Talk With an Expert

Appropriate Use of Network Encryption Technologies

Appropriate Use of Network Encryption Technologies (PDF, 1.68MB)Published: 20 Sep, 2002
Created by:
Kenneth Forward

This paper will describe virtual private networks and other network encryption technologies such as secure sockets layer - what they are, and what protections they provide. Equally important, this paper will also examine the flipside; namely, what network encryption cannot provide; how one can actually compromise overall security through poor implementation; and measures one can take to minimize these risks. The necessity of defense in depth will be emphasized throughout.