IPv6 - Next Step In IP Security

IPv6, Introduction

The high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.

IPv6, Primary Benefits

Two primary advantages of IPv6 are the support for stateless address auto configuration and the address space that is much larger. Other benefits of the new IPv6 are that the security is natively defined in the protocol, the simple Plug and Play (thanks to stateless auto configuration), the IP mobility is optimized.

Network Security and IPv6

First, we need to understand the meaning of "network security", in order to understand it's relationship with IPv6. On the internet the concept of security has usually focused on data security, authentification and data privacy. In the latest years the network security has been expanded.

Avoiding single points of failure while building the networks helps making them reliable when problems occur in a localized section. This way the network security has expanded and it now makes the Internet able to resist in the face of natural disasters or physical attacks.

Allowing a much simpler emergency response networks deployment, IPv6 offers great benefits in both areas. With superior data security, IPv6 allows us to to have more robust networks.

Data Security

The Internet Protocol security(IPsec) provides support for data encryption, user authentificaton and data integrity. IPv6 has support for IPsec and is expected that this way Internet Protocol security will be much widely available on the IPv6 end-nodes.

Conclusion

With the support for IPsec, IPv6 should create wider availability of end-node implementations. IPv6 will make the deployment and implementation of emergency networks easier with the included stateless address auto configuration. In short, IPv6 will make out lives safer an more secure.

The fastest and easiest "what is my ip" service to find out your IPv6 or IPv4 address, http://www.whatismyipv6.net

In The News:


pen paper and inkwell


cat break through


Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More