This document summarizes the knowledge bank of the different measures and levels available, in regards to security on VPN and Web servers. It is developed within the framework of a Master's project, entitled “Security of Information”.; In this document, we discuss the different encoding techniques available for these environments, identify the possible attacks scenarios, detection systems and different possible parades.; The definition of “Security Data Processing”, which reflects this project, is too wide. This document, is addressed to system administrators, as well as to the public.; The applied methodology to realize this project leans on: (a) an elaborated library research (deliver and items); (b) an inventory of sites, forums and groups of discussions that treat similar projects; (c) analysis and objective of different attacks; (d) description of security tools offered in the market.; With an established coherence between hardware and software security, I present the strategy of security. I describe methods and composing architecture elements secured data processing in order to offer data integrity as well as users authentication through VPN and Web servers.; At last, I recommend a series of protection tools in order to avoid different forms of attacks. I show the effectiveness of this protection and tools available to verify the security, detect attacks against the VPN and the Web servers. |