StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virtual Private Network - Research Paper Example

Cite this document
Summary
The paper "Virtual Private Network" discusses VPN as a form of a wide area network, it’s a group of computers connected together in a discrete network over a public network. It’s a method used by individuals or companies to add security and privacy to public and private networks such as Wi-fi…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful

Extract of sample "Virtual Private Network"

A virtual private network (VPN) A virtual private network (VPN) is a form of a wide area network (WAN), it’s a group of computers connected together in a discrete network over a public network such as the internet. It’s a method used by individuals or companies to add security and privacy to public and private networks such as Wi-fi. Companies use a VPN to obtain access to its network resources without the need of being on the same local area network physically and also to secure their data when they are using an unsecured connection (Whyvpn.org 2014). Computers connected over a VPN can share files and other resources that require an active connection securely. They also serve to secure internet traffic. Just like a Wide Area Network, it connects multiple sites and servers over a long distance. The most important aspect of a virtual private network is its emphasis on privacy, because when a client computer connects to the internet through a VPN, its initial IP address is replaced by the one provided for by the VPN providers. For Example, a person’s physical location is Washington, but while using a virtual private network he appears to live in Brussels, this clearly shows that users obtain IP addresses from the area the VPN provides (Stewart 2011). In order to get access or connection into a virtual private network, one must have a username and password, mostly provided for by the service provider. On a computer, a VPN client is normally used, or you can access a special website, you enter your correct authentication details, then the computer exchanges information with the remote servers and once verification has taken place, connection happens and all the information and internet data is encrypted and secured from on lookers. Software developers have also developed applications for smart phones to also take advantages of accessing the internet safely through a VPN, by using certain protocols such as PPTP and L2TP/IPSec. Computers also uses PPTP VPN connections, OpenVPN and L2TP/IPSec protocols use an open source software known as OpenVPN client and authentication details configured into a certificate that you download and run on the client (Yuan & Strayer 2001). A virtual private network has many protocols of which can be utilized to secure the flow of information over a public network with the only difference between these protocols being how each keeps the data safe and secure (Geier 2014). IP Security protocol (IPSec), is one of the major protocols used to obtain a secure connection over the internet, it is a combination of many likewise protocols. IPSec can use either the tunneling or transport mode so as to ensure data encryption over the virtual private network. The only difference between the two modes is the transport only secures the message inside the data packet while tunneling encrypts the whole data packet. Secure Socket Layer (SSL), these types of virtual private network connections are also known as clientless because they do not require a dedicated VPN client to get a connection. Connection is this protocol occurs through a web browser making it the easiest VPN connection than the other protocols (Whyvpn.org 2014). Point To Point Tunneling Protocol. This is the most common form of VPN protocol because it’s found in windows, Mac OS and also on mobile platforms such as Android OS. It is the least secure type of virtual private network. Layer 2 Tunneling Protocol. It is found at the data link layer in the OSI model. Normally used together with the IPSec to secure the flow of its data packets. Open VPN. This is one of the new entrants into the VPN world of connections. It uses an open source application which is freely available. It makes the use of UDP and TCP ports. Virtual Private Networks have become very popular in many areas around the world especially due to the Internet revolution. Many countries around the world, its institutions and people depend on the internet on their day to day lives in order to perform various functions such as online shopping, online gaming and social networking. This creates the need for a connection over the internet which can secure information. Security is the Virtual Private Network main Purpose (Geier 2014). Hackers have come up with various ways to intercept such vital information over the network such as Wi-Fi spoofing. Virtual private networks uses its various protocols as ways to ensure that the information sent over the network is encrypted and highly secure. VPNs also have the added advantage of integrity check which makes sure that data is not lost while also preventing the connection from being hijacked (Whyvpn.org 2014). Virtual private networks emphasis on security makes it more suitable for use by schools and institutions of work. For instance students will log into their school network safely in order to obtain material