IPv6, Introduction
The high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
IPv6, Primary Benefits
Two primary advantages of IPv6 are the support for stateless address auto configuration and the address space that is much larger. Other benefits of the new IPv6 are that the security is natively defined in the protocol, the simple Plug and Play (thanks to stateless auto configuration), the IP mobility is optimized.
Network Security and IPv6
First, we need to understand the meaning of "network security", in order to understand it's relationship with IPv6. On the internet the concept of security has usually focused on data security, authentification and data privacy. In the latest years the network security has been expanded.
Avoiding single points of failure while building the networks helps making them reliable when problems occur in a localized section. This way the network security has expanded and it now makes the Internet able to resist in the face of natural disasters or physical attacks.
Allowing a much simpler emergency response networks deployment, IPv6 offers great benefits in both areas. With superior data security, IPv6 allows us to to have more robust networks.
Data Security
The Internet Protocol security(IPsec) provides support for data encryption, user authentificaton and data integrity. IPv6 has support for IPsec and is expected that this way Internet Protocol security will be much widely available on the IPv6 end-nodes.
Conclusion
With the support for IPsec, IPv6 should create wider availability of end-node implementations. IPv6 will make the deployment and implementation of emergency networks easier with the included stateless address auto configuration. In short, IPv6 will make out lives safer an more secure.
The fastest and easiest "what is my ip" service to find out your IPv6 or IPv4 address, http://www.whatismyipv6.net
After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More
You and I are a lot alike. We are both... Read More
Afraid that someone is monitoring your PC or installed a... Read More
The top five online scams on the Internet hit nearly... Read More
There is no doubt that "how-to articles" have become a... Read More
A couple of days ago, I was searching for a... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Spyware is software that runs on a personal computer without... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
In the past I've never really paid much attention to... Read More
We all know that it's dangerous to use the same... Read More
Many of us have run into an annoying and time-consuming... Read More
Before we start, I want to make it clear that... Read More
Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
History and BackgroundThe virus was one of the first ever... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Let us take the example of scrambling an egg. First,... Read More
By browsing a web page, you could infect your computer... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
This is the second in a series of articles highlighting... Read More
There are several basic concepts to keep in mind when... Read More
In today's times spyware is a very serious issue and... Read More
To blog or not to blog? Well, why not? Lots... Read More
This is the second in a series of articles highlighting... Read More
We all know that it's dangerous to use the same... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Every single time you access a website, you leave tracks.... Read More
If you use the internet, you have probably been infected... Read More
A couple of years back, I paid my dues the... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
If you are a parent, as am I, I think... Read More
Afraid that someone is monitoring your PC or installed a... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
If spyware were a person and he set himself up... Read More
Viruses are, however, not the only malicious software programs out... Read More
After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
The top five online scams on the Internet hit nearly... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
You may not realize it, but as you are surfing... Read More
When we think of adware, what comes to mind are... Read More
|