Virtual Private Networks: Security Benefits and Implementation Details

Verified

Added on  2023/06/16

|14
|762
|297
Presentation
AI Summary
This presentation provides an overview of Virtual Private Networks (VPNs) and their importance in enhancing network security. It discusses how VPNs extend private network connections, enabling secure remote access and protecting against unauthorized access and data breaches. The presentation highlights the benefits of VPNs, including improved security, privacy, and the ability to filter IP addresses. It also explores complementary components such as Hadoop, cloud computing, and Virtual LANs (VLANs) that, when used in conjunction with VPNs, further strengthen network security. Hadoop is presented as an extension for company communication, cloud computing as a method for secure data storage, and VLANs as a means of network segmentation. The presentation concludes that implementing VPNs alongside these components significantly improves network security and enables secure remote access.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Name, Student Id 1
Virtual Private Network (VPN)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Name, Student Id 2
Introduction
The concept of a
virtual private
network is
discussed in the
presentation.
Document Page
Name, Student Id 3
Virtual Private Network
A virtual private network is used to increase the range
of connection of a private network to enable the
users to access the network as a private network.
Document Page
Name, Student Id 4
Risks for not using VPN
Unauthorized user access
Data breach
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Name, Student Id 5
Contnd.
Harassing of users
Distrust of clients
Breach in security
Privacy is at risk
Document Page
Name, Student Id 6
Benefits while implementing a VPN
Security
Privacy
Remote access
Filtering of IP
Ease of access
Document Page
Name, Student Id 7
Benefits in remote access
Enhanced security
Better privacy
Less chance of data breach
Ease of access
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Name, Student Id 8
Components required
The various components required other than VPN
to make a network have more security are
Hadoop, VLAN and cloud computing
Document Page
Name, Student Id 9
Hadoop
Hadoop is used as an extension of the various
applications and software used by the
company for communication with the clients
and customers n the market.
Document Page
Name, Student Id 10
Cloud computing
The cloud computing is a technique of data
storage over the internet in a place known as
cloud.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Name, Student Id 11
Virtual- LAN
A virtual LAN is a process of dividing a network
in the network layer. LAN is a local area
network and the word virtual refers to the
integration of that network virtually.
Document Page
Name, Student Id 12
Conclusion
Thus, it can be concluded from the presentation that the use of VPN along with
the other components can help provide better security to the network and
help in providing remote access.
Document Page
Name, Student Id 13
References
BAHNASSE, A., & ELKAMOUN, N. (2015). Study and evaluation of the high availability of a Dynamic Multipoint
Virtual Private Network. Revue MéDiterranéEnne Des TéLéCommunications, 5(2).
Chung, C. J., Khatkar, P., Xing, T., Lee, J., & Huang, D. (2013). NICE: Network intrusion detection and
countermeasure selection in virtual network systems. IEEE transactions on dependable and secure
computing, 10(4), 198-211.
Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of
Electrical and Computer Engineering.
Holmes, A. (2012). Hadoop in practice. Manning Publications Co..
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing,
Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a
survey. IEEE Communications Magazine, 51(11), 24-31.
Liu, C. C., Stefanov, A., Hong, J., & Panciatici, P. (2012). Intruders in the grid. IEEE Power and Energy
magazine, 10(1), 58-66.
Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, L., Sridhar, T., ... & Wright, C. (2014). Virtual
extensible local area network (VXLAN): A framework for overlaying virtualized layer 2 networks over layer 3
networks(No. RFC 7348).
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in
cloud computing. IEEE transactions on Services Computing, 5(2), 220-232.
White, T. (2012). Hadoop: The definitive guide. " O'Reilly Media, Inc.".
White, T. (2012). Hadoop: The definitive guide. " O'Reilly Media, Inc.".
Yadav, S. (2015). Virtual Private Network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Name, Student Id 14
Thank you..
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]