University Report: Virtual Private Network Article Review and Analysis

Verified

Added on  2022/12/09

|5
|1808
|448
Report
AI Summary
This report provides a comprehensive review of an article concerning Virtual Private Networks (VPNs). The paper delves into the essential role of VPNs in organizational security, highlighting their importance in protecting sensitive data. However, it critically examines the limitations of VPNs, including privacy concerns, scalability issues, bandwidth restrictions, and cost considerations. The report then explores alternative technologies like Microsoft DirectAccess and SoftEther VPN, comparing their functionalities and advantages over traditional VPNs. It emphasizes the benefits of DirectAccess, such as machine initiation, enhanced security, and cost-effectiveness. The analysis concludes by recommending the use of DirectAccess to mitigate the limitations of conventional VPNs and improve overall network efficiency and security. The report also suggests future research directions, including investigating DirectAccess limitations and exploring further technological solutions.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Virtual Private Network
ARTICLE REVIEW
ON
VIRTUAL PRIVATE NETWORK
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1VPN
Abstract
Considering the current industrial scenario it is
very important for the organization to have an
effective security protocol for their business
structure as it works with large set of data. The
leakage of those data may cause a significant
issues related to the service and reputation of
the organizational services. Followed by the
above aspects the application of VPN in the
organizational structure plays an important
role as it offers effective security service to the
organization. However, studies has proven that
there are several benefits of the application of
VPN, it has been also observed that there is
still some limitations present in the operations
of VPN which has been described in this
article. Thus, in order to effective analyse the
threat factors of the application VPN this
paper has fundamentally focused on the
drawbacks of VPN.
Introduction
Followed by the information security
aspect of the organizational data, it is highly
essential to provide the higher protection to the
organizational transaction as well as it is also
essential to provide effective solutions to have
a feature of data recovery in the organizational
field. The fundamental purpose of this paper is
to provide a thorough investigation on the
services of VPN as well as it will also analyse
the limitations present in the operations of
VPN while working in an organizational
structure. Followed by the above investigation
this study will also consist a brief investigation
on the mitigation process of the VPN threat
issues. Along with that the paper will also
cover a detail analysis on how other alternative
technologies can be utilized in order to
mitigate the problems caused by the
application of VPN. Lastly, it will conclude
with explaining how the application of the
suggested technologies are better than the
application of VPN.
Literature Review
According several studies it has been
observed that the implementation of the VPN
in the field of organization offers significant
facilities which helps the organization to
invoke their services as well as it helps to
protect the organizational information from
external threats. VPN stands for Virtual
Private Network which offers the organization
to work with an organizational authorized
network which allows the user to effectively
transact the information within the
organization of publically. The fundamental
purpose of this method is to provide protection
to the organization network as after utilizing
this method the users of the targeted network
will be able to only access the resources which
are connected with the organizational network
with proper authentication. In order to
maintain the security in the private network
this method has offered the authentication
process by certificates and passwords along
with the utilization of layered tunnelling
protocol has a significant role towards its
success. However, the implementation of VPN
has provided several advantages related to the
organizational services, various limitations has
been noticed in the working of VPN. From a
thorough analysis on the operations and
functionalities of VPN it has been determined
that there is a significant issue related to the
privacy of the user data, work efficiency, cost
as well as the limitations related to the
adoption of VPN for several devices. Thus,
this paper has fundamentally focused to
determine limitation of the VPN application.
Fig 1: Virtual Private Network
Main Body
Followed by the above aspects this
paper has continued with the investigation
with the operation of the VPN. The thorough
investigation has stated that the application of
Virtual Private Network carries several
limitation related to the privacy issues of the
user information as well as the customer
investigation. It stands to represent the
problem which stated that since, the
organization which utilizes the VPN for the
organization operation it has been observed
that the organizational information as well as
Document Page
2VPN
the customer information are handled by the
third party as well as the possibility of the
aspect of monitoring and analysis of the user
information also cannot be avoided. Followed
by the above aspects it also has the problem
related to the scalability of the Virtual Private
Network (VPN). The reason behind this
problem is that while the organization needs to
expand the services of the network it demands
a huge amount of money. Thus it can be stated
that the application of VPN in any large
organization costs high. Along with that the
issues related to the bandwidth of the VPN
also cannot be ignored as it restrict the
organization to limit their user as the more
user it take, less bandwidth the user will get.
