Wednesday, January 8, 2020
Definition Of Security And Privacy - 2192 Words
NSR/AS Lab 3 ââ¬â VPNs, By Francesco Davoli Student ID: 7674872 Abstract Security and privacy is and always will be an important subject in regards to computing, weather its successfully securing clients data or protecting a personal network from would be hackers, the concepts of security and privacy will always be at the forefront of any individualââ¬â¢s mind. Due to the constant need for more security as well as privacy the concept of a VPN or Virtual Privet Network was introduced and implemented. This report will first go into detail on what a VPN actually is, how VPNS work, what their capabilities are and how they can be implemented into an organisations security policy. The report will later detail what IPsec is and IPsec tunnelsâ⬠¦show more contentâ⬠¦Universities such as Swinburne have their own custom VPN available to students which allows them to connect to the campus from anywhere around the world. When a user wishes to gain access to a VPN, they must first be authenticated (usually via a username and or password, commonly on a downloadable client). Upon accessing the VPN, the user is often issued a randomised token is issued, the token is used as a personal identification number that the user must enter. VPN characteristics and capabilities ââ¬â There are various different characteristics and capabilities attributed to the two major types of VPNââ¬â¢s. These are Remote Access type VPNââ¬â¢s and Site-to-Site VPNââ¬â¢s. Remote Access type VPNââ¬â¢s typically use public infrastructure (Primarily the Internet) in order to allow users to remotely and securely connect to the organisations network. The user will often have to download and install a client VPN on their system in order to connect to the VPN. The client will act as a gateway to the network and is also used as a means of authentication for the user by forcing the user to create an account with a unique username and password. One they have access the client will create a link back to the userââ¬â¢s system that will allow it to access the host network resources as if they were accessing the hosts system locally. Typically, a Remote Access style of VPN will rely on SLL or IPsec to create a secure connection, however when this is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.