VPN (English version): Difference between revisions
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions. | Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions. | ||
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.[[http://technet.microsoft.com/en-us/library/bb742566.aspx 1] | A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.[[http://technet.microsoft.com/en-us/library/bb742566.aspx 1]] | ||
== '''Other Details'''== | == '''Other Details''' == | ||
== | == '''References''' == | ||
[1] Microsoft Technet. "Virtual Private Networking: An Overview".<br> | [1] Microsoft Technet. "Virtual Private Networking: An Overview".<br> | ||
Revision as of 09:59, 5 May 2017
VPN (Virtual Private Network)
A VPN or Virtual Private Network enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network. It is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.[1]
Other Details
References
[1] Microsoft Technet. "Virtual Private Networking: An Overview".
Author: Christian Cataldo
Curriculum: Cyber Security Engineering
Group: C11
Date created: April 9, 2017
Last modification: April 9, 2017