IPv6, Introduction
The high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
IPv6, Primary Benefits
Two primary advantages of IPv6 are the support for stateless address auto configuration and the address space that is much larger. Other benefits of the new IPv6 are that the security is natively defined in the protocol, the simple Plug and Play (thanks to stateless auto configuration), the IP mobility is optimized.
Network Security and IPv6
First, we need to understand the meaning of "network security", in order to understand it's relationship with IPv6. On the internet the concept of security has usually focused on data security, authentification and data privacy. In the latest years the network security has been expanded.
Avoiding single points of failure while building the networks helps making them reliable when problems occur in a localized section. This way the network security has expanded and it now makes the Internet able to resist in the face of natural disasters or physical attacks.
Allowing a much simpler emergency response networks deployment, IPv6 offers great benefits in both areas. With superior data security, IPv6 allows us to to have more robust networks.
Data Security
The Internet Protocol security(IPsec) provides support for data encryption, user authentificaton and data integrity. IPv6 has support for IPsec and is expected that this way Internet Protocol security will be much widely available on the IPv6 end-nodes.
Conclusion
With the support for IPsec, IPv6 should create wider availability of end-node implementations. IPv6 will make the deployment and implementation of emergency networks easier with the included stateless address auto configuration. In short, IPv6 will make out lives safer an more secure.
The fastest and easiest "what is my ip" service to find out your IPv6 or IPv4 address, http://www.whatismyipv6.net
![]() |
|
![]() |
|
![]() |
|
![]() |
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Business on the internet is getting down right shameless. This... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
There are ways to insure security though. You can get... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
If you have used a Windows machine for a while,... Read More
A few nights ago I received an email from "2CO"... Read More
With the advent of the World Wide Web, a whole... Read More
When it comes to a secure website and passwords it... Read More
Over the past few years as the internet has become... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
The money being spent online is steadily growing. With billions... Read More
Afraid that someone is monitoring your PC or installed a... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Have been an Internet user for more than 9 years,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Phishing is the act of some individual sending an email... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
We all know that it's dangerous to use the same... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
It's late. You've been scouring the web for that perfect... Read More
No longer are viruses the only threat on the internet.... Read More
A new variation of the Nigerian Scam theme ... Read More
The trash folder in my main inbox hit 4000 today.... Read More
With the Internet entering our lives in such an explosive... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The first thing people think about when defending their computers... Read More
First of all we need to get some terms stated.... Read More
Can you protect your computer from all possible viruses and... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
A couple of years back, I paid my dues the... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
With the Internet entering our lives in such an explosive... Read More
If spyware were a person and he set himself up... Read More
Today,on most internet user's computers, we have the ability to... Read More
Watching how the traditional media covers the latest virus or... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Despite the current wave of identity theft and corporate security... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Phishing is the act of some individual sending an email... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
At this point, if you've got the whole "turning the... Read More
Huge number of spyware software applications are available in the... Read More
The first thing people think about when defending their computers... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Business on the internet is getting down right shameless. This... Read More
A few nights ago I received an email from "2CO"... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
History and BackgroundThe virus was one of the first ever... Read More
Some months ago, before there was much publicity regarding phishing... Read More
First, let's do a little recap'. As I stated in... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Spyware is software that runs on a personal computer without... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Internet Security |