Premium Essay

Crytographic Tunneling

In:

Submitted By FredaLJW
Words 1193
Pages 5
What is Cryptographic tunneling? Cryptographic tunneling is a method in which information is transmitted from one network to another in a secured manner. Before information passes through the tunnel, it is broken into smaller frames. Each frame is encrypted with an added layer of security and encapsulation. The encapsulation is reverted at the destination with decryption of information, which is then sent to the desired destination (Tunneling, 2011).
The Opened Systems Interconnect (OSI) Model is a great example of tunneling. The OSI model is divided into seven layers and each layer provides a different task. The below chart is the OSI model (Petri, 2009). In the above chart data is transmitted and received. The user creates the data and now the user wants to send the data to another user or the desired destination. The data has to go through fourteen steps in order to reach its destination. The first seven steps in for the transmission of the data and the next seven steps is for the receipt of the data. The steps below will show the process that the data has to go through in order to send the data as well as receiving the data at it final destination.
Data is created and then sent to the application layer (Layer 7). The application layer is where different communication services and applications are provided. The data being transmitted can be transferred by file transfer, electronic messaging, virtual terminal access or any other forms of communications (Merkow, 2005). Before the data leave the application layer, additional encryption and encapsulation is added to the data to give the data more security.
Next step for the data is the presentation layer (Layer 6). In this layer, delivery and formatting of data takes place. The presentation layer processes the data from the application layer so that no issue arises during the sending process.

Similar Documents

Premium Essay

Cryptograph6Y

...Cryptographic Tunneling and OSI Model Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized users. (Summer, 2004) With the explosion of the World Wide Web and the need to connect various secure private networks to it, it is vital to protect private data from exploitation when it reaches the public networks for transmission. At the heart of the networks through which the information flows is the Open Systems Interconnection (OSI) model. Various techniques are used with respect to the OSI model that helps the data to be transmitted more securely during network transmissions. One of these techniques is Cryptographic tunneling. Cryptographic tunneling operates at the transport layer and network layer of the OSI model. Cryptographic tunneling is primarily used in VPNs or the Virtual Private Networks to add additional security to the data that is flowing through these networks.  A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. (Mason, 2002) The sender’s authentication, confidentiality of data and hiding the contents of the message is made possible using cryptographic tunneling. When we need data from private businesses to be transmitted through public networks, we make use of tunneling where the public network routing nodes are unaware of the transmission being part of private network. Hiding the packets to make them seem as if they were just like...

Words: 669 - Pages: 3

Premium Essay

Nt1310 Unit 1 Rule Essay

...connection. By using an Internet connection the client can connect to the server or the resource in all over the world, like accessing the office desktop from home through an Internet connection. The computer and the office desktop can communicate at full Internet speed or very high speed if you have an Internet connection as cable or digital subscriber line (DSL). This type of connection works very fast compared to anolog modem. VPNs use a Tunneling Protocol technology to provide more secure transfer of information over the Internet from one computer system to another computer system. The Tunneling Protocol that allow only authorized users to get connected to the private network. The VPN will authenticate the connection before get connected to the VPN server. VPN connection will ensure the integrity that is it make sure that others cannot intercept and cannot use data that travels over the Internet by encryption. The Windows operating system is providing this type of security by using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP). A private or government organization use this VPN technology to connect to its branch offices or to other companies over a public network, such as the Internet, while maintain secure communications. The VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link. 1.2. FIREWALL: Firewall serves as one of the security mechanism that has been implemented in all the networks to maintain...

Words: 1317 - Pages: 6

Premium Essay

Netw208 Week 3 You Decde

...NETW208 Week 3 You Decide We have discussed the IP address over the past weeks; we have carefully planned an IP addressing scheme, the devices and media that we will use to communicate between the Pittsburgh and Cleveland offices. The data link can be established with an OC – 3 connection and with our routers we can access the Pittsburgh network with the secure VPN. This will allow us to move the data between the two networks. The protocol we will use will be the Point-to-Point protocol. Another protocol will not work is the SLIP protocol. Because it is way too slow for our purposes. The Point-to-Point Tunneling Protocol is a method for implementing virtual private networks. PPTP uses control channel over TCP and GRE tunnel operating to encapsulate PPP packets. The PPTP specification does not describe encryption or authentication features and relies on the PPP protocol being tunneled to implement security functionality. We have that covered with a digital security certificate and the PPTP connection from our router in Cleveland and the router in Pittsburgh. This will allow the internet connection with our secure web server and our network in Pittsburgh with an encrypted connection through the routers across the internet to our offices. The Synchronous Optical Networking, also known as SONET, is a standardized multiplexing protocol that transfers multiple digital bit streams over optical fiber using highly coherent...

