Home › Forums › Grade 12 IB › Grade 12 Networks VPN
- This topic has 5 replies, 5 voices, and was last updated 3 years, 3 months ago by
Irfan.
- AuthorPosts
- October 25, 2021 at 1:57 am #6898
Eamonn
KeymasterCreate a post
That identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.
Briefly describe how VPN’s can be used and how they have impacted working life and social life.
October 25, 2021 at 5:23 am #6915girwan
Participant1) Components of VPN:
VPN Tunnelling protocols that encapsulates or encrypts private data, and manages VPN tunnels
Authentication to idenitfy the VPN client and server to prevent impersonation
VPN Client Server to make a remote connection
Server allocation : has to allocate IP addresses, Domain Name System (DNS) and Windows Internet Naming Service (WINS) to clients.2) VPN establishes a secure connection between the user and the network. Your data is encrypted and sent through a VPN tunnel. VPN’s can be used to access content that is currently unavailable in your network. It can also be used to secure your network from external attacks and maintain privacy as it hides your ip address.
VPN has made us more confident and secure online. Since it is able to hide your IP and encrypt your network traffic you do not have to worry about attacks such as DDOS, or Man In the Middle Attacks. Also it allows for remote work as you don’t have to worry about certain services being blocked when you travel to different countries while also maintaining privacy. Similarly, it has made it possible for us to connect with friends and family as we don’t have to worry about not having access to a specific service when travelling abroad. However, this has also made it possible for criminals to hide their location and it can allow for criminal activities to happen without detection.
October 25, 2021 at 5:25 am #6916Shiva Chandnani
Participant1. Create a post That identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.
– VPN server- to handle and manage incoming VPN traffic and to establish and manage VPN sessions and their access to network resources. This set up by the VPN provider
– Encapsulation – Uses an extra layer over the packets. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel unidentifiable by service providers.
– Asymmetric Encryption keys – Uses public and private keys to encrypt and decrypt data.
– Authentication – VPNs mask your IP address and establish a secure and encrypted connection.2. Briefly describe how VPN’s can be used and how they have impacted working life and social life.
– VPN’s allow people, such as traveling employees, a secure and reliable way to connect to their business’s computer network from remote locations. This impacts working life as people can now work from home allowing more flexibility. It affects peoples social lives as it provides users with security of their data, so the fear of users being hacked is reduced. VPN’s have created a safer environment for users giving them more confidence that their private data won’t be access by third parties.October 25, 2021 at 5:27 am #6917joshua7
ParticipantThat identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.
– data encryption
– authentication
– vpn router
– Secure Socket Tunneling Protocol (SSTP)Briefly describe how VPN’s can be used and how they have impacted working life and social life.
By having vpn, we can access different contents that are blocked based upon our locations (such as netflix or ecommerce sites that are only available locally) and also be able to access different servers at school or offices safely. This let us have access to more resources at work and more variety of entertainment as well as information on different places during our social life. Another use is protection of our data. Having a vpn would allow us to safely use public wifi. It is easy for hackers to intercept the network so by having a vpn, even if it is intercepted, our data would be scrambled thus unable to gain our data. This applies to even when we are simply browsing the internet as many websites gather information to make targeted ads, especially ecommerce or social media. Using a vpn will ensure the safety of our data and prevent targeted ads which will gove us a more seamless experience.October 25, 2021 at 5:32 am #6920Sang
Participant– VPN server
– authentication
– data encryption
– Point to point protocolOctober 25, 2021 at 5:35 am #6921Irfan
Participant4 components:
1. A server.
2. A network cable from client to the internet.
3. IPSec protocol to encrypt data to the server and send data.
4. software to authenticate and function as a intermediary to help send the data to the server and give the user a GUI to help users understand if they are connected and where.working life:
Pros:
-secure connection meaning business can work remotely safely thanks to good encryption
-larger computer networks can be established spanning continents
-business can be more efficient with workers now able to work on site and then go home and also work
-work can continue with the pandemicCons:
-people are now made to work from home and this can increase stress with the pandemic
-more people are expected to have good cyber security at home this means hackers now just have to focus on employees and not the actual business because vpns encrypt data in transit
-single point of failure. data is encrypted in transit. Because multiple businesses may use 1 vpn provider. A hacker really just needs to hack the provider to get them all. Other than before independently target each business to collect sensitive infosocial life:
Pros:
-easy set up to get security anywhere
-cheap security for users
-security easy to make sure is good and actually secureCons:
-single point of failure. a hacker needs to hack a vpn provider to gain access to multiple users data
-multiple vpn providers means it is unclear which providers are trustworthy
-doesn’t prevent business to still track user info with identifiers. data may come from a different source but the device type, cookies etc. can still be used to figure out who the user is. - AuthorPosts
- You must be logged in to reply to this topic.