VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation.
This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible.
The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.
|Commitee:||Ponce, Oscar Morales, Tamayo, Jose|
|School:||California State University, Long Beach|
|Department:||Computer Engineering and Computer Science|
|School Location:||United States -- California|
|Source:||MAI 57/04M(E), Masters Abstracts International|
|Keywords:||Concept, IPsec, Networking, Security, VPN|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be