Download Virtual Private Network(VPN)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cryptography wikipedia , lookup

Information privacy law wikipedia , lookup

Distributed firewall wikipedia , lookup

Mobile security wikipedia , lookup

Unix security wikipedia , lookup

Wireless security wikipedia , lookup

Data remanence wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Secure multi-party computation wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Virtual Private Network(VPN)
Presented By
Aparna Chilukuri
What is a VPN?
• A VPN is a private network that uses a
public network (usually the Internet) to
connect remote sites or users together.
What Makes a VPN?
• Remote Access
• Site-to-Site
• Intranet
• Extranet
• Secure VPN
• Trusted VPN
• Hybrid VPN
• Provider-Provisioned VPN
VPN Security
 authentication—ensuring that the data originates at
the source that it claims
 access control—restricting unauthorized users from
gaining admission to the network
 confidentiality—preventing anyone from reading or
copying data as it travels across the Internet
 data integrity—ensuring that no one tampers with
data as it travels across the Internet
What is Tunneling ?
• Tunneling is the process of placing an entire
packet within another packet and sending it
over a network.
• Tunneling requires three different protocols:
 Carrier protocol
 Encapsulating protocol - GRE, IPSec, L2F, PPTP,
L2TP
 Passenger protocol - IPX, NetBeui, IP
VPN Protocols
• Remote Access
• PPTP(Point -to -Point Tunneling Protocol)
• L2F(Layer 2 forwarding)
• L2TP( Layer 2 tunneling Protocol)
• Lan-to-Lan
• IPSec
IPSec Uses
 Diffie-Hellman key exchanges to deliver secret keys
between peers on a public net
 public-key cryptography for signing Diffie-Hellman
exchanges, to guarantee the identities of the two
parties and avoid man-in-the-middle attacks
 data encryption standard (DES) and other bulk
encryption algorithms for encrypting data
 keyed hash algorithms (HMAC, MD5, SHA) for
authenticating packets
• digital certificates for validating public keys
Conclusion
• Loopholes
– Hackers will try to "piggyback" onto an
existing VPN connection that a remote worker
has established, either inserting viruses into a
system or removing and viewing sensitive files