z-logo
open-access-imgOpen Access
Build Encrypted Interconnection Networks by application of IP Security and Mac Address Filtering Authentication Methods: بناء شبكات ربط مشفرة من خلال تطبيق أساليب مصادقة أمان IP وتصفية عنوان Mac
Author(s) -
Jouma Ali AlMohamad Jouma Ali AlMohamad
Publication year - 2021
Publication title -
mağallaẗ al-ʿulūm al-handasiyyaẗ wa-al-tiknūlūğiyā al-maʿlūmāt
Language(s) - English
Resource type - Journals
ISSN - 2522-3321
DOI - 10.26389/ajsrp.m280321
Subject(s) - computer science , computer network , mac address , computer security , authentication (law) , encryption , data security , internet security , information security , security service
To improve the security in data networks we use of IP Security and MAC Address Filtering authentication methods on network devices is very useful to be able to protect, verify and filter company data especially if data contain sensitive information like credit cards while using public data network. IP Security authentication provides integrity between connections, then Filtering MAC Address can help the router task to be able recognize users on the network, So that expected the combination between IP Security and Mac Address Filtering will provide security for every transfer and receive data from Headquarter to branch office, then the company doesn't have to worry about data package being robbed or manipulated by the unauthorized parties.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here