What Makes a Good Vpn

1541 WordsOct 31, 20057 Pages
Virtual private networks (VPN) provide an encrypted connection between distributed sites over a public network (e.g., the Internet). By contrast, a private network uses dedicated circuits and possibly encryption. The basic idea is to provide an encrypted IP tunnel through the Internet that permits distributed sites to communicate securely. VPN 's permit secure, encrypted connections between a company 's private network and remote users through a third-party service provider. A VPN can grow to accommodate more users and different locations much easier than a leased line. In fact, scalability is a major advantage that VPN 's have over typical leased lines (dedicated circuits). Unlike with leased lines, where the cost increases in proportion…show more content…
With RAS you would need access to the actual wire or the telephone switch being utilized and VPN 's utilize a lot of different devices when crossing the internet making it more susceptible to hacking. When purchasing a VPN for your company one of the first things that you need to decide is what type of protocol you would like to use. One of the more common protocols used is the Point-to-Point Tunneling Protocol (PPTP). PPTP is a protocol that is used to allow users to connect to their corporate network via the internet. This is a relatively inexpensive way to provide remote access to your network considering that most Microsoft operating systems come with some sort of PPTP client. Other things to keep in mind when coming up with a VPN solution are the implementation and design and the cost of the solution. The cost is especially important considering that the uses of VPN 's are used to help save your company money. There are four types of attacks used against VPN 's. Those four types are impersonation, integrity, disclosure, and denial of service. Impersonation attacks are used just as the word says; it is when someone tries to get into your network while posing as someone else. This type of attack can be greatly reduced by using the strong authentication methods supported by PPTP. Integrity attacks are the changing of information during a transfer of data. The most common integrity attacks take place on email messages where a hacker
Open Document