Please enable JavaScript.
Coggle requires JavaScript to display documents.
7.5.5 (3) (Virtual Private Networks (VPNs allow: (• Service providers to…
7.5.5 (3)
Virtual Private Networks
the primary issues are:
• Security of transmissions, including preventing hijacking” of transmissions and preventing malware from entering the network
-
-
-
Requirements often used to determine network connectivity include security policies, business models, intranet server access, application requirements, data sharing and application server access
VPNs are platform independent. Any computer system that is configured to run on an IP network can be connected through a VPN with no modifications, except for the installation of remote software.
Any computer system that is configured to
run on an IP network can be connected through a VPN with no modifications, except for the installation of remote software
three types of VPNs
- Remote-access VPN—Connects telecommuters and mobile users to the enterprise WAN in a secure manner; it lowers the barrier to telecommuting by ensuring that information is reasonably protected on theopen Internet.
- Intranet VPN—Connects branch offices within an enterprise WAN
- Extranet VPN—Gives business partners limited access to each other’s corporate network; and example is an automotive manufacturer with its suppliers
VPNs allow:
• Service providers to grow their businesses by providing substantial incremental bandwidth with value-added services
-
-
-
-
RISK
enterprises may experience outages and intrusion attempts for financial gain, to obtain intellectual property, to create business disruption, to obtain sensitive private information, or to compromise national security.
-
cookie
message stored by the web browser for the purpose of identifying users and possibly preparing customized web pages for them
The web server will send back a cookie with information (text message in HTTP header), which will be kept as a text message by the browser.
user’s browser requests a page from that particular server, the cookie’s message is sent back to the server so that the customized view, based on that user’s particular interests and preferences, can be produced.
browser’s implementation of cookies has, however, brought several privacy and security concerns,
allowing breaches of security and the theft of personal information (e.g., user passwords that validate the user’s identity and enable restricted web services)
-
Servlets
-
-
Unlike a CGIprogram, once it is started, it stays in memory and can fulfill multiple requests, thereby saving server execution time and speeding up the services.
Applets
programs written in a portable, platform-independent computer language, such as Java, JavaScript or Visual Basic
-
user’s browser should be configured to not allow an applet to access a machine’s information without prior authorization of the user.
Transborder Data Flow
Transborder data flow refers to data transmission between two countries. Information,
such as email, invoices, payment advice, etc., can be transmitted via sub-oceanic cables, telephone, television links and satellites
CONCERNS
-
country of origin or the country of destination could have several laws applicable to transborder data flow that should be addressed.
-
data security and
integrity,
Privacy also is an issue because laws regarding protection and access to personal information may be different or conflicting between the source and destination countries
Some countries also have laws concerning the encryption of data/information sent via transborder communications, t
-
-