Changes

Jump to: navigation, search

Network Security Topologies

75 bytes added, 18:57, 20 July 2009
no edit summary
<hr>
<google>BUY_SECURITYPLUS</google>
In this chapter of [[Security+ Essentials]] the topic of security as it pertains to network topologies will be explored. Topologies are created by dividing networks into ''security zones'' providing both a multi-layered defense strategy and different levels of security commensurate with the purpose of each specific zone (for example less security is necessary for a web server than for an internal server containing sensitive customer information).
Tunneling involves the packaging of data packets so that they can securely traverse a public network. In essence, the packets for one protocal are encapsulated in the packets of another protocol. An example is the Point-to-Point Tunneling Protocol which encapsulates its own packets into the TCP/IP protocol. Encapsulation is often combined with encryption to increase the level of security.
<google>BUY_SECURITYPLUS_BOTTOM</google>
<hr>

Navigation menu