made available by the school, also, business people who travel a lot make use of a virtual private network because they normally use public Wi-Fi especially on a café or in the airport, they utilize the VPN to make sure that the data remains secure and encrypted. With a VPN a person is able to download legally or illegally, without the ISP’s knowledge to escape being blacklisted and also prosecuted, especially those using the bit torrent application VPN offers the best security. While using a VPN one is able to enjoy content that is not available in certain countries like the BBC iplayer programmes and Netflix, restricted radio stations, web services and other applications client (Yuan & Strayer 2001). There are many VPN service providers around the globe. These services are either free or paid. Paid services are the best considering that they offer the best services such as anonymity, they do not keep logs, they offer a number of gateways in which the users can access the internet and also offer the best speeds. Free services also ensure security and do not keep logs but its users share the same IP addresses and sometimes the speeds are not the best. Examples of paid VPN services are: Pure VPN Hide My Ass Private Internet Access Go Trusted VyprVPN Strong VPN Free VPN providers are funded by advertising and donations from its users. Some of the most common free VPN service providers include: Hotspot Shield, its free service is advertisement based. They have servers in the UK. Private Tunnel, Has a restriction of only 100mb per month Cyber Ghost offers free and premium services Tunnel Bear VPNbook Spotflux Lite Using a VPN is one way to get a secure long distance network connection. They are normally used by large organizations and businesses. They offer immense advantages for wireless networks by offering a secured network infrastructure for its users. Advantages include: Cutting Costs. VPNs provide a cheaper alternative for organizations by cutting the costs. VPNs eliminate the need for costly long distance leased lines and telephone charges while still removing any network support cost. If an institution goes for a service provider, the burden of setting up the network and surveillance falls to the ISP. Increase speed and performance, when connected to a VPN the bandwidth and overall performance within the network is increased. Change IP address, VPNs offer IP addresses from different countries for those in need. Unblocking sites and bypass filters, through a VPN, one can access blocked content and bypass a countries internet filter. Use of VPN is common in places where internet censorship is carried out, such as China and some Arab countries. Online Anonymity, compared to web proxies, VPNs offer the best anonymity while allowing access to websites and applications. File Sharing, users of VPNs share files and information in different parts of the world cheaply and securely. Virtual private networks are not without limitations because they require users to have a vast knowledge of network related security issues such as configuration to enhance protection on a public network. Organizations that use internet based VPNs are not in control of its performance and efficiency, this creates a reliance on ISPs. Most of VPN service provider’s technology is not compatible with other manufactures. This may confuse network administrators leading to technical issues (Whitman 2012). In conclusion VPNs offer complete range of security and encryption of information over the internet. Its use is beneficial to Companies, business people and individual internet users. They are highly efficient especially with the nature of vital information that is being shared over the internet in this day and age and the issue of hackers who will utilize the smallest loop hole and steal sensitive data and information. Techies around the world are popularizing the use of VPN all over the world for people to access the internet without any limitations by a country or an ISP. This should be the first step for everyone who feels the need to make online activities more secure. Works Cited Yuan, Ruixi, and W. Timothy Strayer. Virtual Private Networks. 1st ed. Boston: Addison- Wesley, 2001. Print. Stewart, James Michael. Network Security, Firewalls, And Vpns. 1st edition.: Jones & Bartlett Learning, 2011. Print. Whyvpn.org,. Why VPN | VPN Benefits. N. p., 2014. Web. 30 Apr. 2014. Retrieved from: http://whyvpn.org/vpn-benefits/ Geier, Eric. How (And Why) To Set Up A VPN Today | Pcworld. PCWorld. N. p., 2014. Web. 30 Apr. 2014. Whitman. Guide To Firewalls And Vpns. 1st edition. Boston, MA: Cengage Learning, 2012. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research paper Example | Topics and Well Written Essays - 1250 words - 19”, n.d.)
Research paper Example | Topics and Well Written Essays - 1250 words - 19. Retrieved from https://studentshare.org/information-technology/1643402-research-paper
(Research Paper Example | Topics and Well Written Essays - 1250 Words - 19)
Research Paper Example | Topics and Well Written Essays - 1250 Words - 19. https://studentshare.org/information-technology/1643402-research-paper.
“Research Paper Example | Topics and Well Written Essays - 1250 Words - 19”, n.d. https://studentshare.org/information-technology/1643402-research-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virtual Private Network

