Chapter 9: Exploring IPsec and TLS
When you begin a data transaction on a network these days, you want to make sure that you can access a resource in a secure manner. One way to accomplish this is by using a virtual private network (VPN). A VPN is a method used between two endpoints that provides data confidentiality as it crosses through an insecure network. The concept of a VPN has been around for several decades. However, in recent years, this technology has become more popular because with today's changing landscape, a large percentage of the world's population is online. That, coupled with the fact that more and more people are seeking ways to secure their data while in transit, makes using a VPN an optimal solution.
In this chapter, you'll ...
Get Modern Cryptography for Cybersecurity Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.