Virtual Private Network Security

Abstract

This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.

Authors and Affiliations

Nnochiri, I. U. , M. Eng.

Keywords

Related Articles

Corrosion Inhibition of Copper Metal by Prosopis Cineraria Leaves as Green Corrosion Inhibitor in Acidic Medium

Ethanolic extract of Prosopis cineraria leaves(EEPcL) behaves as a green corrosion inhibitor to replace toxic chemicals. The corrosion inhibition of copper in 0.5 N HCl by Prosopis cineraria leaves has been studied by m...

Sensor Based Human Gait Recognition for Drunk State

Many research studies have examined human activity recognition and body posture and gait detection. Relatively fewer studies have investigated specifically into shaky, abnormal gait or how drunken person move in a low l...

Digital Watermarking on Multimedia Application

This paper incorporates the detail investigation of Digital watermarking clarification, idea and the principle commitments in this field, for example, classes of watermarking procedure that show which watermarking techn...

In Bituminous Concrete Mixes Utilization of Waste Plastic Materials

The constant growth in road traffic couple with an inadequate degree of maintenance due to lack of funds has caused a continuous and accelerated deterioration of the road network. To improve this process, numerouskinds...

Review of Integrity Constraint in MySQL

For the semantic correctness of database records, Integrity constraints or data constraints are proper representations of invariant conditions. Constraints can be articulated in declarative languages such as data log, p...

Download PDF file
  • EP ID EP19174
  • DOI -
  • Views 270
  • Downloads 4

How To Cite

Nnochiri, I. U. , M. Eng. (2014). Virtual Private Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19174