logo

VPN Applications and Significance

   

Added on  2023-06-15

8 Pages1128 Words307 Views
VPN APPLICATIONS AND
SIGNIFICANCE
VPN Applications and Significance_1
TABLE OF CONTENT
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
TASK 3............................................................................................................................................3
Three possible mechanism...........................................................................................................3
TASK 4............................................................................................................................................4
a) Comparison between the authentication header (AH) and encapsulating security payload
(ESP) protocols............................................................................................................................4
TASK 5............................................................................................................................................4
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................8
VPN Applications and Significance_2
INTRODUCTION
Virtual private network is the encrypted network which is connected with the internet
through a device or object to network (Zhang, 2018). It is mainly used for remotely accessing
the private network. This report will carry out the three mechanism for VPN working along with
the authentication header and encapsulating security payload. It further explains the VPN tunnel
modes, and components for phase 2 IKEv1.
MAIN BODY
TASK 3
Three possible mechanism
VPN secure the privacy of the user by encrypting the computer traffic of the user's
system and then routed this traffic from an unidentified router. It means that only user and server
is able to decrypt the traffic that makes a VPN a private network.
Secure encryption: AES encryption is important as it helps to secure the data, without
encryption key it is impossible to access or read the data. Computer system will take millions of
years in order to decrypt data if there is no encrypted key.
Secure transferring of data: To access the network, VPN is important as it directly connects to
the private servers and enables the encryption method in order to avoid any risk for data transfer.
Encrypting protocol: IPSEC collection of the protocols that enables the private connectivity
between the two points, as it makes the VPN secure network which ensures the user's data
privacy (Karaymeh and et.al 2019).
VPN Applications and Significance_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security in Cryptography | Assignment
|7
|1502
|13

VPN Network Design for SME - Network and VPN Services
|15
|1015
|292

Types of VPN and Encryption Techniques
|13
|2690
|49

Assignment on Virtual Private Network
|9
|2285
|38

Network Infrastructure Component 2022 Report
|10
|2182
|17

VPN Security Issues - CSC332 - Case Study
|8
|3117
|62