This presentation discusses the concept of Virtual Private Network (VPN) and its benefits for security and remote access. It also highlights the risks of not using VPN and the components required for better network security such as Hadoop, VLAN, and cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Name, Student Id1 Virtual Private Network (VPN)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Name, Student Id2 Introduction The concept of a virtual private network is discussed in the presentation.
Name, Student Id3 Virtual Private Network A virtual private network is used to increase the range of connection of a private network to enable the users to access the network as a private network.
Name, Student Id4 Risks for not using VPN •Unauthorized user access •Data breach
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Name, Student Id8 Components required The various components required other than VPN to make a network have more security are Hadoop, VLAN and cloud computing
Name, Student Id9 Hadoop Hadoop is used as an extension of the various applications and software used by the company for communication with the clients and customers n the market.
Name, Student Id10 Cloud computing The cloud computing is a technique of data storage over the internet in a place known as cloud.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Name, Student Id11 Virtual- LAN A virtual LAN is a process of dividing a network in the network layer. LAN is a local area network and the word virtual refers to the integration of that network virtually.
Name, Student Id12 Conclusion Thus, it can be concluded from the presentation that the use of VPN along with the other components can help provide better security to the network and help in providing remote access.
Name, Student Id13 References •BAHNASSE, A., & ELKAMOUN, N. (2015). Study and evaluation of the high availability of a Dynamic Multipoint Virtual Private Network.Revue MéDiterranéEnne Des TéLéCommunications,5(2). •Chung, C. J., Khatkar, P., Xing, T., Lee, J., & Huang, D. (2013). NICE: Network intrusion detection and countermeasure selection in virtual network systems.IEEE transactions on dependable and secure computing,10(4), 198-211. •Daya, B. (2013). Network security: History, importance, and future.University of Florida Department of Electrical and Computer Engineering. •Holmes, A. (2012).Hadoop in practice. Manning Publications Co.. •Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. •Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey.IEEE Communications Magazine,51(11), 24-31. •Liu, C. C., Stefanov, A., Hong, J., & Panciatici, P. (2012). Intruders in the grid.IEEE Power and Energy magazine,10(1), 58-66. •Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, L., Sridhar, T., ... & Wright, C. (2014).Virtual extensible local area network (VXLAN): A framework for overlaying virtualized layer 2 networks over layer 3 networks(No. RFC 7348). •Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing.IEEE transactions on Services Computing,5(2), 220-232. •White, T. (2012).Hadoop: The definitive guide. " O'Reilly Media, Inc.". •White, T. (2012).Hadoop: The definitive guide. " O'Reilly Media, Inc.". •Yadav, S. (2015). Virtual Private Network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.