However, while the organization has tried to
expand their bandwidth it has been observed
that it costs high. Followed by this analysis
can be stated that the application of limitations
which restricts to organization to expend their
services as well as it is highly expensive.
Considering the limitations of the VPN
services it is recommended to utilize the
Microsoft DirectAccess service. Microsoft
Direct Access is also provides remote access
facility which has been powered by the
Microsoft, which has especially designed for
the windows user. A thorough investigation of
the services of DirectAccess has stated that it
is more effective as well as more convenient
that the conventional Virtual Private Network
(VPN). While comparing the services of
conventional VPN and DirectAccess it has
been observed that the services of
DirectAccess offers the facility to initiate the
operations by the machine initiation whereas
the VPN process offers the client initiation
method. The machine initiation is more secure
than the client initiation process as the
machines are directly connected with the
management servers. Along with that it has
also stated that DirectAccess only provides the
services to the user if they are properly
certified by the organization. Apart from the
above aspects it has been also noticed that
rather than being a location based application
as the VPN, DirectAccess is not restricted to
any location which has a significant impact on
its performance. Along with the above aspects
the DirectAccess opt for information
encryption process by which there will be less
chance of data leakage as well as it offers to
restrict the analysis of the user information as
it violates the ethical issue of the
organizational services. Followed by the above
benefits the application of DirectAccess
reduce the overall organizational cost
compared to the conventional VPN. Hence, it
can be stated that the application of
DirectAccess in the organizational field can
reduce the organizational cost as well as it
invokes the work efficiency by expanding the
capacity of the organizational network
compared to the conventional Virtual Private
Network. Along with Microsoft DirectAccess,
SoftEther VPN also offers a sicure
communication protocol which fundamentally
based on the encryption procedure.
Fig 2: Microsoft DirectAccess.
Table 1: Comparison of VPN, Durrectaccess,
SoftEther VPN.
VPN
Microsoft
DirectAcce
ss
SoftEther
VPN
Complex
Connection
procedure.
Easy
Connection
procedure.
Easy
connection
Procedure
Restrict
Bandwidth.
Does not
restrict
bandwidth.
Dose not
restrict
bandwidth
expand while it
is essential.
Information
Security is
low.
High
Information
Security.
Moderate
Information
Security.
Expensive. Cost
Effective. Cost Effective.
Table 2: Features of the technologies.
Document Page
3VPN
Conclusion
The above has effectively discussed
the functionalities of the conventional process
as well as it has effectively discussed the
limitations of the conventional virtual private
network. Followed by this analysis this paper
has also explains about the possible impact of
those limitation in the industrial field which
may cause a significant damage to the
organizational structure. Along with that this
study has effectively described the
functionalities of the other remote network
access techniques which has provided a
suggestion to utilize the Microsoft
DirectAccess in the organizational field in
order to mitigate the observed limitation.
Lastly, this paper has summarizes that how the
application of DirectAccess can help the
organizations to address their desired
requirement. Thus it can be concluded that
however there are several benefits present in
the utilization of VPN, this study has
effectively discussed the limitations of the
present VPN service as well as the study has
effectively discussed and recommended the
possible technology which can mitigate the
occurred problem.
Future Scope
However, this paper has effectively
discussed the functionalities of DirectAccess
and how the application DirectAccess can help
the organizations to mitigate their problems
related to the information privacy issue and
work efficiency it has been noticed that this
study must further proceed by investigating the
limitation of DirectAccess as well as the what
other technologies can be used to get more
feasible solution. Along with in future the
research must be held on how the limitation
present in the conventional VPN system can
be mitigated with new modification on the
working of VPN.
VPN DirectAccess SoftEther
No log
policy,
DNS
server,
Integrated
switch.
Remote
accessibility,
less
expensive.
Remote
accessible, less
expensive
compared to
the VPN.
Extention of
Bandwidth.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4VPN
Reference:
M Almorsy , J Grundy , I Müller . An analysis
of the cloud computing security problem.
arXiv preprint arXiv:1609.01107. 2016.
PJ Gladstone, DA McGrew, inventors; Cisco
Technology Inc, assignee. Security for remote
access VPN. United States patent US
8,806,609. 2014 Aug.
J Hwang , C Jo , K Hur , J Lim, S Kim , J Lee .
Direct access to hierarchically porous
inorganic oxide materials with three-
dimensionally interconnected networks.
Journal of the American Chemical Society.
2014.
M Mohamed, M Abou-El-Seoud, A El-Feki. A
Survey of VPN Security Issues. International
Journal of Computer Science Issues (IJCSI).
2014.
J Oshins, inventor; Microsoft Technology
Licensing LLC, assignee. Direct memory
access filter for virtualized operating systems.
United States patent US 9,235,435. 2016.
T Sharma, R Yadav. Security in virtual private
network. Int J Innov Adv Comput Sci
(IJIACS). 2015.
F Volpe. Instant Microsoft Forefront UAG
mobile configuration starter. Packt Publishing
Ltd; 2013.
Y Yang, L Wu, G Yin, L Li, H Zhao. A
survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things
Journal. 2017 Oct;4(5):1250-8.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]