Virtual private network (VPN)


·       A virtual private network (VPN) is an encrypted connection over the Internet from a device to a network.

·       The encrypted connection helps ensure that sensitive data is safely transmitted.

·       It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.

·       It provides access to resources that may be inaccessible on the public network, and is typically used for telecommuting workers. Encryption is a common, although not an inherent, part of a VPN connection.

Types of VPNs

·       Remote access - A remote access VPN securely connects a device outside the corporate office. These devices are known as endpoints and may be laptops, tablets, or smartphones. Advances in VPN technology have allowed security checks to be conducted on endpoints to make sure they meet a certain posture before connecting. Think of remote access as computer to network.

·       Site-to-site - A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Dedicated equipment is used to establish and maintain a connection. Think of site-to-site access as network to network.

·       Extranet-based site-to-site - In the context of site-to-site configurations, the terms intranet and extranet are used to describe two different use cases. An intranet site-to-site VPN describes a configuration where the sites connected by the VPN belong to the same organization, whereas an extranet site-to-site VPN joins sites belonging to multiple organizations.

How a VPN secures your traffic

·       When you connect to a VPN, it establishes a secure tunnel to one of its servers. This makes it seem like the traffic originates from the server instead of your device. 

·       At each end of the tunnel, the VPN client and the server both have a key that they have exchanged during the initial connection to encrypt your data.

·       Both the VPN client and the VPN server use this key to scramble and later descramble your traffic before it travels through the tunnel. Also, since your data passes through the VPN server, which uses different IP addresses, your “personal” one stays unseen.

·       This way, the content and origins of the data flowing between you and the internet remain hidden from your internet service provider and third-party websites.

Use of VPN

·       A VPN could be used to hide your IP address (to hide your original identity). You can also change your IP address to another IP address while using the VPN.

·       While using public Wi-Fi, there’s a high risk of data transfers. Thus, a VPN is helpful in protecting your data over public Wi-Fi.

·       VPN user can also change their country of origin or can choose any country.

·       One can also use VPN to access some websites that are blocked in their region.

·       Many corporate companies use VPN to secure their sensitive data. 

Comments

Post a Comment