Words: 489 - Pages: 2

Free Essay

Is3230

...management of VPN solution is delicate not only to protect 9-Iron resources from unauthorized access, but also to enable a transparent and manageable solution for all categories of potential users (Informit). VPN Service will be deploy for 9-Iron; however, the solution deployed for each category must be evaluated according to the ability to deploy, change, and enforce policy. Configuration, Change, and Operations, are three relevant management features that can make a robust Remote Access Solution. After the management, place to the security part; the 9-Iron Country Club’s will use the IPSec transport and tunnel mode for deployment to establish an secure network. Also, IPSec data authentication and encryption; Challenges of NAT/PAT; Split tunneling; Firewall functionality; VPN core design consideration; are some of the consideration for any VPN design, in decision making aspects when deciding on the Remote Access VPN Solution (Troubleshooting Remote...

Words: 359 - Pages: 2

Premium Essay

Virtual Private Network

...VPN Concepts A virtual private network (VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations...

Words: 6523 - Pages: 27

Premium Essay

Issc340Week3

...the content. 2. Describe the function of a firewall. (Minimum word count: 70) The function of a firewall is to control the flow of information between the internet and private networks. The function of a firewall within a network is similar to a barrier door or gate. It serves as the first line of defense and assists in preventing network attacks. Another way to think of a firewall would be a security guard or metal detector. As information is passed to and from different networks, the firewall is inspecting and looking out for suspicious content. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The four most commonly used tunneling types for VPN’s are L2TP, IPSec, PPTP, and SSL. L2TP is layer to tunneling protocol and does not provide encryption, IPSec is another an encryption and authentication method that is very time consuming and expensive. PPTP is point to point tunneling and the most supported by VPN. And SSL is secure socket layering and does require software installation. 4. Describe a differential backup. (Minimum word count: 35) A differential backup is a type of backup that stores and preserves data that has been added or new since that last full backup was performed. It takes the difference from the full back up and add it to its database. 5. What is authentication? (Minimum word count: 50) Authentication is the process of verifying information or identity to confirm and...

Words: 386 - Pages: 2

Premium Essay

Vpn Evaluation

...encryption are essential services for remote access. You can configure Routing and VPN access in many ways; it is designed to be flexible. However you configure Routing and Remote Access, you can do certain things to better secure your remote access server. To help reduce the surface area available for attack, I will remove any ports for tunneling protocols that are not intended to for use. To help prevent random password attacks, I will limit the number of times that a user can specify credentials before the account is locked out. Also, I would configure the firewall to filter inbound and outbound data and deny all traffic except that addressed to specific ports and protocols. In addition to securing the VPN server, I will configure it to help protect the intranet from direct attacks. If you configure the remote access server to provide network address translation, the server will act as an IP router that translates addresses for packets being forwarded between the intranet and the Internet. This way the remote access server helps provide NAT flexibility with security. I will be requiring connections to use L2TP, rather than PPTL. L2TP tunneling with IPSec encryption is more secure than PPTP; however, not all clients can use L2TP. This provides end to end encryption for the network. Even if you...

Words: 349 - Pages: 2

Free Essay

Afm, Nanomaterial, Cellulose

...VoLUME 56, NUMBER PHYSICAL REVIEW LETTERS 9 3 MAR. cH 1986 Atomic Force Microscope G. Binnig"~ and C. F. Quate' Edward L Gi.nzton Laboratory, Stanford University, ' Stanford, California 94305 and Ch. Gerber" IBM San Jose Research Laboratory, San Jose, California 95193 I, Received 5 December 1985) The scanning tunneling microscope is proposed as a method to measure forces as small as 10 N. As one application for this concept, we introduce a new type of microscope capable of investigating surfaces of insulators on an atomic scale. The atomic force microscope is a combination of the principles of the scanning tunneling microscope and the stylus profilometer. It incorporates a does not damage the surface. Our preliminary results in air demonstrate a lateral resoluprobe that 0 0 tion of 30 A and a vertical resolution less than 1 A. PACS numbers: 68.35.Gy %e are concerned in this paper with the measurement of ultrasmall forces on particles as small as single atoms. %e propose to do this by monitoring the elastic deformation of various types of springs with the scanning tunneling microscope (STM). ' It has been a common practice to use the displacement of springs as a measure of force, and previous methods have relied on electrostatic fields, magnetostatic fields, optical waves, and x rays. Jones~ has reviewed the devices that use variable capacitances and he reports that displacements of 10 4 A can be measured. SQUIDs3...

