TAILIEUCHUNG - Internetworking with TCP/IP- P64

Internetworking with TCP/IP- P64: TCP/IP has accommodated change well. The basic technology has survived nearly two decades of exponential growth and the associated increases in traffic. The protocols have worked over new high-speed network technologies, and the design has handled applications that could not be imagined in the original design. Of course, the entire protocol suite has not remained static. New protocols have been deployed, and new techniques have been developed to adapt existing protocols to new network technologies | Sec. Required Security Algorithms 589 Secure Sockets By the mid 1990s when it became evident that security was important for Internet commerce several groups proposed security mechanisms for use with the Web. Although not formally adopted by the IETF one of the proposals has become a de facto standard. Known as the Secure Sockets Layer SSL the technology was originally developed by Netscape Inc. As the name implies SSL resides at the same layer as the socket API. When a client uses SSL to contact a server the SSL protocol allows each side to authenticate itself to the other. The two sides then negotiate to select an encryption algorithm that they both support. Finally SSL allows the two sides to establish an encrypted connection . a connection that uses the chosen encryption algorithm to guarantee privacy . Firewalls And Internet Access Mechanisms that control internet access handle the problem of screening a particular network or an organization from unwanted communication. Such mechanisms can help prevent outsiders from obtaining information changing information or disrupting communication on an organization s intranet. Successful access control requires a careful combination of restrictions on network topology intermediate information staging and packet filters. A single technique known as an internet firewall has emerged as the basis for internet access control. An organization places a firewall at its connection to external networks . the global Internet . A firewall partitions an internet into two regions referred to informally as the inside and outside. Multiple Connections And Weakest Links Although concept seems simple details complicate firewall construction. First an organization s intranet can have multiple external connections. The organization must form a security perimeter by installing a firewall at each external connection. To guarantee that the perimeter is effective all firewalls must be configured to use exactly the

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
8    150    2    30-11-2024
337    141    1    30-11-2024
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.