Virtual Private Network Security

Abstract

This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.

Authors and Affiliations

Nnochiri, I. U. , M. Eng.

Keywords

Related Articles

How to Mitigate the Impact of Supply Chain Disruptions and Risks ?

In this dynamic environment, supply chain disruptions are increasing and leading to more pressures toward adapting and quickly responding in an agile way to that change. The purpose of this article is to explore how org...

Experimental Investigation on Effective Utilization of Natural Wastes with Lime for Making Light Weight Bricks

In this modern era considerable attention has been paid to the utilization of alternative materials, which bear higher engineering quality than traditional materials and are financially affordable. With that in mind, a...

Secure Transaction By Using Wireless Password with Shuffling Keypad

In general, all swiping card authentication system having different possibilities of password guessing by mean of shoulder surfing is an attack and overlooking attack. This problem can be overcome with new advance solut...

A Crypto System Based On Revocable and Unique Session Key

To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the k...

Absorption Refrigeration Techniques with Phase Change Material and Dual Condenser Technology: An Extensive Review

Due to unavailability of source heat at times, temperature fluctuations in the Evaporator chamber occurs which is considered to be one of the drawbacks in this system. To avoid this issue, use of Phase Change Material (...

Download PDF file
  • EP ID EP19174
  • DOI -
  • Views 226
  • Downloads 4

How To Cite

Nnochiri, I. U. , M. Eng. (2014). Virtual Private Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19174