Thus, what is of supreme importance in war is to attack the enemy’s strategy.
As network administrator I can take down the network with one keystroke. It’s just like being a doctor but without getting gooky stuff on my paws.
Scott Adams (‘Dogbert’)
The Internet protocol suite, also referred to as TCP/IP, defines a reference model for networks that includes four layers [Sta03]: Application, Transport, Internet and Link. One can apply security to any of these layers, where two secure protocols are commonly used:
Figure 10.1 shows the layers and the security protocols used in each of the layers. The Application layer has different protocols based on the type of application. The Transport layer uses TLS as the security protocol, while the IP layer uses IPSec as the security protocol. Application protocols such as HTTP, LDAP and SOAP need to use the lower layers to support typical application tasks such as displaying web pages ...