Analyzing the Impact of Virtual Private Networks on Businesses
VerifiedAdded on 2021/02/19
|10
|2647
|31
Report
AI Summary
This report examines the significance of Virtual Private Networks (VPNs) and their impact on company networks. It delves into the core concepts of VPNs, including their ability to establish secure, encrypted connections over public networks, such as the internet. The report explores the use of VPNs f...

Research Ethics
Committee
Committee
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
Research Ethics Committee........................................................................................................1
Topic : The significance impact of Virtual Private Network (VPN) On company network. .........1
DESCRIPTION ...............................................................................................................................1
REFERENCES................................................................................................................................3
Research Ethics Committee........................................................................................................1
Topic : The significance impact of Virtual Private Network (VPN) On company network. .........1
DESCRIPTION ...............................................................................................................................1
REFERENCES................................................................................................................................3

Topic : The significance impact of Virtual Private Network (VPN) On
company network.
DESCRIPTION
Virtual Private network that uses a public infrastructure to connect remote sites or users.
VPN is the new and significant technology which can be applied to LAN as well as to WLAN.
The main purpose of this new technology is to protect the confidential data through security
following the systematic procedure. VPN generally allows users to develop their own secure
connection with other computer networks. VPN can be very useful for the organizations which
works through the different network or sites. Like Instagram, Facebook, etc. It helps to save time
and expense for the companies who communicate to the clients from different locations. The
alternative resource of VPN is leased line which is less effective and expensive than VPN. The
disadvantage of Leased line is if they fails the communication between parties got failed and not
repair till some higher authorities can repair that line. VPN is the new modern version of network
which is very useful for the organizations as well as for consumers. In previously companies
only can use two private notworks Local Area Network (LAN) and Wide Area Network (WAN).
But now with the help of VPN they can communicate or deliver data anywhere and anytime with
high security measures. To secure the data and information of the company VPN overcome these
obstacles by using a strategy called tunneling.
In order to understand VPN it is important to to examine some mechanism which is
underlying like Tunnels and Firewalls and Proxy Servers (Elezi and Raufi, 2015). All such
mechanism considered the best practice for the study which underlying the effective
development growth for the organizations.
Tunnels Tunnel is the techniques which connects multiple network packet inside another
which is called Tunneled. It has been used to bridge the portion of the internet that gace disjoint
capabilities or policies. The method for encapsulation which is quite simple and very
authenticated. Compulsory Tunnels This is the another mechanism which is started by ISP
which is called Internet Service Provider. The client will dial into the ISP which recognize that
this connection should be tunneled.
Firewalls is the one of the significant set of hardware and software which manage the
control to the company network. However, this is benefited for the companies to access the
1
company network.
DESCRIPTION
Virtual Private network that uses a public infrastructure to connect remote sites or users.
VPN is the new and significant technology which can be applied to LAN as well as to WLAN.
The main purpose of this new technology is to protect the confidential data through security
following the systematic procedure. VPN generally allows users to develop their own secure
connection with other computer networks. VPN can be very useful for the organizations which
works through the different network or sites. Like Instagram, Facebook, etc. It helps to save time
and expense for the companies who communicate to the clients from different locations. The
alternative resource of VPN is leased line which is less effective and expensive than VPN. The
disadvantage of Leased line is if they fails the communication between parties got failed and not
repair till some higher authorities can repair that line. VPN is the new modern version of network
which is very useful for the organizations as well as for consumers. In previously companies
only can use two private notworks Local Area Network (LAN) and Wide Area Network (WAN).
But now with the help of VPN they can communicate or deliver data anywhere and anytime with
high security measures. To secure the data and information of the company VPN overcome these
obstacles by using a strategy called tunneling.
In order to understand VPN it is important to to examine some mechanism which is
underlying like Tunnels and Firewalls and Proxy Servers (Elezi and Raufi, 2015). All such
mechanism considered the best practice for the study which underlying the effective
development growth for the organizations.
Tunnels Tunnel is the techniques which connects multiple network packet inside another
which is called Tunneled. It has been used to bridge the portion of the internet that gace disjoint
capabilities or policies. The method for encapsulation which is quite simple and very
authenticated. Compulsory Tunnels This is the another mechanism which is started by ISP
which is called Internet Service Provider. The client will dial into the ISP which recognize that
this connection should be tunneled.
