Virtual Private Network Security

Abstract

This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.

Authors and Affiliations

Nnochiri, I. U. , M. Eng.

Keywords

Related Articles

Design an Expert System for Ranking of Software metrics

This research paper represents a framework for ranking of software metrics based on expert opinion elicitation and fuzzy-based matrix methodology. The proposed methodology is able to accommodate the imprecise and inexac...

Analysis of Different Lubricants in Gearbox Performance using Ansys

In the present paper CFD based investigation has been reported in order to study about the power losses for different gear oils in operating conditions and alternative of it. It has been observed that there is significa...

Thermal Analysis of Radiator with Different Nano Fluids

The advancement in automobile technology is increasing day to day. The efficiency of the engine depends on heat transfer rate of radiator in automobile and further it relays on flow capacity of fluids and material used...

Design of Deterministic Finite Automata using Pattern Matching Strategy

An automaton is an entity work for specific computation and designed for that computation. Based on the problem automaton can be designed to satisfy the given problem. Automata have finite and infinite types. Finite aut...

Stresses around dental implant and its failures: A Review

Dental implant is more important for failures of real teeth. Dental implant is an option for the damaged teeth. This paper shows the important value of dental implant and the when masticatory forces acts on the surface...

Download PDF file
  • EP ID EP19174
  • DOI -
  • Views 257
  • Downloads 4

How To Cite

Nnochiri, I. U. , M. Eng. (2014). Virtual Private Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19174