It Security Plan & Implementation Research Proposal

Total Length: 5733 words ( 19 double-spaced pages)

Total Sources: 5

Page 1 of 19

Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec vs. SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec and SSL as the corporate standard for wireless connections, defining the advantages and disadvantages as the table below has captured.

Table 1: Technical Analysis of Differences between IPSec and SSL

IPSec

SSL

Topology

Site-to-site VPN; mainly configured in a hub-and-spoke design

Remote-access VPN

Security

Session authentication

Authenticates through digital certificate or preshared key

Drops packets that do not conform to the security policy

Authenticate through the use of digital certificates; drops packets if a fatal alert is received

Confidentiality

Uses a flexible suite of encryption and tunneling mechanisms at the IP network layer

Encrypts traffic use the public key infrastructure (PKI)

QoS and SLAs

Does not address QoS and SLAs directly; yet the IPSec VPNs can be configured to preserve packet classification for QoS within an IPSec tunnel

Both QoS and SLAs do not apply to SSL deployments; the service providers network traffic is unaware of SSL traffic or its relative level

Scalability

Acceptable scalability in most hub-and-spoke configurations and deployments

Scalability for IPSec-based networks when there are large, meshed IPSec VPN deployments across a very large number of users (over 10,000); support for key management and peering configuration.

Stuck Writing Your "It Security Plan & Implementation" Research Proposal?



Entirely dependent on network traffic; SSL is not impacted by server provider network

Management

Site-to-Site support

Yes

No

Remote Access Support

Yes

Yes

Provisioning

Reduces operational expense through a centralized network-level provisioning

Does not apply; service provider traffic does not see SSL traffic

Service Deployment

Is a protocol compatible with other ones located through an existing IP network

Does not apply; service provider traffic does not see SSL traffic

VPN Client

Is required for client-initiated IPSec VPN deployment

Relies on a Web browser to complete sessions

Place in network

Local loop, edge and off-net

Local loop, edge and off-net

Transparency

Transparency to applications

Works only with applications coded for SSL

Wireless

Not easily accomplished as this protocol relies on point-to-point connections

Support for QoS, non-QoS and enterprise-wide connectivity through wireless.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"It Security Plan & Implementation" (2009, October 06) Retrieved May 5, 2024, from
https://www.aceyourpaper.com/essays/security-plan-implementation-18848

Latest MLA Format (8th edition)

Copy Reference
"It Security Plan & Implementation" 06 October 2009. Web.5 May. 2024. <
https://www.aceyourpaper.com/essays/security-plan-implementation-18848>

Latest Chicago Format (16th edition)

Copy Reference
"It Security Plan & Implementation", 06 October 2009, Accessed.5 May. 2024,
https://www.aceyourpaper.com/essays/security-plan-implementation-18848