Firewalls is the one of the significant set of hardware and software which manage the
control to the company network. However, this is benefited for the companies to access the
1

public internet while preventing intruders from accessing the network from the internet.
Firewalls are of two kinds packet level and application level.
Likewise, the purpose of this study is to examine the importance of VPN on company
network (Jyothi and Reddy, 2018). So it has been identified that there are many reasons for
which company gain advantage like Security which is the vital reason to choose virtual private
networks. Second is mobility through business can share their resources with employees and
partners. Thirds and foremost reason is cost effective. VPN is very affordable for small
companies as well to maintained the secure network with client partners. On the same side, it
allows business to access data from long distance networks as well.
2
Firewalls are of two kinds packet level and application level.
Likewise, the purpose of this study is to examine the importance of VPN on company
network (Jyothi and Reddy, 2018). So it has been identified that there are many reasons for
which company gain advantage like Security which is the vital reason to choose virtual private
networks. Second is mobility through business can share their resources with employees and
partners. Thirds and foremost reason is cost effective. VPN is very affordable for small
companies as well to maintained the secure network with client partners. On the same side, it
allows business to access data from long distance networks as well.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INTRODUCTION
Background
A virtual private network is basically programming which used to have the safe creation,
encrypted connection upon a less secure networking, for example a public area network. The use
of VPN is there for tunnelling protocol for encryption of data at sending note of end and
receiving end decryption. It is also used to have the additional security along with origination
and receiving addresses which are already encrypted. VPNs are basically used for rendering
remote to corporate employees, workers who are performing the freelancing along with business
travellers who need the particular access to software application in the propitiatory network. As
to haver the access over the private network with help of VPN, there must be authorized user for
app which will have providence of authentication factor such as the password, token of security
or may be biometric data. VPNs has been used by the individuals often who want to have the
protection over the data transmission in their mobile devices or having the visitation over sites
which are geographically resticated. Private browsing and VPN should not be confused as it is
about having the secure access over the isolated network through mobile. The private browsing,
there is no involvement regarding the encryption, it is just simply about setting in optional
browser which have prevented identifiable user as cookies, from being collected along with
forwarded to the third party server.
The background have more have the significance such as the performance of the VPN is
being affected by the various factors which can the list of the speed of users havering internet
connection, types of the protocols that is being use by internet service providers along with
encryption type in the VPN uses. The company can be affected by the poor quality of service
which is outside the range of control organizational informational technology department. VPN
protocol have the assurance over the appropriation in level of security to be connected over the
system when their in underlying network infrastructure that cannot be provided lonely. There is
the availability of several protocols to have the usage of secure and encrypt users in the
corporatized data. The inclusion of several protocols are about the IP security system, secure
sockets layer along with transport layer security, point-to-point tunnelling protocol and the layer
2 tunnelling protocol.
In the corporate terms the VPN are al about the additional security for anyone who are
using the public area network such as the internet. They are using a wide varsity of network with
3
Background
A virtual private network is basically programming which used to have the safe creation,
encrypted connection upon a less secure networking, for example a public area network. The use
of VPN is there for tunnelling protocol for encryption of data at sending note of end and
receiving end decryption. It is also used to have the additional security along with origination
and receiving addresses which are already encrypted. VPNs are basically used for rendering
remote to corporate employees, workers who are performing the freelancing along with business
travellers who need the particular access to software application in the propitiatory network. As
to haver the access over the private network with help of VPN, there must be authorized user for
app which will have providence of authentication factor such as the password, token of security
or may be biometric data. VPNs has been used by the individuals often who want to have the
protection over the data transmission in their mobile devices or having the visitation over sites
which are geographically resticated. Private browsing and VPN should not be confused as it is
about having the secure access over the isolated network through mobile. The private browsing,
there is no involvement regarding the encryption, it is just simply about setting in optional
browser which have prevented identifiable user as cookies, from being collected along with
forwarded to the third party server.
The background have more have the significance such as the performance of the VPN is
being affected by the various factors which can the list of the speed of users havering internet
connection, types of the protocols that is being use by internet service providers along with
encryption type in the VPN uses. The company can be affected by the poor quality of service
which is outside the range of control organizational informational technology department. VPN
protocol have the assurance over the appropriation in level of security to be connected over the
system when their in underlying network infrastructure that cannot be provided lonely. There is
the availability of several protocols to have the usage of secure and encrypt users in the
corporatized data. The inclusion of several protocols are about the IP security system, secure
sockets layer along with transport layer security, point-to-point tunnelling protocol and the layer
2 tunnelling protocol.
