logo

Virtual Private Network (VPN) Report 2022

   

Added on  2022-09-23

14 Pages2220 Words21 Views
Running Head: VPN 0
VPN
Report
Student name
Virtual Private Network (VPN) Report 2022_1
VPN 1
Table of Contents
Introduction................................................................................................................ 2
User’s Access Control and Authentication..................................................................3
Integrity Processes and Confidentiality......................................................................7
Protection against Replay Attacks.............................................................................. 9
Remote Access......................................................................................................... 10
Conclusion................................................................................................................ 11
References............................................................................................................... 12
Virtual Private Network (VPN) Report 2022_2
VPN 2
Introduction
Virtual Private Network (VPN) is a technique for creating a personal network to
secure data and information of a contemporary organization. VPN is the best
solution for an organization that required security of their information assets, such
as data and information1. A digital personal network uses a public network’s
infrastructure to make the connections among geographically dispersed nodes, in
preference to the use of cables owned or leased solely for one network’s use2.
To the consumer, a VPN seems like a private community, although it shares the
network with other users. There are numerous makes use of for a VPN, examine and
speak the significance of VPN for those contemporary establishments3. In addition,
there are some important features of VPN makes it different from other methods of
security. It will list the concerns of cutting-edge businesses in speaking amongst
their employees, clients, and remark if VPN can cope with their worries4. Besides,
VPN uses SSL and IPsec security approaches to secure the communication between
company and clients. This report will provide how VPN may be effective for securing
various devices communications5.
VPN alternative technology Legacy VPNs has had a few most important drawbacks
Virtual Private Network (VPN) Report 2022_3
VPN 3
and problems, which include the ones described under. In addition, VPN can
manage There had been trying to remedy the troubles. Some technologies are
being deployed as options, e.g. Microsoft Direct Access, Soft Ether VPN, etc.6.
Essentially, VPN is referred to as being relaxed and secure; however, there are
nonetheless many problems almost about protection aspects6. There are various
devices to provide security to the personal channel of communication of an
organization. However, attackers can hack the particular channel but they cannot
identify the data because of personal encryption and deception technology7.
In addition, Adaptive Security Appliances (ASA) is the best device to provide
security to the network. It provides high security to the network for a particular
client in VPN8. Therefore, most of the organization has used CISCO ASA 5505
devices for IPsec and Internet Key Exchange (IKE). There are many other
advantages of this device related to the security of the data and information8.
User’s Access Control and Authentication
Authentication is necessary for data transfer and access between two networks for
different clients. Therefore, Secure Socket Layer (SSL) has used for authentication in
the VPN. In addition, Transport Layer Security (TSL) is also used for the security of
data and information in the virtual private network9.
TLS is providing security in end-to-end communication over a VPN. SSL and TLS are
each cryptographic protocols that offer authentication10.
Virtual Private Network (VPN) Report 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Report on Virtual Private Network 2022
|12
|2383
|26

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.
|14
|2762
|18

Types of VPN and Encryption Techniques
|13
|2690
|49

REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59

SSL/TLS VPN Technologies for Secure Network Connection
|8
|2000
|419