30-08-2011, 04:07 PM
[attachment=15585]
INTRODUCTION
The secure connection consists of two types , either an individual computer or a LAN with a security gateway.
The LAN-to-LAN connection , where a security gateway is end with an IP address
IP address serves as the intermediate to the secure connection and the private LAN.
a user must gain access to the network in order to be authenticated in the first place.
GPRS
GPRS is General Packet Radio Service(GPRS) , it is a Mobile data service available to users of Global system for mobile communications (GSM) .It provides data rates from 56 up to 114 Kbps.
GPRS data transfer is typically charged per kilobyte of transferred data, while data communication via traditional circuit switching is billed per minute of connection time, independent of whether the user has actually transferred data or has been in an idle state. GPRS can be used for services such as Wireless Application Protocol (WAP) access.
IP SECURITY
It provides for encryption and authentication at the network layer to protect IP packets between IP sec complaint devices.
Seperating the application of packet authentication and encryption has led two different modes
1.transport mode
2.tunnel mode
SSL/TLS
SSL/TLS principles
Client / Server
Provide 4 security services :
– Authentication of server
– Confidentiality of exchanged data
– Integrity of exchanged data
– Optional : authentication of client (if client has a certificate)
Combining various security mechanisms :
– Asymmetric Ciphering : authentication (RSA)
– Certificate : to validate public key of the server
– Symmetric Ciphering : Confidentiality of data transmission
TECHNOLOGIES OF VPN
Communication layers
Application layer
Transport layer
Network layer
Data Link layer
Physical layer Scrambling, Hopping,
Quantum Communications
CONCLUSION
• SSL / TLS is the most widely deployed security protocol, standard
– Easy to implement, deploy and use; widely available
– Flexible, supports many scenarios and policies
– Mature cryptographic design
• Beware of spoofing
– Many browsers allow hard-to-detect spoofing
– Many users will not detect simple spoofing