logo

Virtual Private Network

Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.

6 Pages3751 Words56 Views
   

Added on  2023-01-04

About This Document

This article provides an overview of virtual private networks (VPNs), their importance, and the security risks associated with them. It discusses the history of VPNs, the challenges and problems faced by VPN networks, and proposed solutions. The article also includes a literature review on VPN security and highlights the opinions of other authors. It concludes by addressing the various security issues in VPN networks, such as logging, data breaches, user authentication, and virus/malware attacks.

Virtual Private Network

Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.

   Added on 2023-01-04

ShareRelated Documents
Virtual Private Network
Virtual Private Network_1
VIRTUAL PRIVATE NETWORK 1
Abstract
VPN is one of the best networks for sending and
receiving data over fewer security networks and it
also improves the performance networks. This type
of network used by many companies and business
industries in order to send data in an effective
manner. The major advantage of the virtual private
network is that it protects communication networks
and servers form unauthentic servers and reduce
the level of security risks. However, a virtual
private network is mainly utilized in the field of
corporate sectors for improving the overall
performance of wireless networks. It is observed
that such kind of wireless network allows
consumers for creating and implementing a secure
connection with another computer server. The
objective of this research is to analyse the concept
of a virtual private network and evaluate the
challenges and risks associated with the VPN
networks. The literature review focuses on virtual
private networks security and discusses the
opinions of other authors in order to improve the
effectiveness of the paper. This paper shows that
the security of VPN networks can be increased with
the help of encryption and authentic networks that
have the potential to control and manage risks and
threats faced by virtual private networks. In further
research, the researcher will improve the
effectiveness of the paper and suggest better
techniques for avoiding security threats and risks
occurred in VPN networks.
KeyWords: virtual private networks,
communication networks, encryption and
authentication
Introduction
The term VPN is defined as the virtual private
network which enables consumers to transfer and
receive data or information by using public
networks. It is one of the common types of the
network which is used in a communication system
for exchanging information from one network to
another. Security is a biggest concern in the IT
which impact on the user’s private details [1]. A
virtual private network is one of the best networks
that reduce the level of security threats and issues
by encrypting the data or information of users. The
aim of this research is to analyse the importance of
virtual private networks and critically review the
security risks linked with virtual private networks.
The major focuses of this study are to understand
the challenges and problems linked with virtual
private networks and address security-related issues
[2].
A recent study identified that virtual private
network generates a secure and private system over
a less secure network, for example, public internet.
The encryption is a very common technique used
by users during communication and virtual private
networks also encrypt the data files which cannot
be accessed by hackers without user’s permission.
Moreover, the security level and include encoding
also addresses the creating and getting networks.
This study will conduct a works appraisal to
analyse the opinions of authors and review the
results and findings of previous research studies. In
this modern era, the use of virtual private networks
are growing rapidly due to security benefits and it
is widely used in the business industries and
companies for exchanging information from one
place to another. This report is divided into several
sections for example; the history of virtual private
networks, the background of the study, literature
review, security issues linked with virtual private
networks and proposed solutions.
History of virtual private networks
The past of virtual private networks starts back in
1996 when employees of Microsoft developed the
peer to peer tunnelling network. In the year 1999,
the virtual private networks were launched and
used the concept of the virtual network in
companies [3]. Organizations required a secure and
private network in order to exchange data and VPN
networks helped them and improved the overall
security of the system. Vendors for example
checkpoint, cisco and other developed and
implemented virtual private networks for
improving the performance of communication
system. Today, this information technology is
considered as a standard feature which is widely
implemented throughout most organizations [4].
Point to point tunnel protocol is one of the best
virtual private networks that have the ability to
control and manage the communication system
used by companies and users. In last five years, the
use of virtual private networks has increased by
45% because of their high level of security and it
also maintains the gap between transmitter and
receiver system for improving the security of data
and information.
Virtual Private Network
Virtual Private Network_2
VIRTUAL PRIVATE NETWORK 2
Background of the study
A virtual private network is a kind of technique
which is used by users for creating a secure
