Topic > paper - 1432

One of the many devices that can be used to enclose data within an encrypted tunnel is the use of a VPN. As a network device, a VPN is used to transmit data between two private locations (Microsoft 2008). Through the use of the public access network, data transmitted via a VPN is considered more secure because the connections that make up the session are dedicated and the encryption used can vary depending on the security protocol (Microsoft 2014). Users can set encryption on these connections to a multitude of different levels based on how much security they want to have. The choices of security protocols that can be used range from the lowest layers that only create tunneling such as Point to Point Tunneling Protocol (PPTP) or Layer 2 Tunneling Protocol (L2TP) to more advanced configurations such as Secure Shell (SSH) and Secure Sockets Layer (SSL) or Transport Layer Security (TLS). As mentioned these connections can be used according to privacy needs and protocols such as L2TP can also be combined with the IP Security protocol (IPsec) to create an L2TP/IPsec which operates as a joint operation to create the tunnel through the L2TP and to encrypt /check for errors with IPsec (Microsoft 2014). Another route is to use channel rather than data encryption, this is used via the SSH protocol and works by routing data through a channel created by the SSH client which is used to safeguard the transmitted data. A device that users can use to monitor transmitted data is a passive intrusion detection system or IDS, these systems are a device that will surveil all data entering and leaving the network (IDS 2014). The activity is analyzed by the system and, over time, a behavior will be...... half of the document ......14 from http://anti-virus-software-review.toptenreviews.com/security- tips -for-tablets-and-mobile-phones.htmlBradley.T. CISSP, MCSE2k, MCSA, A+ (2014) Introduction to Intrusion Detection Systems (IDS), Technology/Security Information. Retrieved 06/10/14 from http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htmIDS (2014). IDS Sever Guard, IDS. Retrieved 9/6/14 from http://idssystems.com/solution-consulting/service-guard/Meyers. M. Network+ (2012) All in one CompTIA Network+, CompTIA. Extracted from the pages of chapters 15,16,18 on 10/06/14 Microsoft (2008). Data encryption between VPN servers and clients, MS TechNet. Retrieved 8/6/14 from http://technet.microsoft.com/en-us/library/cc778013(v=ws.10).aspxMicrosoft (2014). VPN Tunneling Protocols, MS TechNet. Retrieved 6/9/14 from. http://technet.microsoft.com/en-us/library/cc771298(v=ws.10).aspx