University Assignment: Analysis of VPN Technology and Security

Verified

Added on  2021/05/31

|9
|3521
|128
Report
AI Summary
This report provides a comprehensive literature review on VPN technology and security. It explores the evolution and global acceptance of VPNs, emphasizing data security and the prevention of data piracy. The report examines the advantages and disadvantages of VPN technology, including remote access, internet VPNs, and extranet VPNs, while also addressing security issues such as firewall vulnerabilities. The discussion highlights the importance of data encapsulation and the role of firewalls in securing data transmission. The report concludes with recommendations for enhancing VPN technology and security, focusing on the protection of data from unauthorized access and improving the performance of data transactions. The report is a valuable resource for understanding the complexities of VPNs and their impact on network security.
Document Page
Running Head: VPN TECHNLOGY AND SECURITY
VPN Technology and Security
Name of the Student
Nam of the University
Authors note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1VPN TECHNOLOGY AND SECURITY
Title: The title of the assignment that is
taken under consideration is VPN
technology and security
Abstract
The evolvement of the VPN technology has
been growing in a very fast rate. This
ensures the fact that the global acceptance of
the VPN technology in the field of the
security. This is due to the fact that the data
that has been flowing is secured with the
processing of the prevention of the data
piracy in terms of the security. The
employees consider the fact of establishing
the connection between the employees of the
organization who has been trying to interact
with the other employees of the
organization. Virtual Private Networking is
the best automated networking technique
that ensures the factor that deals with the
communication sector of the organization
that is intra organization in nature. This
technology is used to ensure the fact that the
communication bridge is maintained during
the processing of the communication among
the partners of the business, which has been
staying apart but want to proceed with their
business proceedings. This report will
provide the literature review on the topic of
VPN technology and security. This report
will also discuss about the security issues of
the technology. This report will further
discuss about the advantages and
disadvantages of the VPN technology and
security. This report will also provide the
recommendation for the processing of the
VPN technology and security.
Introduction
Virtual Private Network has been acting as a
process that ensures the fact that the
communication of data among the
individuals of an organization is maintained
and the processing is corresponded with the
methodology of the processing of the
communication. this fact enables the
employees of the organizations to stay in
touch with each other. This technology has
also proven to be beneficial for the purpose
of the circulation of the rules and norms that
are stated by the higher authorities of the
organization. This helps the functioning of
the networking system of the
communication. Despite all the advantages
that Virtual Private Network provides, the
security of the networking system is at stake.
This is the terminology that is usurped that
ensures the fact that the channel through
which the information regarding the data
transaction of the data through the channel.
Instead of using dedicated connections, the
data related to the channel is secured as the
Virtual Private Network ensures the fact that
the ports of the system is well protected and
the only barrier it faces is that from the
physical barrier of the information system.
to avoid this kind of security issues the
major terminology is provide secured data
transmission and receiving the same in an
unaltered way. This technology ensures the
fact that the combination of the technology
regarding the communication and the
security ensures the fact that the data
transaction processed is very beneficial for
the purpose of serving of the projection of
the intra communication organization. The
methodology of tunneling is used for the
transaction of data from the ports of the
organization. This takes into consideration
the probation of the data is conducted by the
terminology of transacting the data in the
Document Page
2VPN TECHNOLOGY AND SECURITY
mode of pocketing f the data in small
pouches and sending the pouches. The
tunneling of the protocol of the data
transmission is either performed by the
methodology of Open System Connection
protocol or by the methodology of the
Layer 2 or Layer 3 networking layer. This
ensures the fact that the data is transacted
efficiently. This ensures the fact that the data
that is transacted by the means of
encapsulation of the data. The encapsulate
data is put in the packet that acts as the
carrier for the information. This ensures the
fact that the data that b is to be transacted
from the either end of networking system.
Either of the tunnel end secures the fact that
end points are usurped with the
decapsulation. This encapsulation ensures
the fact that the data that is being transacted
is encapsulated in the terminology of the
data that is transacted by the means of
packets. The major reason of encapsulation
of the data in the packet is that the data that
is being transacted leads to the fact that the
security of the data inside the packet is at
stake. To avoid this terminology the major
prospect that is undertaken is the
methodology of encapsulating the project.
the term topology of encapsulation ensures
the fact that that that is travelling through
the processing of the packeting of thing the
same through the data and transaction.