In the corporate terms the VPN are al about the additional security for anyone who are
using the public area network such as the internet. They are using a wide varsity of network with
3

different security methods for example that is encryption which is able to provide safeguard to
any data which is transmitted across the network which are at risk in having the usage in
underlying public network infrastructure. There are often VPN employed when there is not in
practical use of any physical private network mainly due to financial reasons. A corporate
business have the embracment of mobile networking and the face the increasing pressure to have
protection over sensitive information as many were having the employment over virtual private
networks to have the improvement in networking security.
Aim
To study the significance impact of Virtual Private Network (VPN) on company network.
Objectives.
Rationale
VPN has been termed as the important part in the corporate business activity. The corporate
business are having the installation of various types of the protocol of the VPN in development
of business to have the security of data to have the assurance over the appropriation in level of
security to be connected over the system when their in underlying network infrastructure. This
developed a keen interest in having the research and gain the knowledge regarding the level of
various impact that is there on business in the global world. The topic is also turned in the
current scenario regarding the various issues and challenges faced by company in having proper
installation of different VPN protocols in the business activities.
Significance.
In the today's world scenario there is the importance regarding the use of VPN in the
corporate companies is all about as the companies have the usage in having collaboration without
having the worry in terms of security in storage a transferring of data. The company have the
main reason for the adaptation of VPN in company is bout having the security of data. As in the
corporate have the sensitive nature of data so it is vitally important to have the VPN in company.
This will help in analysis the impact of VPN in the corporate business along with the level of
necessity that is needed to be recognized to have the accessibility of business. There is the
importance of the VPN in business as it helps the employees in providing the company a
freelancing staff located in the different geographical locations. The VPN is used by the
4
any data which is transmitted across the network which are at risk in having the usage in
underlying public network infrastructure. There are often VPN employed when there is not in
practical use of any physical private network mainly due to financial reasons. A corporate
business have the embracment of mobile networking and the face the increasing pressure to have
protection over sensitive information as many were having the employment over virtual private
networks to have the improvement in networking security.
Aim
To study the significance impact of Virtual Private Network (VPN) on company network.
Objectives.
Rationale
VPN has been termed as the important part in the corporate business activity. The corporate
business are having the installation of various types of the protocol of the VPN in development
of business to have the security of data to have the assurance over the appropriation in level of
security to be connected over the system when their in underlying network infrastructure. This
developed a keen interest in having the research and gain the knowledge regarding the level of
various impact that is there on business in the global world. The topic is also turned in the
current scenario regarding the various issues and challenges faced by company in having proper
installation of different VPN protocols in the business activities.
Significance.
In the today's world scenario there is the importance regarding the use of VPN in the
corporate companies is all about as the companies have the usage in having collaboration without
having the worry in terms of security in storage a transferring of data. The company have the
main reason for the adaptation of VPN in company is bout having the security of data. As in the
corporate have the sensitive nature of data so it is vitally important to have the VPN in company.
This will help in analysis the impact of VPN in the corporate business along with the level of
necessity that is needed to be recognized to have the accessibility of business. There is the
importance of the VPN in business as it helps the employees in providing the company a
freelancing staff located in the different geographical locations. The VPN is used by the
4

company at the time when there is reduction in terms of infrastructure cost, there is high level of
increase in the security risk so that at the time the employees outside the office connections with
unsecure network the data of company can be secured. This will also help the analysing the
various situations long with type of network used by corporate area to have the better
installation of VPN in business.
Scope.
The scope of the project is about having the proper assessment of the business as the
impact of the VPN uses in the company to provide the need of the VPN on providing the security
of business data which are sensitive in nature, this also help the various researcher and scholars
along with various company to have the analysis over the impact of VPN on different business
activities. The company will be able to have the establishment of proper understanding regarding
the various ways in which the company can be impacted with the installation of VPN in the
business activities. The research will also help in gaining the knowledge regarding different
perspective of the company in terms of data security and the other challenges that company will
be facing in challenges in the data security along with prosperity and growth. The company can
be affected by the poor quality of service which is outside the range of control organizational
informational technology department. VPN protocol have the assurance over the appropriation in
level of security to be connected over the system when their in underlying network infrastructure
that cannot be provided lonely.
