Purpose, Scope and Structure of the project

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

II.

Previous RELATED WORK

Purpose and Scope of the project

Since the purpose of this project seeking to assist the organization (NAME) in mitigating
the risks associated with the transmission of sensitive information across networks by
providing practical guidance on implementing security services based on Internet Protocol
Security (IPsec). Therefore, the scope of this project is presenting information that is
independent of particular hardware platforms, operating systems, and applications, other
than providing cases to illustrate particular concepts. Specifically, the project includes a
discussion of the need for network layer security services, a description of the types of
services that are offered at the network layer, and how IPsec addresses these services. It
uses a case-based approach to show how IPsec can be used to solve common network
security issues. It also describes alternatives to IPsec and discusses under what
circumstances each alternative may be appropriate.

Project Structure
This project is organized into six sections (chapters). The first section is (The Chapter 1)
and it provides a brief introduction on the area of the proposed project is presented which
contains: Problem Statement, Objectives of the Project and the Project Timeline
(Schedule). Organization of Project is also described. So, the purpose of this chapter is to
introduce to the project. The second section which is (The Chapter 2) of the project and it
contains fundamental knowledge on network security and related topics. The third section
which is Chapter 3 and it discusses the need for network layer security and then, introduces
the concept of virtual private networking (VPN). Then, (The Chapter 4) covers the
fundamentals of IPsec, focusing on the protocols Encapsulating Security Payload (ESP),
Authentication Header (AH), Internet Key Exchange (IKE), and IP Payload Compression
Protocol (IP Comp). The chapter (5) points out issues to be considered during IPsec
planning and implementation. It also discusses several alternatives to IPsec and describes
when each method may be appropriate and, briefly discusses future directions for IPsec.
Finally The Conclusion chapter, where some recommendations and future work as well as
a concluding statement will be given in the last chapter. After that References are given.
Summary of Chapter 3

Chapter 3 describes the TCP/IP model and its layers (application, transport, network, and
data link) and explained how security controls at each layer provide different types of
protection for TCP/IP communications. IPsec, a network layer security control, can
provide several types of protection for data, depending on its configuration. Most IPsec
implementations provide VPN services to protect communications between networks. The
chapter 3 describes VPNs and highlights the three primary VPN architecture models.

A VPN is a virtual network built on top of existing physical networks that can provide a
secure communications mechanism for data and control information transmitted between
networks. VPNs are used most often to protect communications carried over public
networks such as the Internet. A VPN can provide several types of data protection,
including confidentiality, integrity, data origin authentication, replay protection and
access control. Although VPNs can reduce the risks of networking, they cannot totally
eliminate them. For example, a VPN implementation may have flaws in algorithms or
software, or a VPN may be set up with insecure configuration settings and values. Both of
these flaws can be exploited by attackers. There are three primary models for VPN
architectures, as follows: [6]

 Gateway-to-gateway. This model protects communications between two specific


networks, such as an organization's main office network and a branch office
network, or two business partners' networks.
 Host-to-gateway. This model protects communications between one or more
individual hosts and a specific network belonging to an organization. The host-to-
gateway model is most often used to allow hosts on unsecured networks, such as
traveling employees and telecommuters, to gain access to internal organizational
services, such as the organization's e-mail and Web servers.
 Host-to-host. A host-to-host architecture protects communication between two
specific computers. It is most often used when a small number of users need to use
or administer a remote system that requires the use of inherently insecure protocols.
Chapter 3 provides an overview of the types of security controls that can provide
protection for Transmission Control Protocol/Internet Protocol (TCP/IP) network
communications, which are widely used throughout the world. TCP/IP communications are
composed of four layers that work together: (application, transport, network, and data
link). Security controls exist for network communications at each of the four layers. As
data is prepared for transport, it is passed from the highest to the lowest layer, with each
layer adding more information. Because of this, a security control at a higher layer cannot
provide full protection for lower layers, because the lower layers add information to the
communications after the higher layer security controls have been applied.

The primary disadvantage of lower layer security controls is that they are less flexible and
granular than higher layer controls. Accordingly, network layer controls have become
widely used for securing communications because they provide a more balanced solution
than the highest layer and lowest layer security controls.

You might also like