TITLE

Tunnel vision

AUTHOR(S)
Careless, James
PUB. DATE
September 2008
SOURCE
Urgent Communications;Sep2008, Vol. 26 Issue 9, p24
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the use of virtual private networks (VPNs) in public safety. By using encryption to secure data through its transmission via a public network, VPNs offer the security of private networks without the cost. Public-safety agencies have expressed interest in the VPN concept because it is secure, provides instant interoperability on a network-to-network level between connected agencies and allows its users to transport information.
ACCESSION #
34356437

 

Related Articles

  • VPNs: When Sniffing Your Data Is Rude. Goldsborough, Reid // Teacher Librarian;Jun2013, Vol. 40 Issue 5, p64 

    The article focuses on the importance of security solutions while browsing the Internet. The main idea behind Internet security is to prevent hackers from finding ways from accessing information stored from one's computer. The author says extra precaution should be taken when browsing while on...

  • Positive Identification in a Wireless World. Ardoin, Paul // Database & Network Journal;Feb2003, Vol. 33 Issue 1, p9 

    Discusses the significance of implementing security features that include access control appliances or virtual private networks to protect wireless systems instead of wireless encryption to establish a secure session. Vulnerability of the fixed passwords to inherent attacks by brute-force...

  • Geographically Secured SSL-VPN Using GPS.  // International Journal of Computer Applications;Sep2010, Vol. 6, p21 

    The article describes how the Virtual Private Network (VPN) system based on Secure Socket Layer (SSL) can be extended to incorporate location information using global positioning system (GPS). It reveals that the model aims to develop an architecture that will provide access control based on...

  • ALGORITHM DESIGN OF SECURE DATA MESSAGE TRANSMISSION BASED ON OPENSSL AND VPN. SHI-HAI ZHU // Journal of Theoretical & Applied Information Technology;2/10/2013, Vol. 48 Issue 1, p562 

    In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that...

  • Grid based Approach for Data Confidentiality. Malempati, Sreelatha; Mogalla, Shashi // International Journal of Computer Applications;Jul2011, Vol. 25, p1 

    Network security measures are required to protect data during their transmission. Sensitive information transmitted across a network requires confidentiality. Data confidentiality is the protection of transmitted data from passive attacks. Passive attacks are eaves dropping or monitoring the...

  • Analysis of Multiple Keys for Variable Data Length in Multinode Network for Encryption. Kakkar, Ajay; Singh, M. L.; Bansal, P. K. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 6, p5237 

    Data security of the model depends upon the combination of keys. The processing speed, latency, S-Boxes, accuracy and key length have been used to determine the strength of the model. The paper deals with the above mentioned parameters for wireless model having multiple nodes. The results have...

  • An Approach for Secure Message Transmission through Dynamic key Cryptography with Attack Analysis. Singh Sikarwar, Navneet // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p214 

    This paper introduces an approach for secure message transmission by using the concept of dynamic key cryptography with analysis against attacks. In current security models, cryptography plays a fundamental role in protecting data integrity and confidentiality in information systems. However,...

  • Strange Number System: An Enhancing Tool for Data Encryption and Decryption. Das, Debasis; Lanjewar, U. A. // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p167 

    In the electronic age, while information needs to be sent on network with security, it has to be encrypted to protect information from 'prying eyes'. Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information...

  • Light-weight Security Architecture for IEEE 802.15.4 Body Area Networks. Meena Abarna, K. T.; Venkatachalapathy, K. // International Journal of Computer Applications;6/1/2012, Vol. 47, p1 

    In IEEE 802.15.4 Body Area Networks (BAN), security solution is required for data confidentiality, authentication and integrity at low cost. But the existing solutions for WBAN either provide any one of the security features or provide all the features with high cost. In this paper, we propose...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics