Assignment: Virtual Private Network (VPN)
Virtual Private Network (VPN)
What is VPN:
The term virtual private network (abbreviated VPN) describes any technology that can
encapsulate and transmit network data, typically Internet Protocol data, over another
network. Such a system enables users to access network resources that may otherwise be
inaccessible from the public internet. VPNs are frequently used in the information technology
sector to provide access to resources for users that are not physically connected to an
organization's network, such as telecommuting workers. VPNs are so named because they may
be used to provide virtual (as opposed to physical) access to a private network.
Introduction:
Technology is moving ahead fast and with moving technology, there are certain things which
need to be considered so that the data can be secured. Personal computers may not require a high
level of security but official computers do because there are always people who are willing to go
out of the way to hack the data. VPN, that is, Virtual Private Network is a networking technology
that allows professionals from different part of the world to communicate securely with that of
each other. A VPN allows two types of advantages to the user; one is where the user can enter
the credentials and access a public network from anywhere they want or secondly, the user can
access the intranet of an organization from the office location itself. If a college is present in two
different states then they will have a common network so that the data on the internet is available
to all the students and professors of both the locations. There is always a possibility that the data
on the college intranet gets hacked and hence, to stop the same, VPN needs to be implemented so
that the data is secure. The credentials of VPN networks should be shared, by the owner of the
network, with whom he trusts and not just everybody.
VPN and security:
The virtual private network is the best way by which one can secure their wireless network. The
VPN will allow only selected users to access the network; thus, the data can be accessed only by
people who are permitted. VPN forms a tunnel around the network so only people who have the
authority to access the data can enter the required credentials. Even websites are protected by
SSL and hence, most of the times, certain part of the website request for a password and user ID
thus, diverting the unwanted user.
VPN provides the below levels of security so that the network owner can be rest assured that the
data on his network is secured. The levels of security provided by VPN are discussed below: –1. User Authentication – This level of security allows only the permitted users to use
the wireless network. The authenticated users can access the data on the internet, send
files from the network and also receive files by using the network.
2. Encryption – This allows additional security to the network. Even if someone tries to
hack the network then that isn’t possible without extra efforts and time. The
encryption comes into picture when the transmissions are being decoded.
3. Data authentication – This stage checks the authentication of data that is being
transmitted. It also keeps a track of the devices that are accessing the network so that
the data stored and retrieved are from authenticated devices only.
Implementation of VPN network over wireless network
While implementing VPN in the wireless network, certain things need to be considered so that
the owner of the network can be rest assured that the data on their computer or network is
accessed only by people who are permitted.
If a person visits a website then the website owner can access the data, on the laptop/desktop
from where the website is being visited. This becomes a major problem when a person is using
public Wi-Fi. VPN creates a tunnel from the laptop to the endpoint of the tunnel and then an
unencrypted mode is used to reach the website. With the help of VPN, the other users of the
same network cannot track the http or the IP of the computer.
One of the best ways by which an organization can implement a VPN for its wireless network
would be by outsourcing the security. There are various benefits of outsourcing the Virtual
Private Network, especially if the organization is small. For VPN to be implemented in the
organization, a special server needs to be set, a separate operating system needs to be installed
and apart from that, the server will have to remain on for 24 hours a day. If an organization is
having its presence in multiple locations then it is always better to hire a networking professional
who can take care of the VPN requirements of the organization as outsourcing the process can be
an expensive deal. VPN service providers are available in plenty in the market; the person who is
willing to outsource the VPN can get a service provider for even $5 per month for per computer
thus, making it affordable for everybody. This will be an expensive deal for organizations which
have 10,000 or more computers. Purchasing a server, operating system and hiring a network
administrator can be a beneficial deal for such organizations.
Creating a VPN over the Wi-Fi network has become a must otherwise the threats cannot be
avoided. An organization which is willing to undertake VPN over Wi-Fi must have at least
Windows 7 as operating system and a stable internet connection. If the internet connection with
the organization isn’t powerful then a stable VPN cannot be established thus, making the
network again prone to risk.
VPN in layman’s language can be said that, first and foremost, the organization will have to
install client software in all the computers in the organization. A modem in the organization’s
computers should be connected to the firewall and then the client server is also connected to the
firewall. By doing this, a tunnel is formed between the organization’s computer and the client’scomputer. Outside the tunnel, there are lots of viruses which are trying their level best to acquire
the data which is inside the tunnel. The data inside the tunnel is encrypted thus, making it
difficult for the hacker to understand the data. If the data has, inside the tunnel, to be hacked then
the data will have to be decrypted so that it can be used. An organization, having VPN, should
communicate with all their clients after installation of the firewall so that the data can be safe.
Even in an organization, all the employees in the organization cannot access all the data and
hence, the data is protected by way of encryption and decryption. A VPN must be used
especially when an employee is using the public Wi-Fi to get access to the internet.
Types of VPN
There are majorly two types of VPN so the organization should choose the one that they find
suitable. The details of the VPN are as follows: –
1. Site-to-Site VPN – This kind of VPN is used by organizations which have their
presence in multiple locations. These organizations have a firewall, routers and other
things that can complete the VPN in all the locations. If an employee from US branch
is willing to share data with an employee in the UK branch then they can do that
peacefully without any security threat. The employee of the US branch will send the
data, the data will be encrypted and then it will reach the employee at the UK branch.
The data will be encrypted while it leaves the US branch and it will be decrypted by
the UK branch’s firewall and modem so that it can be safe and secure when travelling
via the VPN tunnel.
