Saturday, October 5, 2019

SOCIAL IMPLICATIONS OF ICT Assignment Example | Topics and Well Written Essays - 2000 words

SOCIAL IMPLICATIONS OF ICT - Assignment Example Therefore, this paper will discuss some important aspects regarding maintaining a secured network connection via virtual private networks. In essence, virtual private networks can be classified into two categories that are known as remote access and site-to-site. A remote access enables the user to access internet from a distant location (Hancock 30). A site-to-site VPN connection connects two sides of a private network. A good VPN must provide authentication, integrity, confidentiality, and anti-reply (Maiward 23). Authentication is vital security concern, and takes place at two levels known as machine-level and user-level (Hancock 243). Machine-level authentication is used for VPN connections during the establishment of IP-sec connection. User-level authentication takes place before data can be transferred through tunnel (Mairward 28). VPN Security is critical in many aspects because it has dramatically changed the way people conduct business. If an organization has users that are utilizing remote access, the risk of running into hackers poses a serious threat for a client. In order to remove this threat, using an ap plication such as MacAfee helps clients avoid malicious infiltration (Mairward 28). The traffic between Web browser and the VPN device is encrypted with SSL. Two types of main SSL VPNS are portal and tunnel. A SSL portal VPN secures multiple network services while a SSL tunnel VPN allows clients to access one or more VPN devices via the Web browser (â€Å"SSL VPN Security†). How do VPNs work? A standard VPN might have a main LAN at the head headquarters of an organization while the others LANs can be located at remote offices (â€Å"SSL VPN Security†). A VPN uses a public network, which is internet in most cases, and is necessary in order to connect to distant sites instead of using â€Å"leased lines†(â€Å"Virtual Private

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.