Purchase Solution

Point to Point and End to End Security

Not what you're looking for?

Ask Custom Question

(HW)
We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

Purchase this Solution

Solution Summary

The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and provide privacy. Point to point ( PPP) is designed for linking two networks together and transporting IP packets between the two. The links provide bi-directional functions and deliver data packets in specific order. End to end security starts on the client side and end in the server side.

Solution Preview

Security engineering
(HW)
We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and ...

Purchase this Solution


Free BrainMass Quizzes
Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

C# variables and classes

This quiz contains questions about C# classes and variables.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Word 2010: Tables

Have you never worked with Tables in Word 2010? Maybe it has been a while since you have used a Table in Word and you need to brush up on your skills. Several keywords and popular options are discussed as you go through this quiz.