2. Remote Access VPN – Site-to-Site VPN cannot be used when there are multiple
users of the same data. Any data on the website cannot be secured by way of site-tosite VPN and hence, remote access VPN is used. The server disseminates the data to
the endpoint of VPN tunnel; thus, the device in which the data is stored is completely
secure. The end-user, computer, laptop or mobile, can retrieve the data. The data is
encrypted till it reaches the end of the tunnel and then the data is decrypted once it is
received at the user’s device. This is one of the most secure methods which many
organizations are using when the data is to be accessed by multiple users.
Benefits of using VPNs in a wireless network
There are various advantages of using VPNs in wireless network and hence, almost all the
organizations today are willing to implement a VPN. Few of the advantages of Virtual Private
network is discussed below.
VPN is one of the easiest ways by which two branch offices can communicate with each other
without any security issues. The data packet that has been sent from one location to that of
another is encrypted and after checking the credentials and other authentications, the data is
decrypted and delivered in the same state as it was. This is best suited for organizations which
are geographically distributed. This allows the employees from two different locations to breakthe barrier and communicate, access internet, exchange emails and have a chat with each other
by way of online conference
Cost is one of the major advantage due to which many organizations opt for it rather than that of
any other security options. Sometime back, organizations use to hire lease lines so that the
transmission of data between two branch offices take place securely but that problem is
completely solved with the introduction of VPN. A VPN can be formed with the help of public
internet thus, making things simple and easy. The cost of long-distance telephone charges is
reduced as with the help of VPN, employees from two different locations can communicate with
each other over internet conferencing. The cost of server maintenance is also reduced because
this can be outsourced to the third-party. Many VPN service providers achieve economies of
scale by way of providing VPN services to many business organizations.
Initially, an organization, which has its presence in only two locations, may think of building a
private network. Later, with the increase in the number of branches, this will be seemed as an
expensive deal. If an organization is having two branches then they will be require one dedicated
but if the number of branches is increased to six then the organization will require 15 dedicated
servers; thus, making this an expensive deal. With the increase in the number of dedicated
servers, the technical complexities also tend to increase and the cost of professional also
increases. With the help of VPN, the organization can just use the public internet to connect to
all the branches.
Disadvantages of using VPNs in wireless Network
There are various disadvantages of using VPNs in wireless network and hence, there are other
security options available. Few of the disadvantages of using VPNs in wireless networks are
discussed below.
The technician who will be implementing the VPN device needs have a good amount of
knowledge. If a technician thinks that he can try his luck with the VPN network then things are
not going to work; in fact, that will be a great pitfall for the organization which is implementing
it. Hiring a technician with complete knowledge about VPN can be an expensive deal but an
organization will have to do that so that they can avoid security as well as deployment issues.
The speed of VPN network is very much slower as compared to that of other security devices. If
an organization has been using some security device and if they all of a sudden decide to switch
to VPN then they won’t be comfortable and there are possibilities that they will shift back to the
old device after a certain point of time.
There are lot many manufacturers of VPN device and hence, it is very important for an
organization to choose the right manufacturer. It has been noticed that certain service providers
are better than that of others; thus, allowing organizations to work at a faster rate.It is very important to have internet connectivity with great speed. With fluctuation in internet
connectivity, the performance of the network will also fluctuate. Apart from that, the data inside
the tunnel is very much secure but there is always an insecurity of the data being hacked. If there
is a slight fault then there are possibilities that the data will be hacked and decrypted.
Theoretically, it is said that VPN requires nothing other than that of IP (Internet Protocol) but
that is not the case in practicality. The existing legacy of the existing internet connection matters
the most so these things need to be well considered in advance so that organizations aren’t fooled
after purchasing the device.
If an organization is willing to implement VPN then they need to consider both the advantages as
well as disadvantages so that they can take a wise decision rather than that of implementing VPN
in a hurry and then regretting.
Recommendations for using VPNs effectively:
VPN can be the best possible security solution if an organization considers certain things before
implementation. Few recommendations for using VPNs effectively, in wireless networks are as
follows: –
1. Any organization which is planning to implement VPN should prepare things in
advance. They should prepare a proper plan and discuss the same with the
professional, make changes as required and then they should go ahead with the
implementation. Many organizations just see the cost benefit which is offered by
VPN and then they start with the implementation but that is not the right thing to do.
This can be very risky and it may even lead to security issues like the data, which is
transmitted, being hacked.
2. Unauthorized access to the network should be avoided completely. Apart from that,
the VPN network should be divided in small parts so that even if a malicious virus
attacks the network then only a part is affected and not all. Many organizations
assume the data to be safe and hence, they allow the movement of data without proper
credentials but that should be avoided to the extent possible. This will take some time
but that is completely fine rather than that of losing important data.
3. If an organization assumes that the internal IT resources in the organization can take
care of the VPN implementation and other issues then this will be considered as one
of the biggest faults. While purchasing a device from the manufacturer, the
organization should check regarding the availability of professionals. It is always
better to hire these professionals so that the implementation becomes an easier task
and apart from that, there will be no loopholes left on the security end.
4. With the implementation of a VPN, the operational procedures of the organization
should be revised so that they can fit well with the new procedures of the VPN. An
organization should be prepared to undertake these changes as this will allow the
organization to perform more efficiently than it did previously.Conclusion:
VPN is one of the best security options that anyone can undertake so that the data in the
organization is secured. The organization should decide on the type of VPN that they would like
to have at their place. There are certain advantages as well as disadvantages and this should be
considered well in advance so that there isn’t any scope for surprise. Professionals are available
in the market for VPN implementation so they should be hired so that the data in the
organization can be protected from hackers. Initially the users may feel that the network is slow
due to the implementation of a VPN but considering the advantages that VPN provides, this can
be ignored.
Comments
Post a Comment