Literature Review
VPN TECHNOLOGY AND SECURITY
According to [1], The fact that the
framework that is being transacted with the
proceedings of the data through the
channeling technology includes the fact that
the data will be protected in the channel with
the help of the usage of the firewall. This
happens to be the best security of the data
that ensures the fact that the processing of
the VPN technology is inspired by the
processing of the firewall installation that
will protect the Virtual Packet Networking
system from the access of unauthorized
access of the imposters. According to [3],
The secondary data transaction also includes
the fact that the emergence of data includes
the fact that the security of ted at must be
provided from both the hardware and
software prospect. This will ensure the fact
that the data is protected in case of the
equipped data protection. This also a main
reason behind the processing of the be the
major risks. The hardware based on the
network through put depends on the
functioning of the performance of the
hardware which increases the reliability of
the data transmission. This fact ensures that
the data that is incurred through the channel
of the data.
VPN Deployment for security purpose
Remote access
According to [2], Remote Access
methodology is used for the purpose of the
transacting the data which will ensure the
fact that connection and communication
between the locality is taken under
consideration. The local connection range
includes that of the communication among
the people of same house or same business
organization. According to [4] This factor
also takes not consideration of the fact that
the data that is to be transacted is well
secured and the connectivity is protected
Document Page
3VPN TECHNOLOGY AND SECURITY
with the help of the encryption
methodology. Hence the data that is
transacted is secured and the data processing
is done through the firewall that is installed
in the server of the organization or the
locality.
Internet VPN
According to [3], Virtual Network Planning
is taken into the consideration of the
location of duty setting of the server is fixed
and more than one server is connected to the
point as the data that is being transferred
consists of the proceeding that ensures the
fact that the data that is being transacted is
through the methodology of the single
private network. In this networking system
the data is transacted between the channel
that are connected within the same port and
the system is interconnecting in nature. This
aspect includes the fact that the data that are
to be transacted is distributed through all the
servers that are connected to the central hub.
This process concludes that the data
transferring of the process includes the fact
that the medium through which the data is
passing must be robust in nature. According
to [5], This aspect ensures the fact that the
encryption of the data must be done in order
to send the data successfully. This will
ensure the fact that the data that is sent is
free from any insecurity and privacy issues.
The methodology of installing the firewall
also ensures the terminology regarding the
terminal of the data transmission. These
instances of data transmission by following
the data transmission are that the security is
maintained in the processing of the data
transaction.
Extranet VPN
According to [6], Extranet is the
methodology that includes the fact that the
data that is being transacted in the
processing of the data. This ensures the fact
that the data that is transferred is protected
with the processing of the transaction in the
medium. This ensures the fact that
technically ensures the fact that the data
transaction of the data in a shared
environment is protected by the means of
encapsulation of the data by the means of
channel transaction. This factor enables the
terminology that ensures the fact that the
processing of the data is completely free
from the unauthorized access.
WAN replacement
According to [2], In case of WAN
replacement the major issue is that the data
that is being transacted is due to the fact that
the protection of the data acts to be the data
that is to be transferred is protected from the
unauthorized data access of the share data.
This will ensure the fact that the data that is
being transferred requires the processing of
the data by setting passwords to stoop the
access to the data and prevent the access of
unauthorized personnel. This will enable the
fact that the data is transmitted to the
location without any barrier in terms of
physical and virtual aesthetics.
