SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION

7Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

Abstract

Network protocols are by their design insecure and open to threats from cybercriminals. Secure network protocols, such as L2TP, IPsec, TLS, and OpenVPN need to be implemented to assure confidentiality, authentication, and integrity. The advantages and disadvantages of these protocols are discussed. A preferred choice of these protocols for implementation in a virtual private network is presented in the context of the Open Systems Interconnection or Interface (OSI) Model. Secure protocols are discussed with reference to the implementation of e-commerce and the Internet of Things (IoT).

Cite

CITATION STYLE

APA

Angelo, R. (2019). SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION. Issues in Information Systems, 20(3), 37–46. https://doi.org/10.48009/3_iis_2019_37-46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free