Words: 2837 - Pages: 12

Premium Essay

Networking and the Internet

...function of a firewall. (Minimum word count: 70) Firewalls are programs that filter the content coming into the network. Firewalls protect a network from malicious activity including hackers that try to invade a system. If the firewall flags content that comes through the network, it will not be allowed in. Firewalls can be set up between internal networks, external networks, the Internet, etc. Businesses use various methods to control the information including packet filtering, proxy service, or stateful inspection. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The first tunneling protocol is Point-to-Point Tunneling Protocol (PPTP). This type of protocol allows a business to range their own network throughout private tunnels on the Internet. The second protocol is Layer 2 Tunneling Protocol (L2TP). This type of protocol supports VPN’s over the Internet, but does not provide encryption. The third type of tunneling protocol is IP Security (IPsec) that provides both encryption and authentication over the Internet. 4. Describe a differential backup. (Minimum word count: 35) Differential backup stores the information since the network has performed the last back up for data. This can save storage space on the network and less labor time for the server. Differential backup is faster than a full backup, but they are used together to store data. 5. What is authentication? (Minimum word count: 50) Authentication recognizes the identity...

Words: 350 - Pages: 2

Premium Essay

Technology

...I Introduction Technology I.1 What is technology? I.2 First inventors I.3 How science affects technology I.4 How technology affects science I.5 Discussion questions 2 Chemistry connects to . . . . . . I.1 What is technology? Think for a moment what it might be like to live in the 14th century. Image that you could travel back in time and found yourself in a small European village in 1392. What do you think you would find? How would you cook your food? Would you use an oven, a fire, or a microwave? How would you eat your food? Do you think you could use a plastic cup to drink your milk? How would you go from one city to the next? Could you get on a train or would you have to walk or ride a horse? How would you send a her or call her on your cell phone? message to your mom telling her you’ll be late for dinner? Can you email How would you get your clothes? Can you shop at a 14th century mall, or on the internet? And what would your clothes be made of? Technology Level I Introduction 3 Do you think you could find pink spandex shorts or would they have to be made of brown cotton? Think for a moment how different everything would be if you were to live in the 14th century. Many of the items you use today are a result of technology. Your cell phone, microwave oven, washing machine, and plastic cup are all the result of scientific discoveries combined with engineering that have allow people to invent products that have improved the...

Words: 2664 - Pages: 11

Premium Essay

Netw 230 Week 6 Quiz

...NETW 230 Week 6 quiz Click Link Below To Buy: http://hwaid.com/shop/netw-230-week-6-quiz/ 1. Question : (TCO 9) For servers that need to offer services to the Internet, consider using a _____ zone (DMZ), where computers can exist and communicate with the Internet while staying separated from the internal network by a firewall. demilitarized militarized dynamic militarized data modularized Question 2. Question : (TCO 9) _____, which is part of digital identity management services (DIMS), allows certificates and private keys to be stored in AD, so no matter where a user logs on, the certificate and private key information is downloaded to the user’s session from AD. Roaming authentication Profile roaming Credential roaming Local credentials Question 3. Question : (TCO 9) The _____ command-line utility allows you to configure and analyze security from the command line, including performing analysis of a server compared to a template and applying the settings in a security template. regedt secedit confsec secedt Question 4. Question : (TCO 9) _____, which maps to the second layer of the OSI model, provides all the same features as PPTP but it can also work on networks other than IP. IP L2TP IPsec SSL Question 5. Question : (TCO 9) When using _____, you can configure the Windows 2008 server to act as a router or a VPN server. RRAS a firewall Server Manager IPsec Question 6. Question : (TCO 9) The DHCP _____ passes...

Words: 329 - Pages: 2

Free Essay

Atomic Force Microscope

...AFM Tutorial Within the past decade, a family of powerful surface imaging techniques, known collectively as scanned probe microscopy (SPM), has developed in the wake of the invention of the scanning tunneling microscope (STM). Each scanned probe technique relies on a very sharp probe positioned within a few nanometers above the surface of interest. Some combination of probe and/or substrate positioning is required to provide sub-nm-resolution, three-dimensional motion of the probe relative to the substrate. When the probe translates laterally (horizontally) relative to the sample, any change in the height of the surface causes the detected probe signal to change. In general, if the probe signal decreases, this means that the point on the surface directly beneath the probe is farther from the probe than the previous point was. Conversely, if the probe signal increases, then the point on the surface is closer to the probe than the previous point. The electronic circuit that controls the vertical position of the probe relative to the sample uses these changes in the probe signal as sensory feedback to decide which direction (up or down) to move the probe to maintain a constant probe signal. When the probe signal decreases, the circuit realizes that the surface is now farther away, so it moves the probe down until the signal increases to the same level that was measured at the previous point. Similarly, the circuit responds to increases in probe signal by moving the probe up, away...

