Chapter 9 1. How does the source of your software code affect the overall security of the system? Justify your position for a general system. 2. What protections can you….
If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?
The first limitation is that it only provides coarse form policy management support, and takes the decision without the knowledge of application context (Arkko and Nikender 2005, p. 242). The policy selector of IPsec is composed of only tuple of source /destination addresses, port number and transport protocol type……