SECURITY OF COMMUNICATIONS AND VIRTUAL PRIVATE NETWORKS Cover Image

SECURITY OF COMMUNICATIONS AND VIRTUAL PRIVATE NETWORKS
SECURITY OF COMMUNICATIONS AND VIRTUAL PRIVATE NETWORKS

Author(s): Dan Andreescu
Subject(s): Communication studies, Security and defense, Military policy, ICT Information and Communications Technologies, Peace and Conflict Studies
Published by: Carol I National Defence University Publishing House
Keywords: security; network; virtual; private;

Summary/Abstract: The explosive development of computer technique and computer networks triggered a significant increase of attacks launched against computer systems. Even from the appearance of the computer networks, the issue of its security was generally raised and, in particular, the issue of transmission of sensitive information through it without a third party having the possibility to use or modify it. Protection of communications and information became a priority of concerns of all kind of organizations, either military or non-military, which became a mandatory requirement in the process of design of security of an IT system. All these considerations imply the existence of methods to protect information sent and to identify in a unique manner the persons having access to such. Banking applications such as transfers or data transmission require on a mandatory basis the use of the digital signature, of identification and encryption of data transferred through the network. This article tries to present a field of communications security which is under full development and which, in addition to the VPN applications, which are the spearhead fighting against ill-intended or curious persons attempting to alter, read or copy the information with a certain level of secrecy transmitted through an unsecure environment such as the Internet, is also based on other sub-fields such as steganography, cryptography, packet tunneling and their routing on certain communication lanes. As an example of improvement of communication security through the public networks, we presented in this article the three implementations, which occurred with the sole purpose of securing data transport between two geographically separate networks communicating through a hostile environment.

  • Issue Year: 2008
  • Issue No: 29
  • Page Range: 98-104
  • Page Count: 7
  • Language: English