Virtual Private Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.
Authors and Affiliations
Nnochiri, I. U. , M. Eng.
Detecting Intrusions In Multi - Tier Web Applications Using Double Guard
Internet services and applications have increased in both popularity and complexity and such services employ a web server front –end and a back –end. Thus data from web server and database server are prone to be hacked...
Design of Security Framework for Ads-B Based Systems.
The requirement for increased surveillance due to increase in flight volume in the distanced area or oceanic regions outside the range of traditional radar coverage has been fulfilled by the advent of space-based automa...
Sewage Generation and Treatment Status for the City of Delhi, its Past, Present and Future ScenarioA Statistical Analysis
Delhi, the capital of India located in northern India, has a population of over 13.9 million at present and It has grown by more than 300% since 1971 and expected to increase 23 million by 2021 at a growth rate to 26.4%...
slugA Bird Eye Review on Reduced Time Complexity by Using Data Mining and Fuzzy Techniques
In this paper, we have reviewed various research papers to know the depth knowledge in the field of reduced time complexity by using data mining or fuzzy Logic technique or combined approached. How to discard or elimina...
Classification of SSVEP Based Brain Signals using Discrete Wavelet Transform
Brain Computer Interface (BCI) sometimes called mind machine interface provides a non-muscular communication channel between the brain and the external device. It provides an alternate communication channel for people w...