원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Data security plays a crucial role in modern times most business is transacted over the internet and even to wireless devices. This paper presents the vulnerabilities found in VPN using IPsec and suggested a set of Policy as a Defensive measure. Such policy suggested applies to implementations of VPN that are directed through an IPsec concentrator and to all company’ s employee, contractors, consultants, temporaries and other workers including all personnel affiliated with the third parties utilizing VPNs to access the company’ s network.
목차
Abstract
1. Introduction
2. VPN using IPsec
2.1. VPN Scenario
2.2. IPsec
2.3. IKE (Internet Key Exchange)
2.4. IKE and IPsec Relationship
3. VPN Vulnerabilities
3.1. IKE Aggressive Mode
3.2 Common VPN Issues
4. Proposed Policy
5. Conclusion
References
1. Introduction
2. VPN using IPsec
2.1. VPN Scenario
2.2. IPsec
2.3. IKE (Internet Key Exchange)
2.4. IKE and IPsec Relationship
3. VPN Vulnerabilities
3.1. IKE Aggressive Mode
3.2 Common VPN Issues
4. Proposed Policy
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보