Grade 12 Networks VPN

Home Forums Grade 12 IB Grade 12 Networks VPN

Viewing 6 posts - 1 through 6 (of 6 total)
  • Author
    Posts
  • #6898
    Eamonn
    Keymaster

    Create a post

    That identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.

    Briefly describe how VPN’s can be used and how they have impacted working life and social life.

    #6915
    girwan
    Participant

    1) Components of VPN:
    VPN Tunnelling protocols that encapsulates or encrypts private data, and manages VPN tunnels
    Authentication to idenitfy the VPN client and server to prevent impersonation
    VPN Client Server to make a remote connection
    Server allocation : has to allocate IP addresses, Domain Name System (DNS) and Windows Internet Naming Service (WINS) to clients.

    2) VPN establishes a secure connection between the user and the network. Your data is encrypted and sent through a VPN tunnel. VPN’s can be used to access content that is currently unavailable in your network. It can also be used to secure your network from external attacks and maintain privacy as it hides your ip address.

    VPN has made us more confident and secure online. Since it is able to hide your IP and encrypt your network traffic you do not have to worry about attacks such as DDOS, or Man In the Middle Attacks. Also it allows for remote work as you don’t have to worry about certain services being blocked when you travel to different countries while also maintaining privacy. Similarly, it has made it possible for us to connect with friends and family as we don’t have to worry about not having access to a specific service when travelling abroad. However, this has also made it possible for criminals to hide their location and it can allow for criminal activities to happen without detection.

    #6916
    Shiva Chandnani
    Participant

    1. Create a post That identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.
    – VPN server- to handle and manage incoming VPN traffic and to establish and manage VPN sessions and their access to network resources. This set up by the VPN provider
    – Encapsulation – Uses an extra layer over the packets. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel unidentifiable by service providers.
    – Asymmetric Encryption keys – Uses public and private keys to encrypt and decrypt data.
    – Authentication – VPNs mask your IP address and establish a secure and encrypted connection.

    2. Briefly describe how VPN’s can be used and how they have impacted working life and social life.
    – VPN’s allow people, such as traveling employees, a secure and reliable way to connect to their business’s computer network from remote locations. This impacts working life as people can now work from home allowing more flexibility. It affects peoples social lives as it provides users with security of their data, so the fear of users being hacked is reduced. VPN’s have created a safer environment for users giving them more confidence that their private data won’t be access by third parties.

    #6917
    joshua7
    Participant

    That identifies 4 components specific to setting up a VPN can be a mix of hardware and protocols.
    – data encryption
    – authentication
    – vpn router
    – Secure Socket Tunneling Protocol (SSTP)

    Briefly describe how VPN’s can be used and how they have impacted working life and social life.
    By having vpn, we can access different contents that are blocked based upon our locations (such as netflix or ecommerce sites that are only available locally) and also be able to access different servers at school or offices safely. This let us have access to more resources at work and more variety of entertainment as well as information on different places during our social life. Another use is protection of our data. Having a vpn would allow us to safely use public wifi. It is easy for hackers to intercept the network so by having a vpn, even if it is intercepted, our data would be scrambled thus unable to gain our data. This applies to even when we are simply browsing the internet as many websites gather information to make targeted ads, especially ecommerce or social media. Using a vpn will ensure the safety of our data and prevent targeted ads which will gove us a more seamless experience.

    #6920
    Sang
    Participant

    – VPN server
    – authentication
    – data encryption
    – Point to point protocol

    #6921
    Irfan
    Participant

    4 components:
    1. A server.
    2. A network cable from client to the internet.
    3. IPSec protocol to encrypt data to the server and send data.
    4. software to authenticate and function as a intermediary to help send the data to the server and give the user a GUI to help users understand if they are connected and where.

    working life:
    Pros:
    -secure connection meaning business can work remotely safely thanks to good encryption
    -larger computer networks can be established spanning continents
    -business can be more efficient with workers now able to work on site and then go home and also work
    -work can continue with the pandemic

    Cons:
    -people are now made to work from home and this can increase stress with the pandemic
    -more people are expected to have good cyber security at home this means hackers now just have to focus on employees and not the actual business because vpns encrypt data in transit
    -single point of failure. data is encrypted in transit. Because multiple businesses may use 1 vpn provider. A hacker really just needs to hack the provider to get them all. Other than before independently target each business to collect sensitive info

    social life:
    Pros:
    -easy set up to get security anywhere
    -cheap security for users
    -security easy to make sure is good and actually secure

    Cons:
    -single point of failure. a hacker needs to hack a vpn provider to gain access to multiple users data
    -multiple vpn providers means it is unclear which providers are trustworthy
    -doesn’t prevent business to still track user info with identifiers. data may come from a different source but the device type, cookies etc. can still be used to figure out who the user is.

Viewing 6 posts - 1 through 6 (of 6 total)
  • You must be logged in to reply to this topic.
Scroll to Top