Absolute security on any network is nearly impossible to achieve. When we share information, the processes and mechanisms we use to transfer that information can usually be compromised. Normally, the tighter the security, the less convenient it is to share information. Because the fundamental purpose of a network is the sharing of resources, network administrators have to balance the need for easy and efficient access to resources against the level and layers of security necessary to maintain the privacy and integrity of shared resources.
As the world has become networked, the standards and protocols of the Internet have come to play a more prominent role in all computer-to-computer communication. The vast majority of this communication is done through packet-switching networks using the Internet Protocol (IP).
When information is sent across an IP network, it is divided up into discrete chunks, each of which has its own routing information. These chunks, or packets , are sent relatively independently across the network and are reassembled on the other end of the connection. Their journey may span several independent telephone, cable, and Internet networks. At almost any point along this journey, the packets and their precious information cargo can be compromised. Your job is to make sure that this doesn’t happen.
It is difficult to secure everything all of the time. So, your first job in building an IP Security scheme is to prioritize the communications that ...