SlideShare a Scribd company logo
1 of 11
VPN Technology:
Comparing IPSec and SSL
Chinedu Godson Opara
M00560830
Objectives
โ€ข What is VPN
โ€ข Discuss Various VPN Technologies
โ€ข Compare and Contrast VPN technologies
โ€ข Determine which CPN technology is best suited to tackle various security issues
What is VPN
โ€ข VPN allows the creation of an encrypted connection over a public network.
โ€ข Such as a network owned by a service provider or the internet.
What is VPN
VPN Technologies
โ€ข IPSec
โ€ข SSL.
IPSec
โ€ข The IPSec protocol is implemented in the network layer.
โ€ข Two basic features are provided by IPSec; authentication and confidentiality.
โ€ข IPSec Uses two protocols to ensure Confidentiality and Authentication.
โ€ข Authentication header (AH): authenticates the origin of IP packets (datagrams)
and guarantees the integrity of the data.
โ€ข Encapsulation Security Payload (ESP): it provides origin authenticity, integrity
and confidentiality protection of packets.
โ€ข IPSec uses two modes to transmit data:
โ€ข Tunnel mode: delivers services to and from gateways in the same organisation
โ€ข Transport mode: delivers services from host to host or from host to gate way
within an organisation or even end-to-end devices across the entire network
SSL
โ€ข The SSL is a two-layer protocol that operates between the application layer and
the transport layer of the OSI mode.
โ€ข Two layers are provided by SSL:
โ€ข SSL Record Protocol: provides confidentiality and message integrity
โ€ข Upper-layer carrying protocol: provides data encryption.
โ€ข SSL Handshake Protocol: allows the server and client to authenticate each other.
โ€ข Negotiate an encryption and message authentication code (MAC) algorithm.
โ€ข Negotiate cryptographic keys to be used to protect data sent in an SSL record.
โ€ข Change Cipher Spec: consists of a single message causes the pending state to be copied
into the current state, which updates the cipher suite to be used on this connection.
โ€ข SSL Alert Protocol: used to convey SSL-related alerts to the peer entity.
Comparison of SSL and IPSec
Conclusion
โ€ข The use of SSL and IPSec technologies in VPNs have major advantages and
disadvantages.
โ€ข Both technology operate at different levels and both have different mode of
operation.
โ€ข Therefore, it will be inaccurate the conclude that one is generally better than the
other is, especially when it comes to taking into consideration different factors
such as security, cost, accessibility, scalability and maintenance.
โ€ข The most suitable VPN technology for securing end-to-end systems is the IPSec
technology.
โ€ข for unlimited accessibility and mobility, ease of use, management and cost
effectiveness, the SSL technology could bring greater benefits
โ€ข Notwithstanding, to enjoy a more comfortable network environment that will be
of great benefit in terms of security, cost, accessibility, scalability and
maintenance, the power of both technologies can be combined to actualize a safer
and more flexible network environment
References
โ€ข Chaki, R., Saeed, K., Choudhury, S. & Chaki, N., 2014. Applied Computation and Security
Systems: Volume One. 1st ed. New Delhi: Springer India.
โ€ข Gregory, P., 2015. CISSP Guide to Security Essentials. 2nd ed. Boston, MA: Cengage
Learning.
โ€ข Olifer, N. & Olifer, V., 2016. Computer Networks: Principles, Technologies and Protocols for
Network Design. 1st ed. Pennsylvania: John Wiley & Sons.
โ€ข Pagani, M., 2005. Encyclopedia of Multimedia Technology and Networking. 1st ed. Hershey,
PA: Idea Group Inc (IGI).
โ€ข Stair, R. & Reynolds, G., 2015. Fundamentals of Information. 8th ed. Boston, MA: Cengage
Learning.
โ€ข Stallings, W., 2016. CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE.
7th ed. New York: Pearson Education.
โ€ข Stapleton, J., 2014. Security without Obscurity: A Guide to Confidentiality, Authentication,
and Integrity. 1st ed. Boca Raton,FL: CRC Press.
Thank You
Any Questions?

