QUIZ 3 - Virtual Private Network (VPN)
What is a Virtual Private Network?
A secure remote access connection across an intermediary network, often the Internet
Ways to keep VPN secure?
* Authentication * Encryption ~ Confidentiality ~ Integrity ~ Privacy Why not availability? due to the fact that it rides on ISP; Internet.
What are VPN Security Concerns
* Data exposure while in transit over the Internet ~VPN should use encryption * Vulnerable VPN endpoints ~Data entering or leaving * Compliance issues with security settings ~Oversight * Unrestricted access to network resources ~Strong authentication and authorization
What are VPN Components?
* Host VPN ~ software that allows a single host access to VPN services ~ sits on top of the OS * VPN appliance ~ Hardware that allows an entire network access to VPN services ~ Does not always need software for the host
What are VPN Protocols?
* IPSec* * PPTP * L2TP * SSL* * TLS* * Used for tunneling/encapsulation
What's the VPN evolution?
* It's the boom of the Internet * Networks VPN referred to tunneling connections across network links * No encryption services
What are VPN dos
* Match organizational and data privacy needs * Establish control ~ Components (software and hardware) ~ Conversations (endpoint connections) ~ Communications (network infrastructure)
What are VPN Limitations?
* No quality of service * Latency * Fragmentation * Traffic congestion * Dropped packets * Encrypted packets do not compress * Connectivity requires high availability * Bandwidth intensive
What does VPN offer?
* Remote access via the Internet to a secure private network * Protection of sensitive information crossing the public network * Low cost alternative to leased-line infrastructure * Remote access and remote control Encryption * Restricted communication to mobile users
What are the types of VPN design mechanisms?
* Trusted VPN ~ company control over network components e.g. router, switches and cables ~ controlled pathway transmission ~ Dedicated channels * True Private VPN ~ Ownership of all network infracstructure ~ Expensive * Secured VPN ~Encryption ~Protects against confidentiality and integrity ~No controlled pathway * Hybrid VPN ~Secure VPN over trusted VPN connections What can this method not ensure? ~ Transmission path
Types of VPN Protocols
* Tunneling protocols ~package packets within packets for secure transport * Transport protocols ~package payloads within packets * Encapsulating protocols ~ wrap around original passenger protocols * Carrier protocols ~carry the packaged VPN packets
What are VPN Deployment Benefits
* Vary from organization * High productivity * Flexibility * Scalability * Ease of administration * Reliability * Secured communications * Cost Savings
Difference between Remote Control and Remote Access
Remote Control is when local computer system takes over another computer over a network connection e.g using Remote desktop Protocol Remote Access is having access to network resources across a WAN link to connect to a geographically distant network