Page 164 - DCAP516_COMPUTER_SECURITY
P. 164

Computer Security




                    Notes
                                     Did u know? TCP /IP supports up to 64,000 virtual ports so many hosts can easily share the
                                     single external IP address. This is sometimes called Proxy Address Translation or Port
                                     Address Translation.

                                   13.2.6 Virtual Private Networking (VPN)


                                   VPN is the short form for Virtual Private Network. A Virtual Private Network (VPN) is a
                                   network that uses a public telecommunication infrastructure, such as the Internet, to provide
                                   remote offices or individual users with secure access to their organization’s network.

                                   A virtual private network can be contrasted with an expensive system of owned or leased lines
                                   that can only be used by one organization. The goal of a VPN is to provide the organization with
                                   the same capabilities, but at a much lower cost.
                                   A VPN works by using the shared public infrastructure while maintaining privacy through
                                   security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP).
                                   In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving
                                   end, send the data through a “tunnel” that cannot be “entered” by data that is not properly
                                   encrypted.
                                   An additional level of security involves encrypting not only the data, but also the originating
                                   and receiving network addresses. It is a communications network tunneled through another
                                   network, and dedicated for a specific network.

                                   One common application is secure communications through the public Internet, but a VPN need
                                   not have explicit security features, such as authentication or content encryption. VPNs, for
                                   example, can be used to separate the traffic of different user communities over an underlying
                                   network with strong security features.
                                   A VPN may have best-effort performance, or may have a defined Service Level Agreement
                                   (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology
                                   more complex than point-to-point. The distinguishing characteristic of VPNs are not security or
                                   performance, but that they overlay other network(s) to provide a certain functionality that is
                                   meaningful to a user community.

                                                        Figure 13.2: Diagram of a VPN Connection













                                   It is a network that is constructed by using public wires to connect nodes. For example, there are
                                   a number of systems that enable you to create networks using the Internet as the medium for
                                   transporting data. These systems use encryption and other security mechanisms to ensure that
                                   only authorized users can access the network and that the data cannot be intercepted.
                                   VPNs provide a more active form of security by either encrypting or encapsulating data for
                                   transmission through an unsecured network. These two types of security – encryption and
                                   encapsulation – form the foundation of virtual private networking.





          158                               LOVELY PROFESSIONAL UNIVERSITY
   159   160   161   162   163   164   165   166   167   168   169