More Related Content

What's hot

What's hot (20)

Ipsecurity
IpsecurityIpsecurity
Ipsecurity
ย 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
ย 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
ย 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
ย 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
ย 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
ย 
Secure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecuritySecure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer Security
ย 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
ย 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
ย 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
ย 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
ย 
Cryptography
CryptographyCryptography
Cryptography
ย 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
ย 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
ย 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
ย 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
ย 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
ย 
Cryptography
CryptographyCryptography
Cryptography
ย 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
ย 
SSL Layer
SSL LayerSSL Layer
SSL Layer
ย 

Similar to Vpn technology

Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
ย 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
ย 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
jithu26327
ย 
The Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TPThe Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TP
AM Publications
ย 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
ย 

Similar to Vpn technology (20)

A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
ย 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
ย 
Unit08
Unit08Unit08
Unit08
ย 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
ย 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
ย 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
ย 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
ย 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
ย 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
ย 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
ย 
Seminar V2
Seminar V2Seminar V2
Seminar V2
ย 
The Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TPThe Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TP
ย 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
ย 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
ย 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
ย 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
ย 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
ย 
Rushabhraj resume
Rushabhraj resumeRushabhraj resume
Rushabhraj resume
ย 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
ย 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
ย 

Recently uploaded

Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
SUHANI PANDEY
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
SUHANI PANDEY
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
nirzagarg
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
SUHANI PANDEY
ย 

Recently uploaded (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
ย 

Vpn technology

  • 1. VPN Technology: Comparing IPSec and SSL Chinedu Godson Opara M00560830
  • 2. Objectives โ€ข What is VPN โ€ข Discuss Various VPN Technologies โ€ข Compare and Contrast VPN technologies โ€ข Determine which CPN technology is best suited to tackle various security issues
  • 3. What is VPN โ€ข VPN allows the creation of an encrypted connection over a public network. โ€ข Such as a network owned by a service provider or the internet.
  • 6. IPSec โ€ข The IPSec protocol is implemented in the network layer. โ€ข Two basic features are provided by IPSec; authentication and confidentiality. โ€ข IPSec Uses two protocols to ensure Confidentiality and Authentication. โ€ข Authentication header (AH): authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data. โ€ข Encapsulation Security Payload (ESP): it provides origin authenticity, integrity and confidentiality protection of packets. โ€ข IPSec uses two modes to transmit data: โ€ข Tunnel mode: delivers services to and from gateways in the same organisation โ€ข Transport mode: delivers services from host to host or from host to gate way within an organisation or even end-to-end devices across the entire network
  • 7. SSL โ€ข The SSL is a two-layer protocol that operates between the application layer and the transport layer of the OSI mode. โ€ข Two layers are provided by SSL: โ€ข SSL Record Protocol: provides confidentiality and message integrity โ€ข Upper-layer carrying protocol: provides data encryption. โ€ข SSL Handshake Protocol: allows the server and client to authenticate each other. โ€ข Negotiate an encryption and message authentication code (MAC) algorithm. โ€ข Negotiate cryptographic keys to be used to protect data sent in an SSL record. โ€ข Change Cipher Spec: consists of a single message causes the pending state to be copied into the current state, which updates the cipher suite to be used on this connection. โ€ข SSL Alert Protocol: used to convey SSL-related alerts to the peer entity.
  • 8. Comparison of SSL and IPSec
  • 9. Conclusion โ€ข The use of SSL and IPSec technologies in VPNs have major advantages and disadvantages. โ€ข Both technology operate at different levels and both have different mode of operation. โ€ข Therefore, it will be inaccurate the conclude that one is generally better than the other is, especially when it comes to taking into consideration different factors such as security, cost, accessibility, scalability and maintenance. โ€ข The most suitable VPN technology for securing end-to-end systems is the IPSec technology. โ€ข for unlimited accessibility and mobility, ease of use, management and cost effectiveness, the SSL technology could bring greater benefits โ€ข Notwithstanding, to enjoy a more comfortable network environment that will be of great benefit in terms of security, cost, accessibility, scalability and maintenance, the power of both technologies can be combined to actualize a safer and more flexible network environment
  • 10. References โ€ข Chaki, R., Saeed, K., Choudhury, S. & Chaki, N., 2014. Applied Computation and Security Systems: Volume One. 1st ed. New Delhi: Springer India. โ€ข Gregory, P., 2015. CISSP Guide to Security Essentials. 2nd ed. Boston, MA: Cengage Learning. โ€ข Olifer, N. & Olifer, V., 2016. Computer Networks: Principles, Technologies and Protocols for Network Design. 1st ed. Pennsylvania: John Wiley & Sons. โ€ข Pagani, M., 2005. Encyclopedia of Multimedia Technology and Networking. 1st ed. Hershey, PA: Idea Group Inc (IGI). โ€ข Stair, R. & Reynolds, G., 2015. Fundamentals of Information. 8th ed. Boston, MA: Cengage Learning. โ€ข Stallings, W., 2016. CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE. 7th ed. New York: Pearson Education. โ€ข Stapleton, J., 2014. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity. 1st ed. Boca Raton,FL: CRC Press.