Transaction Security
Virtual Private Network approach
Encryption and authentication done as part of the network communication
Network software must be modified
Users need not modify behavior or application software
From Web Security Sourcebook by Rubin, at al, John Wiley & Sons, 1997
Previous slide
Next slide
Back to first slide
View graphic version