Discussion
This ensures the fact that the cyber criminals
can access the data that has been transmitted
in order to get unauthorized access fact to
the data that is being transacted [4]. This
procedure proves the importance and the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4VPN TECHNOLOGY AND SECURITY
reason of the emergence of the technology
of encapsulation, which causes the fact that,
the data is secured and the privacy of the
data is maintained in the framework that is
based on the platform of the Virtual Private
Network. This fact takes into account the
fact that the security of the data that is being
transferred is not taken into consideration
the fact that the framework of the channel
must be robust in nature. This aspect
includes the fact that the data that is
processed by the terminology of the
procession of the data will ensure the fact
that the security of the data that is to be
transferred is maintained. The prosecution of
the security of the data includes the factor
that the data is not accessed in an
unauthorized manner. This ensures the fact
that the performance of the data transaction
is improved. This aspect makes sure that the
data that is transacted which deals with the
security is enabled with the aspect of the
data security of the data procession. The
most beneficial aspect of the datacenter is
that the data that is transacted through the
channel of the Virtual Private Networking
[8]. This enables the fact that the data that
are being transacted through the channel is
very flexible in nature this aspect ensures
the fact that the channel of the data can be
connected with the firewall. This will ensure
the fact that the processing of the data is
secured and the unauthenticated access to
the data is not taken into consideration due
to the robustness of the channeling of the
system. The major issues that are faced
during the processing of the security of the
data are namely: -
ï‚· Firewall- the installation of the
firewall includes the factor that the
data that are stored in the database of
the framework of the system. The
firewall also ensures the fact that the
transaction of data that is also safe
and there is no unauthorized access
of the data. This fact will ensure that
fact that the data that is being
transacted reaches the probation of
the data security. This will ensure the
fact that the port of the data centered
is protected by the means of the
installed firewall. Despite the
protection the firewall provide from
the access of the unauthorized users
are not completely manifested. This
fact ensures the cyber criminals
already trace the fact that the loop
holes of the firewall and this aspect
is taken into consideration for
attacking the networking system
[10]. This fact enables increase in the
popularity of the newly arrived
antivirus and anti malware software.
These software are high end software
with the progression of the data
center which releases the
terminology of the data protection
that is present in the channel of the
data transaction. The level of
security provided by the firewall is
comparatively lower that the
projection of the intensity of attack
made by the cyber criminal.
ï‚· Encryption- the term encryption
means that the data that is transferred
by the means of the channels of the
data centre by means of ports that are
connected in both the ends of the
channels are encrypted in order to
protect the data from unauthenticated
access. The data using the VPN also
Document Page
5VPN TECHNOLOGY AND SECURITY
uses the terminology of encryption to
keep the data protected. The
mechanism that encrypting uses is
the fact that the data that is to be
transacted from the transmitting port
is coated with another language of
codes which makes the data illegible
in nature [11]. In case there is an
unauthenticated trial of access to the
data of the data centre. This fact
ensures that the VPN technology and
security of the data analysis. This
will ensure the fact that the data that
is encrypted from the transmitting
end will get decrypted in the
receiving end, this will ensure the
fact that data will be get restored in
the raw form of the system. This
ensures the fact that the security of
the data will get restored. Despite the
usage of the terminology of
encryption the cyber criminals gets
access to the data of the system. This
process ensures the fact that
encryption of the data that is made
with the help of a unique coding
language can be decoded by the
imposers. In that case the data can be
stolen in midst the channel of the
transacting system. This ensures that
the imposter can decode the coding
language which is used for the
processing of the individuals. This
will ensure the fact that the security
of the data during the transportation
of the data is at stake [7]. This
contradiction enacts as the only issue
in opting for the methodology of the
encryption technique in the VPN
technology and security.
ï‚· Authentication- authentication acts
to be the major problem in the
proclaiming the data and protecting
the same from the same from the
data from the imposters. This enacts
the procedure of kcraeating real life
portals. This factor also uses the
activation of the password for
protecting the networking system
from the analyzing of the data. This
ensures the fact that the data that has
been growing in emergence will lead
to the affect that the approach the
data without proper authentication.
This will ensure the fact that the data
that is being sent through the channel
is secured [12]. The channel that is
being used for the sending are
secured with strong passwords.
Despite this aspect the data that is
being transmitted can be accessed as
the data will be accessed with the
processing of the cyber criminal
which will lead to the fact that the
cyber criminal will crack the code
prepared by the datacenter.
