Explore BrainMass
Share

Security Mechanisms at Layers Above IP

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

© BrainMass Inc. brainmass.com October 25, 2018, 7:34 am ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/security-mechanisms-layers-above-ip-507385

Solution Preview

Information security infrastructure must include end-to-end security measures and the IPSec manages and controls it from a host to a host, network to network, or host to network client. However the majority of threats and vulnerabilities to information in an organization are usually from within the corporate network. Leaving the internal network open from a security perspective is a good enough reason for compromised access to information resources. This is a great threat to business operations and business intelligence. Protection to information has to be implemented from all angles and layers. Therefore, IPSec is not enough to protect valuable information; security mechanisms must be comprehensive and indispensable across all domains.
The kind of attacks in a network happens while data communication takes place from one client to another (be it a host or network either side); some of these attacks include:

- IP spoofing in which an intruder sends messages to a host in a way that it seems to be coming from a trusted IP address in place of its own.
- Ping of ...

Solution Summary

This solution discusses IPSec security at the network layer as well as other security mechanisms that are required in the layers above IP.

$2.19
See Also This Related BrainMass Solution

Web

Why is it important to understand the different layers of the OCI model when working on network security?

What is the relationship between the OSI model and the TCP/IP Protocol.

View Full Posting Details