Unformatted text preview:

Virtual Private NetworksWhat is a Virtual Private Network (VPN)?Types of VPNSecurity Risks of the VPNTechnologies in VPNVPN TunnelingVPN ReadsVirtual Private NetworksShamod LacoulCS265What is a Virtual Private Network (VPN)?A Virtual Private Network is an extension of a private network that encompasses links across shared or public networks like the Internet – VPN in Windows 2000: Overview by Microsoft.An encrypted or encapsulated communication process that transfers data from one point to another point securely; the security of that data is assured by robust encryption technology, and the data that flows passes through an open, unsecured, routed network. –Brown Steven, Implementing Virtual Private Networks.Types of VPNTrusted VPNSecure VPNHybrid VPNProvider-Provisioned VPNSecurity Risks of the VPNBasic Firewalls the sole use of firewalls does do no good to protect connections in a public area. Network Attacks denial of service attacks, address spoofing, session hijacking, man-in-the-middle attack, replay attack, and detection and clean up.Cryptographic Assaults Cipher text only attack, known plaintext attack, chosen plaintext attack, chosen cipher-text attack, brute force attack, password guessers and dictionary attacks and social engineering.Technologies in VPNFirewalls filter packets by examining IP addresses or ports requested on ingress or egress traffic. Encryption maintains the security of data in transit to be private in a public space.Authentication to finalize that the user trying to gain access to a private network is for real. TunnelingPoint-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP)IPSec Tunnel ModeVPN TunnelingPoint-To-Point Tunneling ProtocolLayer 2 Tunneling ProtocolIPSec Tunnel ModeVPN ReadsVirtual Private Networks, 2nd Edition Oreilly PublishersImplementing Virtual Private Networks, Brown


View Full Document

SJSU CS 265 - Virtual Private Networks

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Virtual Private Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Virtual Private Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Virtual Private Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?