Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

VPN - Virtual Private Network

Brief description of the VPN technology, its advantages and disadvantages, including legal implications. It presents a business perspective and also a private perspective of using VPN connections.

Libros relacionados

Gratis con una prueba de 30 días de Scribd

Ver todo
  • Inicia sesión para ver los comentarios

VPN - Virtual Private Network

  1. 1. VPN Virtual private network DiogoCosta Mariana Hansen Mauricio Berlin SilvanaAndrade
  2. 2. What isVPN? A secure network that uses the Internet as its main backbone network to connect the intranets of a company’s different locations or to establish extranet links between a company and its customers, suppliers or other business partners (O’Brien, 2003). Point-to-point connections across a private or public network, such as the Internet, using tunneling protocols to connect a VPN client to a VPN Server (TechNet, 2017). A secure, encrypted connection, which can be describe as a tunnel, between your computer and a server operated by theVPN service (Eddy, 2017)
  3. 3. Your data travelling privately, encrypted and safely
  4. 4. RemoteAccess It enables users working at home or on the road to access a server on the company’s private network using the infrastructure provided by a public network, such as the Internet.
  5. 5. Site-to-site It enables organizations to have routed connections between separate offices or with other organizations over a public network while helping to maintain secure communications.
  6. 6. AVPN or other secure connections? VPN It is used when is necessary to remotely connect to a private network such as the company’s servers or an overall infrastructure. Secure connections There are other types of secure connections, which have similar levels of security as a VPN connection, and they are normally used when accessing a website or some sort of extranet. Example: Online banking and CCT Moodle
  7. 7. VPN for Personal use AVPN service can be hired by a regular internet user by paying a subscription fee, which is around $ 5 per month. It creates a virtual encrypted "tunnel" between the user and a remote server operated by aVPN service through an Internet Service Provider such asVirgin Media.
  8. 8. VPN for Personal use What happens: • User becomes virtually anonymous online; • Traffic data is kept private and safe from hackers and government censorship; • Not even the ISP can see the data or the websites visited as the information is encrypted; • User is able to access blocked content due to geolocation as it can use the IP address from its VPN server hiding its original location.
  9. 9. Is it against the Law? VPN is a legal service in most countries. More repressive countries such as China and Iran do ban VPN services from operating in their country, and attempt to block users from accessing overseas VPN services. However, censorship systems are partially successful.
  10. 10. Is it against the Law? In Europe due to the threat of terrorism, in many countries such as UK and France, VPN providers are required to keep logs of users’ activity. Netflix is fighting the abuse of VPN service to access content that is not available for a certain location. The company is often blocking streaming when using a VPN connection to avoid users to access content they did not pay for.
  11. 11. Advantages Business  Security through encryption  Connectivity  Increase productivity  Flexibility  Reduce operational costs Personal use  Security through encryption  Avoid internet censorship  Access blocked content
  12. 12. Disadvantages It will slow down the connection due to the encryption process.
  13. 13. References  CyberGhostVPN, 2013. How aVPNWorks andWhat It Does for You. [video online]Available at: [Accessed 05 April 2017]  Cisco, . HowVirtual Private NetworksWork. [online]Available at: negotiation-ike-protocols/14106-how-vpn-works.html [Accessed 03 April 2017].  Crawford, D, 2016.VPNs for Beginners –WhatYou Need to Know. BestVPN, [online] 20 January.Available at: know/ [Accessed 03 April 2017].  Dashevsky, E., 2017. Privacy 101:WhyYou Need aVPN. PC Mag [online], 31 March.Available at: you-need-a-vpn [Accessed 05 April 2017].
  14. 14. References  Eddy, M., 2017.The BestVPN Services of 2017. PC Mag [online], 26 February. Available at: of-2017 [Accessed 03 April 2017].  Eli the Computer Guy, 2011.VPN -Virtual Private Networking. [video online]Available at: [Accessed 02April 2017].  Henry, A., 2012.WhyYou Should Be Using aVPN (and How to Choose One). Life Hacker [online], 09 May.Available at: and-how-to-choose-the-best-one-for-your-needs [Accessed 04 April 2017].  Paul, I., 2017. How—and why—you should use aVPN any time you hop on the internet.TechHive, [online] 18 January.Available at: whyyou-should-use-a-vpn-any-time-you-hop-on-the- internet.html [Accessed 03 April 2017].  TechNet, 2003.What isVPN? [online]Available at: us/library/cc739294(v=ws.10).aspx [Accessed 02April 2017].