Explore BrainMass

Explore BrainMass

    Point to Point and End to End Security

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    (HW)
    We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

    © BrainMass Inc. brainmass.com June 3, 2020, 9:15 am ad1c9bdddf
    https://brainmass.com/computer-science/network-security/point-to-point-and-end-to-end-security-590174

    Solution Preview

    Security engineering
    (HW)
    We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

    The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and ...

    Solution Summary

    The difference between point-to-point and end-to-end security models are that point-to-point model is used for establishing direct connectivity between two network nodes. It is used to authenticates the connections, compresses, transmits after encryption and provide privacy. Point to point ( PPP) is designed for linking two networks together and transporting IP packets between the two. The links provide bi-directional functions and deliver data packets in specific order. End to end security starts on the client side and end in the server side.

    $2.19

    ADVERTISEMENT