Chapter 9: Exploring IPsec and TLS
When you begin a data transaction on a network these days, you want to make sure that you can access a resource in a secure manner. One way to accomplish this is by using a virtual private network (VPN). A VPN is a method used between two endpoints that provides data confidentiality as it crosses through an insecure network. The concept of a VPN has been around for several decades. However, in recent years, this technology has become more popular because with today's changing landscape, a large percentage of the world's population is online. That, coupled with the fact that more and more people are seeking ways to secure their data while in transit, makes using a VPN an optimal solution.
In this chapter, you'll apply all of your knowledge of cryptographic tools, techniques, and protocols as we examine the concepts of a VPN. We'll begin by outlining several types of VPNs in use today, such as Secure Shell (SSH) and browser-based...