TAILIEUCHUNG - Lecture Data security and encryption - Lecture 25: IP security
The contents of this chapter include all of the following: IPSec security framework, IPSec security policy, ESP, combining security associations, internet key exchange, cryptographic suites used, secure email, PGP, S/MIME, domain-keys identified email. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 25 Review have considered: secure email PGP S/MIME domain-keys identified email Chapter 18 summary. Chapter 19 – IP Security Opening quote. If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom the secret was told. —The Art of War, Sun Tzu Opening quote. IP Security The Internet community has developed application-specific security mechanisms in a number of application areas That includes electronic mail (S/MIME, PGP), client/server (Kerberos) Web access (Secure Sockets Layer), and others The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets Layer), and others. However users have some security concerns that cut across protocol layers. By implementing security at the IP level, an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security-ignorant applications. IP Security However users have some security concerns that cut across protocol layers By implementing security at the IP level, an organization can ensure secure networking, not only for applications That have security mechanisms but also for the many security-ignorant applications The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets Layer), and others. However users have some security concerns that cut across protocol layers. By implementing security at the IP
đang nạp các trang xem trước