Conclusion
Therefore, from the above discussion
it can be concluded that the data that is
being treated as the source of transacted
variable needs protection from the cyber
criminals. The protection of the data will
ensure the fact that the prevention of the
data leaking ensures the fact that the
processing of the data is liable to the channel
of the Virtual Service Network. This ensures
the fact that the terminology ensures the
fact of proper addressing of the data centre
which will enable the projection of the data
Document Page
6VPN TECHNOLOGY AND SECURITY
and provide security and privacy to the
networking system of the Virtual Serving
Network. This technology has also proven to
be beneficial for the purpose of the
circulation of the rules and norms that are
stated by the higher authorities of the
organization. This helps the functioning of
the networking system of the
communication. This will ensure the fact
that data that is being transacted in the form
of packets are guided through the channel
with proper security of the data. Despite the
usage of several prevention techniques the
security of the data that is present in the
channel and is being transmitted is known to
the aspect that ensures the fact that the data
stays secured from all the imposters who are
trying to gain access to the data.
Future Work
The major processing enables the fact that
proceeding of the task is used for the
processing of the Virtual Network System.
This will ensure the fact that technology
plays an important role in the manufacturing
of the data communication system that will
enable the fact that the data gets transacted
in a more efficient way. The methodologies
will include: -
ï‚· Communication among the people
who stays far apart from each other
which will ensure the fact that the
data will pass through the WAN
system by making the framework of
the WAN system more robust which
will include the fact that the data
will transmission channel gets more
efficient which will allow the
channel of the virtual networking
channel to boost the data to a longer
distance
ï‚· Enabling the security of the channel
by ensuring the fact that there is a
three way transmission process
which will ensure the fact that the
data that is secured during the
transmission of the data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7VPN TECHNOLOGY AND SECURITY
Reference
1. Wang, Y., Wei, J. and Vangury, K.,
Bring your own device security
issues and challenges. In Consumer
Communications and Networking
Conference (CCNC), 2014 IEEE
11th (pp. 80-85). IEEE., 2014,
January.
2. Moses, V. and Korah, I. Lack of
security of networked medical
equipment in radiology. American
Journal of Roentgenology, 204(2),
pp.343-353, 2015
3. Kizza, J.M.,. Guide to computer
network security. Springer, 2017
4. Kumar, G.D., Singh, M.K. and
Jayanthi, M.K., 2016. Network
Security Attacks and
Countermeasures. IGI Global.
5. Coughlin, M., Keller, E. and
Wustrow, E., March. Trusted click:
overcoming security issues of NFV
in the cloud. In Proceedings of the
ACM International Workshop on
Security in Software Defined
Networks & Network Function
Virtualization (pp. 31-36). ACM.
6. McIlwraith, A., Information security
and employee behaviour: how to
reduce risk through employee
education, training and awareness.
Routledge.
7. Satapathy, A. and Livingston, L.J., A
Comprehensive Survey of Security
Issues and Defense Framework for
VoIP Cloud. Indian Journal of
Science and Technology, 9(6).
8. Hao, Q. and Shihong, Z. Accounting
Informationization Hierarchical Data
Safety and Prevention Based on
Cloud Computing Environment.
9. Roland, M.,. Security issues in
mobile NFC devices. Springer.
10. Chandrashekhar, A.M., Revapgol, J.
and Pattanashetti, V. Big Data
Security Issues in
Networking. International Journal of
Scientific Research in Science,
Engineering and Technology
(IJSRSET), 2(1).
11. Narula, S. and Jain, A.,. Cloud
computing security: Amazon web
service. In Advanced Computing &
Communication Technologies
(ACCT), 2015 Fifth International
Conference on (pp. 501-505). IEEE.,
2015, February
12. Kizza, J.M., 2017. Mobile systems
and their intractable social, ethical
and security issues. In Ethical and
Social Issues in the Information
Age (pp. 321-338). Springer, Cham.
13. Gaikwad, M.V.P., 2016. A Review
On Security Issues In Cloud
Computing. International Journal Of
Engineering And Computer
Science, 5(2).
14. McIlwraith, A., Information security
and employee behaviour: how to
reduce risk through employee
education, training and awareness.
Routledge
15. Hao, Q. and Shihong, Z. Accounting
Informationization Hierarchical Data
Safety and Prevention Based on
Cloud Computing Environment
Document Page
8VPN TECHNOLOGY AND SECURITY
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]