A proxy firewall blocks or forwards packets based on information in the application layer. |
| |
| |
|
| |
| |