Virtual Private NetworksWhat is a Virtual Private Network (VPN)?Types of VPNSecurity Risks of the VPNTechnologies in VPNVPN TunnelingVPN ReadsVirtual Private NetworksShamod LacoulCS265What is a Virtual Private Network (VPN)?A Virtual Private Network is an extension of a private network that encompasses links across shared or public networks like the Internet – VPN in Windows 2000: Overview by Microsoft.An encrypted or encapsulated communication process that transfers data from one point to another point securely; the security of that data is assured by robust encryption technology, and the data that flows passes through an open, unsecured, routed network. –Brown Steven, Implementing Virtual Private Networks.Types of VPNTrusted VPNSecure VPNHybrid VPNProvider-Provisioned VPNSecurity Risks of the VPNBasic Firewalls the sole use of firewalls does do no good to protect connections in a public area. Network Attacks denial of service attacks, address spoofing, session hijacking, man-in-the-middle attack, replay attack, and detection and clean up.Cryptographic Assaults Cipher text only attack, known plaintext attack, chosen plaintext attack, chosen cipher-text attack, brute force attack, password guessers and dictionary attacks and social engineering.Technologies in VPNFirewalls filter packets by examining IP addresses or ports requested on ingress or egress traffic. Encryption maintains the security of data in transit to be private in a public space.Authentication to finalize that the user trying to gain access to a private network is for real. TunnelingPoint-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP)IPSec Tunnel ModeVPN TunnelingPoint-To-Point Tunneling ProtocolLayer 2 Tunneling ProtocolIPSec Tunnel ModeVPN ReadsVirtual Private Networks, 2nd Edition Oreilly PublishersImplementing Virtual Private Networks, Brown
View Full Document