Analysis of VPN Technologies and Security Issues - MN610 Assignment 1

Verified

Added on  2023/06/01

|8
|472
|400
Report
AI Summary
This report provides an analysis of Virtual Private Network (VPN) technologies, highlighting their significance in contemporary organizations while also addressing security concerns. It discusses the limitations of legacy VPNs, such as lack of reliability, slower speeds, and security vulnerabilities. The report further explores solutions to these limitations, including the use of P2P servers, double VPN technology, SSTP protocols, and Tor technology. It concludes that while legacy VPNs have drawbacks, these can be mitigated with the presented solutions, and future VPNs will focus on multi-factor authentication, automation, advanced firewalls, and enhanced security measures. Desklib offers a range of resources, including solved assignments and past papers, for students studying VPN technologies and network security.
Document Page
VPN Replacement
Technologies
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Virtual private network is the extension of shared or public
network and it acts as a tunnel for exchanging data
securely.
VPN helps to provide security and privacy to the data that
is to be exchanged [2].
It helps in avoiding censorship blocks and masks the IP
addresses.
VPN even helps in hiding the physical location and
encrypting data between the computer and respective
server.
Another feature of this technology is that it does not log
the browsing activities.
VPN also allows the users in accessing the various
streaming services.
Introduction
Document Page
Lack of Reliability: The first issue that is
faced in the legacy virtual private network
is that there is lack of reliability [1].
Lesser Speed: The next limitation of
legacy VPN is the less speed of this
technology.
Lack of Security: Data is often lost in this
technology and hence there is lack of
security.
Limitations of Legacy VPN
Document Page
Use of P2P Servers: These servers
remove the issues related to users’ ISP.
Use of Double VPN Technology: This
technology allows the users to browse
anonymously after connecting to VPN
servers.
Use of SSTP protocols: SSTP and stealth
VPN protocol provide security to the data
[2].
Use of Tor Technology: The combination
of VPN and Tor removes the complexity of
ISP security.
Solutions to the
Limitations
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Therefore, conclusion could be drawn that
The technology virtual private network is
properly utilized in the corporate
environments. This legacy VPN has some of
the major limitations like security or reliability
and data could be lost. However, with the
help of some solutions, these limitations
could be resolved easily.
Conclusion
Document Page
Future VPNs will focus on the multifactor
authentication for users and devices.
The functions would become completely
automated and thus execution would be
easier.
VPN would be extremely advanced and
there would be in-built firewalls, thus
stopping the security issues.
Future Works
Document Page
[1] Chung, Chun-Jen, Pankaj Khatkar, Tianyi
Xing, Jeongkeun Lee, and Dijiang Huang. "NICE:
Network intrusion detection and countermeasure
selection in virtual network systems." IEEE
transactions on dependable and secure
computing 10, no. 4 (2013): 198-211.
[2] Gong, Li-Hua, Ye Liu, and Nan-Run Zhou.
"Novel quantum virtual private network scheme
for PON via quantum secure direct
communication." International Journal of
Theoretical Physics 52, no. 9 (2013): 3260-3268.
References
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]