Preview

Itm 431 Module 2 Security Measures for the Cyberspace: Part Ii

Good Essays
Open Document
Open Document
735 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 431 Module 2 Security Measures for the Cyberspace: Part Ii
A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization 's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.
A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered" by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses [ (Rouse, 2007) ]. Plainly, a VPN is just a network of computers that are all connected securely despite the fact that they’re in different geographic locations, and could potentially be using different connection methods. The largest attraction to a VPN is all of the involved computers are afforded secure connection to one another. Another great benefit to a VPN is that all of the involved computers are effectively on the same network. Users can communicate as if they were right next to one another, plugged in to the same router. Additionally, the traffic to and from these machines is encrypted. Corporations and small businesses alike utilize VPNs to ensure safe, secure, and reliable connections for employees and anyone else requiring access to their information system. A VPN almost creates its own little universe, or even a “VIP only” party; only invited guests may enter. Each machine: computer, router, modem, filter, and server; has dedication means of transportation for information and communication. In



References: Capasso, M. G. (2008). AFI 33-200, Information (IA) Management. Air Force e-Publishing. Rouse, M. (2007, May). Virtual Private Network (VPN). Retrieved from Search Enterprise WAN: http://searchenterprisewan.techtarget.com/definition/virtual-private-network

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    1. One possibility for connecting two locations over a large distance is through the use of Virtual Private Networks over an Internet connection. Why is this type of network cost effective? What connectivity is required for both parties? Use your textbook and the Internet to research your…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A computer network connects two or more computers so employees can work together sharing data across computers. The infrastructure of the network would make data available to view in all departments. Dirt Bikes would to set up a wide area network (WAN) for the business to operate across global areas. The ability to communicate anywhere anytime would allow the company to respond immediately to customer needs, order processing, and part suppliers saving time and money by keeping up with current inventory. Connecting the WAN allows employees to send and receive important information from anywhere globally via PDAs or laptop devices and provide almost instant responses to management, customers, vendors and other areas where efficient and immediate communication is preferred such as monitoring global industry trends happening 24 hours a day, seven days a week.…

    • 1072 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    To Use or Not to Use a Database? That is the Question. (2013). Retrieved from http://www.htmlgoodies.com/primers/database/article.php/3478121/To-Use-or-Not-to-Use-a-Database-That-is-the-Question.htm…

    • 972 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    Private addresses are also commonly used in corporate networks, which for security reasons, are not connected directly to the Internet. Often a proxy, SOCKS gateway, or similar devices are used to provide restricted Internet access to network-internal…

    • 762 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You can also add the VPN settings to your connection that provides another encryption layer to your network as if anyone remain able to join the network needs hard time to gain access to…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    One Time password protection

    • 3022 Words
    • 13 Pages

    4. OTP Authentication to an OTP-protected Network via IPSec VPN Client over the ZyWALL USG ............ 20…

    • 3022 Words
    • 13 Pages
    Good Essays

Related Topics