logo

Virtual Private Networks: Analytical Tasks and Security Measures

   

Added on  2023-06-11

8 Pages1189 Words63 Views
Running head: VIRTUAL PRIVATE NETWORKS
Unit Title: BN305
Virtual Private Networks
Name of the Student:
Name of the University:
Author note:

1VIRTUAL PRIVATE NETWORKS
Table of Contents
1.1 Analytical tasks..............................................................................................................3
2.1 Analytical Tasks............................................................................................................4
3.1 Analytical task...............................................................................................................5
References............................................................................................................................7

2VIRTUAL PRIVATE NETWORKS
1.1 Analytical tasks
a) Web browsers as well as servers communicate via TCP/IP. Hypertext transfer protocol
is used to transfer web pages. The TCP/IP stack includes several layers such as application,
internet, network and transport [1]. Each layer includes different protocols as it is used for
standardizing the flow of information. Information is considered as a computer program and used
for formatting information into packer as it moves down to TCP/IP stack.
Figure 1: The request and response between web browser and server
(Source: Theodoro et al. 2015, p.11 [4])
When the browser makes the request, it mentions the protocol, which is used by it:
HTTP/1.1. After this, when the server sends response, it identifies the protocol. A protocol is a
standard was to do the things. For an example, a rule in HTTP is the first line of a request that
will include the particular type of request. The address of the page on server as well as the
version of the protocol is used by the browser.
b) Digital signatures are based on cryptography of public key. It is known as asymmetric
cryptography. In the process, utilizing a public key algorithm like RSA, digital signatures are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enhancing Cyber Security with VPN, SSL and Digital Signatures
|10
|1977
|395

Network Security in SSL Communication
|12
|1639
|396

A REPORT ON VIRTUAL PRIVATE NETWORK
|16
|2131
|151

Security in Cryptography | Assignment
|7
|1502
|13

SSL VPN Technologies for Securing Information in Contemporary Organizations
|9
|2302
|280

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427