New spec plugs LAN security gap

Duffy, Jim; Fontana, John
August 1999
Network World;08/23/99, Vol. 16 Issue 34, p1
Trade Publication
Focuses on the proposed Extensible Authentication Protocol Over Ethernet network standard supported by a group of computer vendors to help protect enterprise networks of companies from internal attack. Authentication of users on local area networks under the proposal; Mechanism in which extensible authentication protocol boost network security; Potential applications of the protocol.


Related Articles

  • Inside Cisco's global security operations. Bednarz, Ann // Network World;9/12/2011, Vol. 28 Issue 16, p10 

    The article focuses on the Security Intelligence Operations (SIO) of U.S. networking giant, Cisco Systems Inc. The author mentions that Cisco's SIO provides enterprise security threat information, vulnerability analysis and mitigation solution to its enterprise customers. She notes that Cisco...

  • Vendors tout easier VPNs. Greene, Tim // Network World;1/21/2002, Vol. 19 Issue 3, p1 

    Reports the introduction of Internet-based IP Security (IPSec) VPN alternative computer software for corporate networks. Role of Secure Sockets Layer (SSL) technology on the function of IPSec in Web browsers; Advantage of VPN alternative on network security and accessibility of companies; Pros...

  • Inside SSL: The Secure Sockets Layer Protocol. Chou, Wesley // IT Professional;Jul/Aug2002, Vol. 4 Issue 4, p47 

    Focuses on the role of secure sockets layer protocol (SSL) in providing secure e-commerce transactions over the Web. Overview of SSL; Details of SSL's operation; Categories of the SSL tasks.

  • IPSec's double-edged security. Curtis, John // Network World;08/23/99, Vol. 16 Issue 34, p24 

    Describes the Internet Protocol Security (IPSec) virtual private network (VPN) security technology. Support for shared secret key and digital certificate authentication; Interoperability; Problems in running IPSec connections across the current generation of carrier-class asynchronous transfer...

  • WPA tightens wireless security. Peckham, Ray // Communications News;Feb2003, Vol. 40 Issue 2, p6 

    Focuses on Wi-Fi Protected Access, an initiative announced by the Wi-Fi Alliance to protect networks, as of February 2003. Background on wired equivalent privacy security vulnerabilities; Impact on product upgrades; Terms of the initiative.

  • IPSec standard is nearing the finish line. Kerstetter, Jim // PC Week;01/26/98, Vol. 15 Issue 4, p6 

    Reveals that the IPSec Working Group of the Internet Engineering Task Force has released draft specifications for the IP Security protocol (IPSec) in early 1998. Vendors planning to use the IPSec protocol; What IPSec provides to users; How it works; Potential interoperability between virtual...

  • Security on the new digital network. Loshin, Pete // Telecommunications - Americas Edition;Jan99, Vol. 33 Issue 1, p36 

    Reports on the factors crucial to protecting data in digital networking environments. Includes encryption; Authentication; Certification; Key management; Firewalls; Virtual private networks; Extranets; Intrusion detections; Drawbacks of Internet Protocol.

  • Editorial. Boiten, Eerke; Butler, Michael; Derrick, John; Smith, Graeme // Formal Aspects of Computing;Jan2010, Vol. 22 Issue 1, p1 

    An introduction to the journal is presented in which the editor discusses several articles including "Atomic actions and their refinements to isolated protocols," by Richard Banach and Gerhard Schellhorn, "Invariant-based reasoning about parameterized security protocols," by Arjan J. Mooij and...

  • Helping IT managers to sleep at night. Watts, Trevor // Telecommunications - International Edition;Oct2000, Vol. 34 Issue 10, p59 

    Focuses on security issues associated with Internet Protocol (IP)-based virtual private networks (VPN). Benefits and disadvantages; Means by which organizations can ensure that its information is secure when accessed over the Internet; Security risks.

  • VPN security requirements debated. Gittlen, Sandra // Network World;9/17/2001, Vol. 18 Issue 38, p14 

    Focuses on the security requirements of Internet Protocol (IP) virtual private networks (VPN). Factors that could compromise VPN data; Connection between the end of an IP tunnel and the destination site's corporate network.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics