What are the areas of protection provided by IPsec?

What will be an ideal response?


IPsec provides three areas of protection that correspond to three IPsec protocols:
* Authentication-IPsec authenticates that packets received were sent from the source that is identified in the header of the packet and no man-in-the-middle attacks or replay attacks took place to alter the contents of the packet. This is accomplished by the Authentication Header (AH) protocol.
* Confidentiality-By encrypting the packets, IPsec ensures that no other parties were able to view the contents. Confidentiality is achieved through the Encapsulating Security Payload (ESP) protocol. ESP supports authentication of the sender and encryption of data.
* Key management-IPsec manages the keys to ensure that they are not intercepted or used by unauthorized parties. For IPsec to work, the sending and receiving devices must share a key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which generates the key and authenticates the user using techniques such as digital certificates.

Computer Science & Information Technology

You might also like to view...

The SSF used within BSIMM consists of four domains. Which of the following is not one of the four domains?

A. Governance B. Intelligence C. SSDL Touchpoints D. Development

Computer Science & Information Technology

Which of the following is not an abstract implementation provided by the collections framework?

a. AbstractCollection. b. AbstractTree. c. AbstractMap. d. AbstractList.

Computer Science & Information Technology

You have been asked by the Managing Director of DreamHome to investigate and prepare a report on the feasibility of making the DreamHome database accessible from the Internet. The report should examine the technical issues, the technical solutions, address the advantages and disadvantages of this proposal, and any perceived problem areas. The report should contain a fully justified set of conclusions on the feasibility of this proposal for DreamHome.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is an example of a short-style PHP tag?

a. Order processed.

'; ?> b. Order processed.

'; ?> c. Order processed.

'; ?> d. echo '

Order processed.

';

Computer Science & Information Technology