CHAPTER 32
VIRTUAL PRIVATE NETWORKS AND SECURE REMOTE ACCESS
Justin Opatrny
32.1.3 Virtual Private Networks
32.1.4 VPN Technology Concepts
32.2.2 Transport Layer Security
32.2.3 User Authentication Methods
32.2.4 Infrastructure Requirements
32.2.5 Network Access Requirements
32.3.1 Multiprotocol Layer Switching
32.3.3 Information Assurance Considerations
32.4.1 Information Assurance Goals
32.4.3 Types of Extranet Access
32.4.4 Information Assurance Considerations
32.1 INTRODUCTION.
The rise of the Internet created a new chapter in human civilization. People are no longer tied to static information sources such as libraries. The seemingly exponential growth of people looking to access wide varieties of content also spurred the desire for mobility. If a person can search for information residing halfway around the world from home, why not be able to do the same from the local coffee shop or while sitting at an airport during a business trip? This information revolution offered an opportunity to provide information and services to consumers, businesses, and employees at virtually any point on the globe.
32.1.1 Borders Dissolving.
Prolific Internet access redefined the dynamics of network and perimeter protections. Previously, companies needed to focus on protecting ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.