5
increase in the security risk so that at the time the employees outside the office connections with
unsecure network the data of company can be secured. This will also help the analysing the
various situations long with type of network used by corporate area to have the better
installation of VPN in business.
Scope.
The scope of the project is about having the proper assessment of the business as the
impact of the VPN uses in the company to provide the need of the VPN on providing the security
of business data which are sensitive in nature, this also help the various researcher and scholars
along with various company to have the analysis over the impact of VPN on different business
activities. The company will be able to have the establishment of proper understanding regarding
the various ways in which the company can be impacted with the installation of VPN in the
business activities. The research will also help in gaining the knowledge regarding different
perspective of the company in terms of data security and the other challenges that company will
be facing in challenges in the data security along with prosperity and growth. The company can
be affected by the poor quality of service which is outside the range of control organizational
informational technology department. VPN protocol have the assurance over the appropriation in
level of security to be connected over the system when their in underlying network infrastructure
that cannot be provided lonely.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TOPIC 2 VPN tunnels
The terms the VPN tunnels is basically about the establishment of the virtual pile. The
tunnel helps in having the establishment of the physical network transportation the major packet
the have the passing through the network. There is the presence having the 2 types of the tunnel
that is the permanent tunnel and the next one is about temporary one. A VPN is used as the
encapsulated tablets packs of the internet that is used in moving the data in this dynamically
created tunnels. This having the understanding the application of the VPN packs with routing
information. There is the variability of the two VPN protocols that is the L2TP and OPPTP
which is having the option discussing the compulsory tunnel and voluntary tunnels. There is the
advantage related to the voluntary tunnel in that the allows the consumers having the
simultaneously opening of secure tunnel and the having the access of other sites of internet.
These are used to have the providence of privacy along with the data integrity is being over the
scent source of web. On the other hand the compulsory tunnels have the offering of the Superior
level of access control. The better can be had the understanding related to employees in the
corporate organization have reached the company servers while providing them the prevention
to have the visitation to other sites. This also allows to have the connection at the multiple level
providing the single tunnel which have the reduction in bandwidth having requirement in
multiple session. There is the development of the two main protocols that is termed as the point-
to-point tunneling over the older point-to-point protocol. The layer 2 tunneling protocol has been
developed with the efforts of Cisco along with its 2 layers. These tunnels were later on taken
over by the Ipsec with is about having the additional security to IP networking.
The importance of the topic is regarding the analysis the impact of the VPN on the corporate
business development. These VPN technologies have been used to give the access to keep the
business more active, and making the data more secure. The topics have its own significance and
understanding related to the context of the company. The theses will have the performance so
that maximum amount of the impact can be proper accessed through the completion of research.
The following will be the structure formulation regarding the construction for the research. The
chapter one is about having the introductions of the topic with the formulation of aim and
objective along with rationale and the scope of the study. Ther next chapter will continue with
literature review and the research methodology. There will be discussion with the view of varsity
author for the proper understanding of the topic,. There will be usage of secondary analysis for
6
The terms the VPN tunnels is basically about the establishment of the virtual pile. The
tunnel helps in having the establishment of the physical network transportation the major packet
the have the passing through the network. There is the presence having the 2 types of the tunnel
that is the permanent tunnel and the next one is about temporary one. A VPN is used as the
encapsulated tablets packs of the internet that is used in moving the data in this dynamically
created tunnels. This having the understanding the application of the VPN packs with routing
information. There is the variability of the two VPN protocols that is the L2TP and OPPTP
which is having the option discussing the compulsory tunnel and voluntary tunnels. There is the
advantage related to the voluntary tunnel in that the allows the consumers having the
simultaneously opening of secure tunnel and the having the access of other sites of internet.
These are used to have the providence of privacy along with the data integrity is being over the
scent source of web. On the other hand the compulsory tunnels have the offering of the Superior
level of access control. The better can be had the understanding related to employees in the
corporate organization have reached the company servers while providing them the prevention
to have the visitation to other sites. This also allows to have the connection at the multiple level
providing the single tunnel which have the reduction in bandwidth having requirement in
multiple session. There is the development of the two main protocols that is termed as the point-
to-point tunneling over the older point-to-point protocol. The layer 2 tunneling protocol has been
developed with the efforts of Cisco along with its 2 layers. These tunnels were later on taken
over by the Ipsec with is about having the additional security to IP networking.