Virtual Private Network Tools

For a smooth establishment and maintenance of a Virtual Private Network, one is required to have appropriate networking software and hardware installed in their computers and the local network.... In order to completely set up a Virtual Private Network, certain software and hardware tools known as the VPN tools are necessary.... OpenVPN is an open source software application for Virtual Private Network implementation, meaning it can be downloaded and used for free....
18 Pages (4500 words) Term Paper

Virtual Private Network Architecture

Virtual Private Network ARCHITECTURE Virtual Private Network Architecture Author Author Affiliation Date This paper presents an overview of the virtual cloud environment.... In this scenario, a VPN (Virtual Private Network) is established by creating a secure communications link between two nodes by following the characteristics of a point-to-point private link.... In addition, this isolation of enterprise resources and clouds augments software and configuration challenges and complexity while putting into practice the services that must communicate with an enterprise's private network....
3 Pages (750 words) Essay

Network Security Fundamentals, Security Threats, and Issues

Certainly, in some cases firewalls also block the required transmission, and throughout a frequent practice of alteration, the filters can be tailored to enhance their effectiveness (Wynn, 2012) Moreover, a firewall encompasses a wide variety of associated applications and tools, installed at a network gateway server, which ensures the security of the resources (data, information, and other resources) of a private network from outside users or people from other networks.... network SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES network Security Fundamentals, Security Threats, and Issues Author Author's Affiliation Date 3....
4 Pages (1000 words) Case Study

Impact of the Virtual Private Network on Businesses

The aim of the paper is to look into the impact of Virtual Private Network to businesses, this in relation to the meaning of VPN, the stages of its development, and the advantages it has over others.... A Virtual Private Network enables the developing or building of private networks across the internet.... The growth of VPNs A Virtual Private Network conceals the line between the open public internet and a closed private leased line network (Wouters and Bantoft, 2006)....
5 Pages (1250 words) Research Paper

Network Infrastructure

The best type of connection between offices and points of sales for a geographically spread retail company is by using a broadband internet connection technology and implementing an outsourced Virtual Private Network (VPN) solution hosted in an outsourced dedicated host server located in the host company premises.... ccording to Virtual Private Network Consortium (2006), a Virtual Private Network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures....
13 Pages (3250 words) Assignment

Virtual Private Network

One of the technologies available in protecting the information systems environment is via the deployment of a Virtual Private Network or VPN.... ??A Virtual Private Network (VPN) is a private communications network often used by companies or organizations, to communicate confidentially over a public network.... the Internet) on top of standard protocols, or over a service providers private network with a defined Service Level Agreement (SLA) between the VPN customer and the VPN service provider....
5 Pages (1250 words) Essay

Virtual Private Network as an Appropriate Control

The paper "Virtual Private Network as an Appropriate Control" for establishing a secure channel recommends defining the scope i.... Written by Bruce Schneier, as a free replacement for DES or IDEA, it is considered very fast and secure' and as per network dictionary, it is defined as 'Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms.... It is asymmetric (that is, a secret or private key) block cipher that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable use'....
8 Pages (2000 words) Case Study

IP-SEC Site to Site VPN Connectivity

This is because the Virtual Private Network is supposed to support arbitrary and network node sets that are changing.... A Virtual Private Network (VPN) refers to a network technology developed for creating a network connection that is secure over a public network such as service provider-owned private networks and the internet.... Virtual Private Network provides its users with security, functionality, and network management.... With traffic encryption, virtual tunneling protocols, or dedicated connections, it is possible to create a Virtual Private Network through the establishment of a point-to-point connection....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us