ICT212_StudyUnit2 - ICT212 Internet Security STUDY UNIT 2...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT212 Internet Security STUDY UNIT 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
ICT212 STUDY NOTES STUDY UNIT 2 SIM UNIVERSITY SU2-1 SUMMARY OF UNIT 2 This is the second Unit for the course Internet Security . There is only one chapter: Chapter 6. Chapter 6 concerns IPSEC – IP Security. This is an important chapter as it captures some of the most critical development in the security community in recent years. I am sure the readers would have come across many possible IP applications (e.g. VOIP – Voice Over IP) that have been or proposed to be implemented. This chapter covers the underlying security framework that makes all these possible. STUDY GUIDE FOR UNIT 2 Chapter 6 IP Security Students will need to know the importance and applications of IPSEC, the concept of Security Associations, the different modes (Transport & Tunnel), the services provided by AH and ESP, as well as the ways to combine Security Associations (page 179 – 200). The treatment will be based on IPv4. IPv6 will not be discussed in this course. The material of key management in the reference text (Page 200 – 210) will not be asked during examination. On the other hand, students may be asked to do a project on IKE (Internet Key Exchange). The important pages in the reference text are: Page 179 – 200 (less material on IP v6 & details of algorithms). The following table gives some estimates on the time needed for each topic. This could hopefully serve as a guide for the students. On the other hand, the students may wish make the necessary adjustment based on their personal background and experiences. Topics Estimated Study Time Chapter 6 6.1 IP Security Overview 2 hours 6.2 IP Security Architecture 5 hours 6.3 Authentication Header 3 hours 6.4 Encapsulating Security Payload 3 hours 6.5 Combining Security Association 2 hours 6.6 Key Management 5 hours
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 2 ICT212 STUDY NOTES SU2-2 SIM UNIVERSITY CHAPTER 6 IP SECURITY 6.1 IP SECURITY OVERVIEW In this chapter, we look at implementation of security solution at the IP level. The framework for security at this layer, known as IPSEC, was created in response to a large number of security incidences. The introduction of such framework has been a major event in the security industry in the recent years. In the standard for next generation of IP, IPv6, authentication and encryption will be mandatory. The mechanisms suggested in IPSEC can also be implemented in the current version of IP, IPv4. And indeed, they have been included in a number of products in recent years. IPSEC encompasses three functional areas: authentication, confidentiality and key management. The main thrust for implementing security at this level is that an organization can ensure secure networking for essentially all the applications riding above. In other words, the protection will be given not only for applications that have built-in security mechanisms but also for the many security-ignorant applications. This implies that building security at IP level has a number of applications and benefits. Some possible application examples are as follows:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICT322 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 23

ICT212_StudyUnit2 - ICT212 Internet Security STUDY UNIT 2...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online