Discuss security protocols from ip layer


Discuss the below:

Q: We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Give examples and arguments to support your viewpoint.

Solution Preview :

Prepared by a verified Expert
Computer Networking: Discuss security protocols from ip layer
Reference No:- TGS01933030

Now Priced at $20 (50% Discount)

Recommended (98%)

Rated (4.3/5)