paper

1432 Words3 Pages

One of the many devices that can be used to encase data within an encrypted tunnel is through the use of a VPN. As a network device, a VPN is used to transmit data between two private locations (Microsoft 2008). Through the use of the publically accessed network, the data transmitted via a VPN is considered to be safer because the connections that make up the session are dedicated and the encryption used can vary depending on the security protocol (Microsoft 2014). Users can set up the encryption on these connections to a multitude of different levels based on the amount of security they would like to have. The choices of security protocols that can be used are from the lowest levels that only create tunneling such as Point to Point Tunneling Protocol (PPTP) or Layer 2 Tunneling Protocol (L2TP) to the more advance setups such as Secure Shell (SSH) and Secure Sockets Layer (SSL) or Transport Layer Security (TLS). As stated, these connection can be used based on the need of privacy and even protocols such as the L2TP can be combined with the IP Security protocol (IPsec) to create a L2TP/IPsec which operates as a joint operation to create the tunnel via the L2TP and to encrypt/error check with the IPsec (Microsoft 2014). Another avenue is the use of encrypting the channel rather than the data, this is used through the SSH protocol and this works by routing data through a SSH client created channel which is used to safeguard the transmitted data.
One device users can use to monitor data being transmitted is a passive Intrusion Detection Systems or IDS, these systems is a device that will watch over all data that is going in and out of the network (IDS 2014). Activity is analyzed by the system and over time, a behavior will be...

... middle of paper ...

...14 from http://anti-virus-software-review.toptenreviews.com/security-tips-for-tablets-and-mobile-phones.html

Bradley.T. CISSP, MCSE2k, MCSA, A+ (2014) Introduction to Intrusion Detection Systems (IDS), About Technology/ Security. Retrieved on 6/10/14 from http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm

IDS (2014). IDS Sever Guard, IDS. Retrieve on 6/9/14 from http://idssystems.com/solution-consulting/service-guard/

Meyers. M. Network+ (2012) All in One CompTIA Network +, CompTIA. Retrieved from the pages in chapters 15,16,18 on 6/10/14

Microsoft (2008). Data encryption between VPN server and client, MS TechNet. Retrieved on 6/8/14 from http://technet.microsoft.com/en-us/library/cc778013(v=ws.10).aspx

Microsoft (2014). VPN Tunneling Protocols, MS TechNet. Retrieved on 6/9/14 from. http://technet.microsoft.com/en-us/library/cc771298(v=ws.10).aspx

More about paper

Open Document