The importance of the topic is regarding the analysis the impact of the VPN on the corporate
business development. These VPN technologies have been used to give the access to keep the
business more active, and making the data more secure. The topics have its own significance and
understanding related to the context of the company. The theses will have the performance so
that maximum amount of the impact can be proper accessed through the completion of research.
The following will be the structure formulation regarding the construction for the research. The
chapter one is about having the introductions of the topic with the formulation of aim and
objective along with rationale and the scope of the study. Ther next chapter will continue with
literature review and the research methodology. There will be discussion with the view of varsity
author for the proper understanding of the topic,. There will be usage of secondary analysis for
6

the further discussion and last the file will be piled up with the conclusion regarding the impact
of the VPN tunnels in business.
Topic 3 IP Sec development
The original TCP/IP protocols don't have the inclusion of the inherent security features. The
users of ARPNET and the development of early internet were having the mostly used by the
academic and the research institution. There is the need for the development along with
subsequent form of the security in the reference form of internet. There is for the development of
the standard used by the subsequent volume of users that is eventually called as the development
in security standards, the before introductory of IP sec, there is the widespread issues that is
faced by the IP address spoofing along with integrity of data, authenticating and the having
confidentiality guaranteeing the information. For the further information the Ipsec which have
the mean which have the assurance of the authenticity along with integrity and the data
confidentiality at the layer of network with the layer of open system interconnection. More in
other words IP sec have the protocol is needed to be developed to have the assurance that is used
to have communication more have the security over network. There is the IP sec modes of
operation which can have the transport mode and the mode of tunnel. Whole having the
operation in the transport mode and the destination along with sources have to the responsibility
of performance the cryptographer operation. On the other hand whole pertaining through the
tunnels which are carted throughout the establishment gateway to gate way surety. The company
have the grater significance in analysis the impact as the research will be done in the following
way started with introduction then the literature review along with research methodology. The
secondary analysis will be used by the use of secondary resources to have the final discussion
regarding the impact of it one business, the file will be the analysing the various situations long
with type of network used by corporate area to have the better installation of VPN in business.
7
of the VPN tunnels in business.
Topic 3 IP Sec development
The original TCP/IP protocols don't have the inclusion of the inherent security features. The
users of ARPNET and the development of early internet were having the mostly used by the
academic and the research institution. There is the need for the development along with
subsequent form of the security in the reference form of internet. There is for the development of
the standard used by the subsequent volume of users that is eventually called as the development
in security standards, the before introductory of IP sec, there is the widespread issues that is
faced by the IP address spoofing along with integrity of data, authenticating and the having
confidentiality guaranteeing the information. For the further information the Ipsec which have
the mean which have the assurance of the authenticity along with integrity and the data
confidentiality at the layer of network with the layer of open system interconnection. More in
other words IP sec have the protocol is needed to be developed to have the assurance that is used
to have communication more have the security over network. There is the IP sec modes of
operation which can have the transport mode and the mode of tunnel. Whole having the
operation in the transport mode and the destination along with sources have to the responsibility
of performance the cryptographer operation. On the other hand whole pertaining through the
tunnels which are carted throughout the establishment gateway to gate way surety. The company
have the grater significance in analysis the impact as the research will be done in the following
way started with introduction then the literature review along with research methodology. The
secondary analysis will be used by the use of secondary resources to have the final discussion
regarding the impact of it one business, the file will be the analysing the various situations long
with type of network used by corporate area to have the better installation of VPN in business.
7

REFERENCES
Books& Journals
Elezi, M. and Raufi, B., 2015. Conception of Virtual Private Networks using IPsec suite of
protocols, comparative analysis of distributed database queries using different IPsec modes
of encryption. Procedia-Social and Behavioral Sciences. 195. pp.1938-1948.
Jyothi, K. K. and Reddy, B. I., 2018. Study on Virtual Private Network (VPN), VPN’s Protocols
And Security.
8
Books& Journals
Elezi, M. and Raufi, B., 2015. Conception of Virtual Private Networks using IPsec suite of
protocols, comparative analysis of distributed database queries using different IPsec modes
of encryption. Procedia-Social and Behavioral Sciences. 195. pp.1938-1948.
Jyothi, K. K. and Reddy, B. I., 2018. Study on Virtual Private Network (VPN), VPN’s Protocols
And Security.
8
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.