Explore BrainMass
Share

Point to Point and End to End Security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

(HW)
We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

© BrainMass Inc. brainmass.com October 25, 2018, 9:53 am ad1c9bdddf
https://brainmass.com/computer-science/network-security/point-to-point-and-end-to-end-security-590174

Solution Preview

Security engineering
(HW)
We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and ...

Solution Summary

The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and provide privacy. Point to point ( PPP) is designed for linking two networks together and transporting IP packets between the two. The links provide bi-directional functions and deliver data packets in specific order. End to end security starts on the client side and end in the server side.

$2.19
See Also This Related BrainMass Solution

point-to-point and end-to-end security models

Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

With Referencing.

View Full Posting Details