Words: 1788 - Pages: 8

Free Essay

Cjemsitry

...atomic force microscope. A related highlight in the intersection between experiment and theory is a recent review of the effects of molecular forces on biochemical kinetics. Other advances in scanning probe microscopy include entropic brushes, molecular sandwiches and applications of atomic force microscopy to gene therapy. Address Department of Physics, University of California, Santa Barbara, CA 93106, USA Current Opinion in Chemical Biology 1998, 2:579–584 http://biomednet.com/elecref/1367593100200579 © Current Biology Ltd ISSN 1367-5931 Abbreviations AFM atomic force microscopy/microscope SFM scanning force microscopy/microscope SICM scanning ion conductance microscopy/microscope SPM scanning probe microscopy/microscope STM scanning tunneling microscopy/microscope A new journal, Probe Microscopy, was launched in 1997 as a forum specifically devoted to the science and technology of SPM. AFM and SFM have been also newsworthy items in Science and Nature in the past year [14••,15•–17•,18••,19]. An introduction to AFM is covered well in a recent issue of Current Opinion in Chemical Biology, which describes and illustrates the design and mode of operation of AFM [4••]. The AFM images sample surfaces by raster-scanning a sharp tip back and forth over the surface. The tip is on a cantilever that responds to height changes on the sample surface in a way that generates a topographical map of the surface. We build on this excellent introduction by presenting some of the many advances...

Words: 4570 - Pages: 19

Premium Essay

Where Would You Remove a User’s Certificate from Being Able to Access Systems on Your Network?

...Building on Prior Success August 25, 2013 Building on Prior Success The president of Ocper Inc. would like to add four new servers to the network for file sharing, as well as upgrade the current system to allow employees remote access. The president has asked you for your recommendations on how to make the upgrades while keeping the up-front costs to a minimum. The president wants to allow employees remote access to the network. Upgrading a NOS (Network Operating System) can be a vital piece of software to incorporate in any NOS. There will be a dramatic change to the server as well as how the NOS will function for users, and let us not forget the potential risks for users accessing the servers over the Internet. Using Windows 2003, and Windows 2008 network operating system can be implemented simply because, if any clarity and/or assistance for help is needed while making changes, calling a Microsoft technician for support is always available. The recommendation previously used a star topology with a collapsed backbone. Further research has concluded that using a serial backbone network will accommodate the upgrades that the Ocper Inc’s president wants to implement. Networking the new serial backbone in a daisy-chain fashion will allow for the many different devices to interconnect and function on the server. Quite often, “Hubs and switches are often connected in a daisy-chain to extend a network” (Dean, 2012). A serial backbone can be easily incorporated which will...

Words: 726 - Pages: 3

Premium Essay

Lucerne Publishing

...Assignment 1 Lucerne Publishing CIS 332 10/18/2013 Lucerne Publishing There are many benefits to upgrading to Windows Server 2008 in any business environment. The Lucerne Publishing corporate office will benefit greatly from these upgrades. A computer must be designed with Windows Server 2008 to act as your Internet router. Here are some features from Window Server 2008 that will enhance the company operations according to Introducing windows server 2008: Top 10 reasons to upgrade (Shinder, 2008): Windows Server 2008 includes the Server Manager and the Advanced Event Viewer. It allows configuring, managing, and monitoring the server. In the Server Manager, you can install Server Roles (such as DNS, DHCP, Active Directory) and Role services (such as Terminal Services Gateway and RRAS). Windows Server 2008 Event Viewer provides you with Event Logs you can use. There are the usual Windows Event Logs: Application, Security, and System and Events for all applications and services installed on the computer. Windows Server 2008 can be installed in one of two ways: full installation or server core. The Server Core installation installs a subset of binaries that are required to get the core operating system running. The actual goal of Server Core is to reduce the overall attack surface and to reduce the number of updates required on the server. Terminal Services...

Words: 1092 - Pages: 5