network for communication and reduces the
problems and issues linked with the communication
networks. It is observed that a virtual private
network works by using the shared public network
and tunnelling network protocols. A recent study
identified that the term virtual private network is an
encrypted technique which is mainly used in the
field of communication for sharing data or
information over internet protocols. This type of
network can be used for accessing region restricted
servers and improving the overall efficiency of the
networks. moreover, such type of network devices
are used in the business industries for connecting
two or more devices with the other and exchange
data or information from one device to another.
When any consumer connects their devices with a
virtual private network then it provides a way to
control and monitor the overall communication
system in an effective manner.
The major concern with the virtual private network
is security issues which impact on the overall
performance of the system. There are various kinds
of security issues occurred in the field of virtual
private networks such as a denial of service attack,
ad-hoc, configuration conflict, phishing and so on.
Therefore, security-related issues occurred in VPN
networks can be maintained with the help of
several techniques such as softether VPN,
Microsoft direct access and encryption technique
[5]. Therefore, many consumers and companies are
focusing on the security and privacy of virtual
private networks but communication networks are
directly linked with the data breach and attacks
which also affect overall security systems. The
researchers suggested that firewall is another
security tool which can be used with virtual private
networks because it has the ability to control and
manage the traffic signals linked with the computer
servers and networks [6].
Literature review
Virtual private network security is one of the
common topics for research and there are many
authors provided their viewpoints on challenges
and issues faced by virtual private networks. This
section provides in-depth analysis of VPN
networks and highlights the security issues linked
with VPN servers.
According to Wang, Wei, and Vangury, (2014) the
virtual private network is a very advanced network
which can be used for sending data over a network
because it is cost effective technique rather than
other networks. From this paper, it is analysed that
virtual private networks improve the
communication process and provide a way for
reducing errors and issues which impact on the
performance of networks [7]. A remote access VPN
connection is developed with the help of wireless
networks which interconnect two or more devices
with each other. It is analysed that the virtual
private networks improve authentication of servers
and block the unwanted signals from
communication systems.
Xu, Huang, and Tsai, (2014) suggested that a VPN
network is produced by founding a point to point
joining by using devoted networks and traffic
encryptions. It is observed that the major
implementation of virtual private networks
involves major two techniques such as IPsec and
Open VPN. After analysing this paper it has found
that there are major two kinds of virtual private
networks used in the communication systems such
as remote access and site to site. A remote access
VPN technique is a very common network which is
mainly used in companies and business industries
for connecting two or more networks with each
other. However, site to site VPN is defined as the
connectivity system which provides
communication between two or more VPN
gateways.
According to Harfoushi, et al., (2014) the
fundamental concept of the virtual private network
is completely based on the MPLS which uses
isolation of routing and addresses the security risks
linked with networks. It is observed that VPN
networks are also linked with the security risks
because it uses internet connectivity for exchanging
information and hackers send traffic signals over
the VPN network using the internet. From this
paper, it is observed that attacker targeted on the
computer servers and routers in order to access data
and information of consumers. According to Bays,
et al., (2015) in virtual private networks, users are
directly linked with the internet and attackers
attacks on the IP addresses of user’s networks in
order to detect their data and information.
The authors argued that ad-hoc is one of the
common security issues occurred in the field of
virtual private networks and its impacts on the
user's peripheral devices such as mobile devices
and computer systems [8]. It is observed that the
virtual private network is more reliable and flexible
rather than other but it is also associated with data
breaching and security threats. Because of security
vulnerabilities, users may be lost their personal
information and it is increasing very fast because
many users use unauthentic servers and networks
along with the virtual private networks which
create data breach problems. In the last few years,
the problem of a data breach has increased by 44%
due to lack of security and many hackers targeted
Virtual Private Network_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Client Device and the Authentication Server
|6
|986
|60

VIRTUAL PRIVATE NETWORK.
|7
|405
|74

Virtual Private Network and Wireless Network Assignment
|10
|2990
|176

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Computer and Network Security | CN6107
|14
|4340
|48

Virtual Private Network: History, Challenges, Scope, and Future Research
|14
|701
|165