Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Abstract of VPNs security

Category: Computer Sciences Paper Type: Dissertation & Thesis Writing Reference: IEEE Words: 1200

The research study is focused on the security perspective of the VPNs. VPN means the virtual private network. This is a security technology that provides safety to the network and develops an encrypted connection. A VPN protocol is a design to provide better security on the public network related to its data and information. The research study is conducted by using qualitative research methods under the secondary source data collection. The observation is used for conduction this study in which the studies of the several authors have been observed in this study from which ten studies are particularly critically analyzed that are mostly related to the VPNs security. The publications that are used in this study are not older than in 2015. Most of the studies are and provide the latest comments for VPNs security. Several tools are critically analyzed in this study for ensuring the security protocols of the VPNs. These tools are referred to as a good strategy for analyzing the security perspectives of the VPNs.     

1.      Introduction of VPNs security

First of all, we have to know about information security and its aspects. To prevent, detect, documents and other threats, a set of strategies are going to utilize for managing the policies, tools and processes is known as information security. The main responsibilities of the information security are to develop a process for the business that protects all the asset of information of the business in any type of condition. [1]

 The information securities have a major concern about the confidentiality, integrity and availability of the business data and IT system. Information security is using different tools to maintain the security of a high level. These tools include wireless security tools, web applications and VPN. VPN means the virtual private network. This is a security technology that provides safety to the network and develops an encrypted connection. by using a public network named internet the virtual private network provide a way to extend the private network. To establish a secure connection, it makes use of tunnelling protocols.

It is a form of technology that provides the network securely and remotely with the help of internet. So the data should be protected from any kind of data loss or damage in case of any illegal access on the network. [2]

Between 2 parties or 2 VPN gateways, the VPN connection is going to develop with the secured virtual tunnel to develop with a data encryption capability, data integrity establish and also make sure that communication only occurs between two parties that are authentic and have legal access to the data. 

During travelling or at home, this provides secure access to the computer network by using the internet This is also known as remote access to the information but provide more benefits as compared to remote access.

1.1.Problem statement of VPNs security

Normally the private networks are not usable with the help of any public network or internet because firewall protects the network and block all the illegal or unrequested traffic to maintain the security of the network. Different technology is going to use to get the remote access a private network with the help of internet. This technology is a virtual private network.

To encrypt the data for sent the information through the public network. The virtual private network uses a tunnelling protocol. With dial-up networking protocol, we may use the dial in directly to utilize the private network. But the major issue with that protocol is charges are going to increase when the distance is increased so it is very cost-effective. A dedicated WAN is also utilizing for making a remote connection in two locations. But over time, the usage of internet is going to increase and the internet gets access by using the internet service provider in the VPN to ensure safe and secure communication among different devices. [3]

The VPN combines the scope of WAN and internet and provide easy access to a network without any restriction of location or distances. A VPN protocol is a design to provide better security on the public network related to its data and information. With many factors, the security may determine like data origin authentication, replay protection, data integrity and data confidentiality. 

Data origin authentication means utilization of techniques related to authentication to make sure the receiving and transmission of data through the trusted person who acts as receiver and transmitter. Replay protection provides detail assurance that same data never sent multiple times. When this will happen when an attacker captures and send the data against by using the login information that can get access on a server.

VPN protocol makes sure that data never replay by using the sequencing technique. Data integrity means that digitally signed the data by making sure that data never change during transmission.

A hash value of data is going to use to determine instead of encrypting the data. The hash value of data never change in the long term and keep the data in its original position. On the public network, the data converted into such form that is unreadable for illegal assessors through the internet. So the VPN help to protect the data and its transmission by using the internet and provide assurance about the data security and its safe transmission.

1.2.Objective of VPNs security

The main objective of the virtual private network is to make the security of the data possible and effect on the public network and making the transmission of data more accurate and reliable among two or more parties. Traditional VPN connections need manually connectivity once they lost the first connection of VPN. When the VPN connection is lost then all operations are going stop and they start again when the lost connection is against connected. [4]

The feature of VPN reconnect allows the clients to reconnect the session of VPN which was disconnected in any case. VPN feature of reconnecting connect to a server of Window VPN with the IKEv2 protocol.

And it's the disconnection is very long then the manual connectivity should be established. For all those mobile clients who are moving to a different network, the VPN reconnect remove this need from one network to another to re-establish the connection of VPN. With different type of connections like broadband or dial-up required by the VPN to maintain the valid connection.

When the VPN connection is going to establish then first the internet is going to settle then between two customers the VPN tunnel is set and make the connectivity smoother. Over the VPN connection, all the data traffic may be sent. Through the VPN connection, the clear use of default gateway on the option of the remote network not route the internet traffic by using the advanced setting of TCP/IP.

So the main objective of a VPN connection to make the connectivity more effective and clear and also provide a secure path for data transmission and prevent illegal access of data and also maintain the security and its safety features by providing a secure path to transmit the data from one location to another  [5].

References of Abstract of VPNs security

[1]

S. Rahimi, "Quantitative Evaluation of Virtual Private Networks and its Implications for Communication Security in Industrial Protocols," vol. 1, no. 3, pp. 51-61, 2017.

[2]

M. Iqbal, "Analysis of Security Virtual Private Network (VPN) Using OpenVPN," vol. 8, no. 1, pp. 58-65, 2019.

[3]

M. C. NAWEJ, "EVALUATION OF VIRTUAL PRIVATE NETWORK IMPACT ON NETWORK PERFORMANCE," pp. 1-82, 2016.

[4]

M. Rost, "Beyond the Stars: Revisiting Virtual Cluster Embeddings," vol. 3, no. 45, pp. 1-19, 2019.

[5]

H. Alshaer, "An overview of network virtualization and cloud network as a service," vol. 25, no. 1, pp. 1-23, 2018.

 

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed