Assignment: Virtual Private Network (VPN)
Virtual Private Network (VPN)
What is VPN: The term virtual private
network (abbreviated VPN) describes any technology that can encapsulate and
transmit network data, typically Internet Protocol data, over another network.
Such a system enables users to access network resources that may otherwise be
inaccessible from the public internet. VPNs are frequently used in the
information technology sector to provide access to resources for users that are
not physically connected to an organization's network, such as telecommuting
workers. VPNs are so named because they may be used to provide virtual (as
opposed to physical) access to a private network. Introduction: Technology is
moving ahead fast and with moving technology, there are certain things which
need to be considered so that the data can be secured. Personal computers may
not require a high level of security but official computers do because there are
always people who are willing to go out of the way to hack the data. VPN, that
is, Virtual Private Network is a networking technology that allows professionals
from different part of the world to communicate securely with that of each
other. A VPN allows two types of advantages to the user; one is where the user
can enter the credentials and access a public network from anywhere they want or
secondly, the user can access the intranet of an organization from the office
location itself. If a college is present in two different states then they will
have a common network so that the data on the internet is available to all the
students and professors of both the locations. There is always a possibility
that the data on the college intranet gets hacked and hence, to stop the same,
VPN needs to be implemented so that the data is secure. The credentials of VPN
networks should be shared, by the owner of the network, with whom he trusts and
not just everybody. VPN and security: The virtual private network is the best
way by which one can secure their wireless network. The VPN will allow only
selected users to access the network; thus, the data can be accessed only by
people who are permitted. VPN forms a tunnel around the network so only people
who have the authority to access the data can enter the required credentials.
Even websites are protected by SSL and hence, most of the times, certain part of
the website request for a password and user ID thus, diverting the unwanted
user. VPN provides the below levels of security so that the network owner can be
rest assured that the data on his network is secured. The levels of security
provided by VPN are discussed below: –1. User Authentication – This level of
security allows only the permitted users to use the wireless network. The
authenticated users can access the data on the internet, send files from the
network and also receive files by using the network. 2. Encryption – This allows
additional security to the network. Even if someone tries to hack the network
then that isn’t possible without extra efforts and time. The encryption comes
into picture when the transmissions are being decoded. 3. Data authentication –
This stage checks the authentication of data that is being transmitted. It also
keeps a track of the devices that are accessing the network so that the data
stored and retrieved are from authenticated devices only. Implementation of VPN
network over wireless network While implementing VPN in the wireless network,
certain things need to be considered so that the owner of the network can be
rest assured that the data on their computer or network is accessed only by
people who are permitted. If a person visits a website then the website owner
can access the data, on the laptop/desktop from where the website is being
visited. This becomes a major problem when a person is using public Wi-Fi. VPN
creates a tunnel from the laptop to the endpoint of the tunnel and then an
unencrypted mode is used to reach the website. With the help of VPN, the other
users of the same network cannot track the http or the IP of the computer. One
of the best ways by which an organization can implement a VPN for its wireless
network would be by outsourcing the security. There are various benefits of
outsourcing the Virtual Private Network, especially if the organization is
small. For VPN to be implemented in the organization, a special server needs to
be set, a separate operating system needs to be installed and apart from that,
the server will have to remain on for 24 hours a day. If an organization is
having its presence in multiple locations then it is always better to hire a
networking professional who can take care of the VPN requirements of the
organization as outsourcing the process can be an expensive deal. VPN service
providers are available in plenty in the market; the person who is willing to
outsource the VPN can get a service provider for even $5 per month for per
computer thus, making it affordable for everybody. This will be an expensive
deal for organizations which have 10,000 or more computers. Purchasing a server,
operating system and hiring a network administrator can be a beneficial deal for
such organizations. Creating a VPN over the Wi-Fi network has become a must
otherwise the threats cannot be avoided. An organization which is willing to
undertake VPN over Wi-Fi must have at least Windows 7 as operating system and a
stable internet connection. If the internet connection with the organization
isn’t powerful then a stable VPN cannot be established thus, making the network
again prone to risk. VPN in layman’s language can be said that, first and
foremost, the organization will have to install client software in all the
computers in the organization. A modem in the organization’s computers should be
connected to the firewall and then the client server is also connected to the
firewall. By doing this, a tunnel is formed between the organization’s computer
and the client’scomputer. Outside the tunnel, there are lots of viruses which
are trying their level best to acquire the data which is inside the tunnel. The
data inside the tunnel is encrypted thus, making it difficult for the hacker to
understand the data. If the data has, inside the tunnel, to be hacked then the
data will have to be decrypted so that it can be used. An organization, having
VPN, should communicate with all their clients after installation of the
firewall so that the data can be safe. Even in an organization, all the
employees in the organization cannot access all the data and hence, the data is
protected by way of encryption and decryption. A VPN must be used especially
when an employee is using the public Wi-Fi to get access to the internet. Types
of VPN There are majorly two types of VPN so the organization should choose the
one that they find suitable. The details of the VPN are as follows: – 1.
Site-to-Site VPN – This kind of VPN is used by organizations which have their
presence in multiple locations. These organizations have a firewall, routers and
other things that can complete the VPN in all the locations. If an employee from
US branch is willing to share data with an employee in the UK branch then they
can do that peacefully without any security threat. The employee of the US
branch will send the data, the data will be encrypted and then it will reach the
employee at the UK branch. The data will be encrypted while it leaves the US
branch and it will be decrypted by the UK branch’s firewall and modem so that it
can be safe and secure when travelling via the VPN tunnel. 2. Remote Access VPN
– Site-to-Site VPN cannot be used when there are multiple users of the same
data. Any data on the website cannot be secured by way of site-tosite VPN and
hence, remote access VPN is used. The server disseminates the data to the
endpoint of VPN tunnel; thus, the device in which the data is stored is
completely secure. The end-user, computer, laptop or mobile, can retrieve the
data. The data is encrypted till it reaches the end of the tunnel and then the
data is decrypted once it is received at the user’s device. This is one of the
most secure methods which many organizations are using when the data is to be
accessed by multiple users. Benefits of using VPNs in a wireless network There
are various advantages of using VPNs in wireless network and hence, almost all
the organizations today are willing to implement a VPN. Few of the advantages of
Virtual Private network is discussed below. VPN is one of the easiest ways by
which two branch offices can communicate with each other without any security
issues. The data packet that has been sent from one location to that of another
is encrypted and after checking the credentials and other authentications, the
data is decrypted and delivered in the same state as it was. This is best suited
for organizations which are geographically distributed. This allows the
employees from two different locations to breakthe barrier and communicate,
access internet, exchange emails and have a chat with each other by way of
online conference Cost is one of the major advantage due to which many
organizations opt for it rather than that of any other security options.
Sometime back, organizations use to hire lease lines so that the transmission of
data between two branch offices take place securely but that problem is
completely solved with the introduction of VPN. A VPN can be formed with the
help of public internet thus, making things simple and easy. The cost of
long-distance telephone charges is reduced as with the help of VPN, employees
from two different locations can communicate with each other over internet
conferencing. The cost of server maintenance is also reduced because this can be
outsourced to the third-party. Many VPN service providers achieve economies of
scale by way of providing VPN services to many business organizations.
Initially, an organization, which has its presence in only two locations, may
think of building a private network. Later, with the increase in the number of
branches, this will be seemed as an expensive deal. If an organization is having
two branches then they will be require one dedicated but if the number of
branches is increased to six then the organization will require 15 dedicated
servers; thus, making this an expensive deal. With the increase in the number of
dedicated servers, the technical complexities also tend to increase and the cost
of professional also increases. With the help of VPN, the organization can just
use the public internet to connect to all the branches. Disadvantages of using
VPNs in wireless Network There are various disadvantages of using VPNs in
wireless network and hence, there are other security options available. Few of
the disadvantages of using VPNs in wireless networks are discussed below. The
technician who will be implementing the VPN device needs have a good amount of
knowledge. If a technician thinks that he can try his luck with the VPN network
then things are not going to work; in fact, that will be a great pitfall for the
organization which is implementing it. Hiring a technician with complete
knowledge about VPN can be an expensive deal but an organization will have to do
that so that they can avoid security as well as deployment issues. The speed of
VPN network is very much slower as compared to that of other security devices.
If an organization has been using some security device and if they all of a
sudden decide to switch to VPN then they won’t be comfortable and there are
possibilities that they will shift back to the old device after a certain point
of time. There are lot many manufacturers of VPN device and hence, it is very
important for an organization to choose the right manufacturer. It has been
noticed that certain service providers are better than that of others; thus,
allowing organizations to work at a faster rate.It is very important to have
internet connectivity with great speed. With fluctuation in internet
connectivity, the performance of the network will also fluctuate. Apart from
that, the data inside the tunnel is very much secure but there is always an
insecurity of the data being hacked. If there is a slight fault then there are
possibilities that the data will be hacked and decrypted. Theoretically, it is
said that VPN requires nothing other than that of IP (Internet Protocol) but
that is not the case in practicality. The existing legacy of the existing
internet connection matters the most so these things need to be well considered
in advance so that organizations aren’t fooled after purchasing the device. If
an organization is willing to implement VPN then they need to consider both the
advantages as well as disadvantages so that they can take a wise decision rather
than that of implementing VPN in a hurry and then regretting. Recommendations
for using VPNs effectively: VPN can be the best possible security solution if an
organization considers certain things before implementation. Few recommendations
for using VPNs effectively, in wireless networks are as follows: – 1. Any
organization which is planning to implement VPN should prepare things in
advance. They should prepare a proper plan and discuss the same with the
professional, make changes as required and then they should go ahead with the
implementation. Many organizations just see the cost benefit which is offered by
VPN and then they start with the implementation but that is not the right thing
to do. This can be very risky and it may even lead to security issues like the
data, which is transmitted, being hacked. 2. Unauthorized access to the network
should be avoided completely. Apart from that, the VPN network should be divided
in small parts so that even if a malicious virus attacks the network then only a
part is affected and not all. Many organizations assume the data to be safe and
hence, they allow the movement of data without proper credentials but that
should be avoided to the extent possible. This will take some time but that is
completely fine rather than that of losing important data. 3. If an organization
assumes that the internal IT resources in the organization can take care of the
VPN implementation and other issues then this will be considered as one of the
biggest faults. While purchasing a device from the manufacturer, the
organization should check regarding the availability of professionals. It is
always better to hire these professionals so that the implementation becomes an
easier task and apart from that, there will be no loopholes left on the security
end. 4. With the implementation of a VPN, the operational procedures of the
organization should be revised so that they can fit well with the new procedures
of the VPN. An organization should be prepared to undertake these changes as
this will allow the organization to perform more efficiently than it did
previously.Conclusion: VPN is one of the best security options that anyone can
undertake so that the data in the organization is secured. The organization
should decide on the type of VPN that they would like to have at their place.
There are certain advantages as well as disadvantages and this should be
considered well in advance so that there isn’t any scope for surprise.
Professionals are available in the market for VPN implementation so they should
be hired so that the data in the organization can be protected from hackers.
Initially the users may feel that the network is slow due to the implementation
of a VPN but considering the advantages that VPN provides, this can be ignored.
Comments
Post a Comment