a). VPN Replacement Technologies
The first way to replace the private network is to have a leased line which is also known as the dedicated line. The leased line is a network which connects more than one locations for the purpose of private voice and also used for communication of data in tele-communication service [14]. The leased line is connected as reserved circuit that is connected between a point to another. The lines are always considered as active lines and can be available for a monthly amount. Instead of using the private network, leased lines can be used for short as well as long distances. The leased lines maintains open circuit signal, on the other hand the virtual networks uses same lines for transferring different conversations by the process of switching [22]. The process of leased lines are used by organizations who needs to connect their branch offices as the lines provides a bandwidth that is guaranteed for transferring the data between two location.
There is another way to replace the virtual network is using the DirectAccess method. The DirectAccess method allows all the remote users to access file share internally, web site share,
and also helps to share the application without being connected to Virtual Private Network (VPN) in a secured way [15]. The internal network of DirectAccess is also known as the intranet or the private network. This network establishes a connectivity which is bi-directional with internal network in a computer system to connect to Internet before the user has logged in. when the systems are not connected to the virtual network, the administrators of IT can also manage the computers remotely without being in the office [16]. A direct infrastructure can be setup in DirectAccess management by the following procedures:
b). VPN Security Issues
There are many security issues in the virtual network. The systems that are connected with VPN can be hacked by the hackers. The attacker can attack the system by exploiting the bugs and misconfigure the system of the client. There are many hacking tools that are used by intruders to hack the systems connected to a virtual network [17]. VPN hijacking and middleman attacks are attacks that are used by attackers to get access of the VPN systems. VPN hijacking is a process in which the control of the VPN network is taken over by an unauthorized user from the remote user showing that the attacker is the real user. The middleman attack is the attack which mainly attacks the traffic that are send between the communicating parties and also include insertion, deletion, interception and also changes the data and then reflects back the messages to the senders.
The issues can also arise from the user authentication in the VPN network. The network of does not give the users a strong authentication [18]. A connection of VPN should have a user authentication technique in them. Most of the VPN networks have limited methods of authentication. This provides the user facing a difficulty in security.
The VPN also has a risk on the client side when the users use the network in their homes. Users may have connection via a broadband or can have connection over the VPN network by using split tunneling. The system of the client can also have connection with some other machines which does not have security implications. This is a risk to virtual private network. There can also be connection with laptop or other mobile users [19]. The protection for security in the VPN machine is a risk to the users.
There can be a risk of connecting the system of the client because the system of the client may be infected by some malware. If the clients system is infected by a spyware or a virus, then the password of the VPN connection can be leaked
to the attacker who might attack the network. The VPN network does not provide security for this risk [21]. The virus gets spread quickly by the virus or the worm is the intranet or the extranet is affected by the spyware or malware.
There can be many security process that can be taken while dealing with a VPN connection [20]. The following steps shows the processes that can be followed while deploying a Virtual network.
VPN is known as Virtual Private Network. VPN is needed to combine all the traffics of network are held inside a tunnel which is private as well as encrypted when it is connected to public internet [1]. The user cannot reach to its destination without reaching to the end of VPN tunnel. Virtual Private Networks are very important for the reason that they can be used as a private and encrypted network to anonymize the internet traffic. No one can see what is present inside the VPN, even the ISPs, hackers of wireless network, and governments get to know about what is in the network of VPN.
There are many reasons to use VPN in an environment. A user of mobile who mainly access the information from a different work server may get the credentials of VPN for logging in the server so that they can get the access of all important files. There are many types of VPN which includes site-to-site VPN, intranet VPN, and extranet VPN. The site-to-site VPN is a local area network which is joined or is connected to other different LANs [2]. The most common way to use a VPN is by hiding the traffic of internet from the agencies which mainly gather the information which includes ISPs, governments, and websites. The user who mainly obtains the files in an illegal way uses the
VPN when they wanted to access the material that is copyright through different websites.
There are many protocols that are used by Virtual Private Network. The protocols are mainly used to encrypt the users and also corporate the data. The protocols that used are IP security (IPSec), Secure Socket Layer (SSL) or TLS (Transport Layer Protocol), PPTP (point to point tunneling protocol), L2TP (Layer 2 Tunneling Protocol), and Open Virtual private Network. The most common of all the types of VPN are site to site VPN and remote access VPN.
Remote access VPN– The remote access of VPN basically uses an infrastructure of tele-communication such as internet so that they can provide the remote users with a secure access to network of their organization. This is important when the employees of the company are working on a public hotspot or may be some other avenues that are public and then connect in the corporate network [3]. The client of the VPN especially on the user of a remote system or may be on some mobile devices get a connection to the VPN gateway on the network of the organization in which the client is working. Devices are required by the gateway so that they can authenticate their identity. After that the gateway creates a link of network back to device allowing the signal to reach on the internal resource network such as printers, intranets, and file servers locally. The diagram shows the working process of remote access VPN.
References:
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download