In the interconnected world of today, sensitive information is constantly being exchanged over the Internet or from enormous places where the security of information can be compromised. For the last few decades, most of the information has been stored digitally on huge storage devices. In addition, these storage devices are placed on IP networks. Once storage devices are placed in an IP network, they are vulnerable to both internal and external network attacks. According to Intel “Equally troubling are recent estimates that now the number of attacks from within networks are as high as eighty percent of all successful attacks on corporate networks”. Malicious attacks, such as Viruses, Trojan horses and Spyware cause loss of sensitive data and require use of valuable resources to resolve. Data theft of especially confidential data has become a major concern because of the way the Internet works today. These attacks can come from employees, staff or anyone who has access to the network. The open design of network has opened new avenues of data thefts and attacks. Today, three main concerns of communication or exchange of information are data integrity, authenticity and confidentiality.
In today’s world, changes have been made on the way the Internet operates. The technique used for transmitting data over the Internet is called Internet Protocol. Internet Protocol can be used to transfer any type of data from one part of the world to another. IP is a set of standards for ensuring that communications delivered over the networks are private as well as secure. According to Shoniregun, C. A.IP routes packets to their destination host even though it provides unreliable and connectionless datagram delivery service. The reasons for the later problem are based on the facts that there is no security associated with the IP packets. The packet data can be corrupted during the transit. In order to overcome this problem, it is important to make sure that the data sent over the network must be transmitted only if the data transfer is authenticated and the environment is tamperproof and confidential to ensure the security of sensitive information. Security of the packet data is needed to protect the information assets, to ensure the data integrity and unauthorized access, to comply with the government regulations and to improve the management of information. The network traffic over the devices connected in the network must be secured from malicious attacks from inside and outside the network to protect the sensitive information.
This document is in PDF format. To view it click here.