Question

In: Computer Science

Consider the computer attacks in the previous chapters. How would a VPN protect a user from...

Consider the computer attacks in the previous chapters. How would a VPN protect a user from one or more of them?

Solutions

Expert Solution

Virtual Private Network :

             Browsing w/o VPN                                                                  Browsing with VPN

->Internet traffic of websites that don't use                       ->Internet traffic of websites is safe ,

   HTTPS can be seen and modified by anyone                             no matter if they are using HTTPS or

   on your network.                                                               not.

->Anyone on your network will be able to see                     ->No one on your network can know

   what websites you are visiting.                                                     what websites you are visiting.

No VPN At All:

I’ll use this scenario as the base: you’re in an open WiFi hotspot, connecting to a remote resource like your email, or your bank.

All the connections are unencrypted. That includes:

  • The connection from your laptop to the wireless access point (aka hotspot).
  • The connection from the wireless access point to the ISP providing the internet connection.
  • The connection from that ISP to the rest of the internet.
  • The connection to the specific service you’re using.

The largest area of concern is the connection from your laptop to the WiFi access point. That open WiFi signal traveling through the air can be “sniffed” (or read) by anyone in range with a laptop and the appropriate software.

Lately, however, there’s been concern about the fact that your ISP can monitor what you’re doing. Specifically, they can see every remote site or service you connect to, and can examine all data not otherwise encrypted you exchange with those servers.

WPA Encryption :

The traditional approach to protect yourself from open WiFi sniffing is to use WPA1 encryption built into the WiFi specification.

This secures the path between your computer and the WiFi’s access point. Hopefully, it’s how your home WiFi is configured, so as to prevent nearby homes or others from connecting to your WiFi, and through it, to your network, without the appropriate encryption password.

There are problems with this approach:

  • Most open hotspots at coffee shops, airports, and elsewhere don’t use encryption; the password requirement would confuse their customers more than it’s worth. That’s why these hotspots are called “open”.
  • When WPA is used, it protects only the connection between your computer and the WiFi access point. Everything past that point in the diagram above remains “in the clear”.

That last point becomes important because all the traffic is visible to the hotspot’s owner, should he or she care to peek, and to the internet service provider to which that hotspot is connected.

A VPN Service:

To protect yourself further, a VPN is a common solution.

A VPN securely encrypts the entire path from your computer to the VPN provider. No one along that path can see your data: not other WiFi users, not the people managing the hotspot, and not the hotspot’s ISP.

For open WiFi, or other situation with questionable security (such as connecting to the internet at your hotel), a VPN can be a great solution.


Related Solutions

Regarding Risk Assessment Computer Science Explain how you would purchase an insurance to protect your organization...
Regarding Risk Assessment Computer Science Explain how you would purchase an insurance to protect your organization in case of a security breach. Explain how we would calculate security risks to organizations to prepare for any contingencies. Please make copy paste available 250 Words
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
What are some options, according to PCI DSS, to protect external-facing Web applications from known attacks?...
What are some options, according to PCI DSS, to protect external-facing Web applications from known attacks? To perform a PCI DSS compliance audit on your e-commerce Web site, what should you incorporate into Requirement #6, “Develop and Maintain Secure Systems & Applications”? What do you recommend this organization implement for privacy data storage in long- term data storage devices?
Summarize what the effects of a Trojan horse are and how you should protect your computer...
Summarize what the effects of a Trojan horse are and how you should protect your computer system from this malware. Do you think the Trojan horse is different from or similar to a worm? Explain your reasoning.
The response time of a distributed computer system is an important quality characteristic. From previous experience,...
The response time of a distributed computer system is an important quality characteristic. From previous experience, it is known that the standard deviation of response time is 6.0 milliseconds and the sample average response time is 50.0 milliseconds.   Assuming the response time follows a normal distribution, what is the probability that the response time is more than 57 milliseconds? Answer tolerance: +/- 0.03
How would you design your system to protect the girl's privacy?
How would you design your system to protect the girl's privacy?
From a previous Chapter there is a discussion of variable costing and absorption costing. Now, consider...
From a previous Chapter there is a discussion of variable costing and absorption costing. Now, consider the following scenario: Assume that you are a cost accountant in a small manufacturing firm. You are member of the Institute of Management Accountants (IMA) and have recently become a Certified Management Accountant (CMA). The firm’s stock is publicly-traded on the New York Stock Exchange. The corporation reports its annual financial statements in conformity with United States generally accepted accounting principles (US GAAP) and...
how does one hedge, or protect themselves from economic risk?
how does one hedge, or protect themselves from economic risk?
How can we balance ourselves to protect from feelings of anxiety?
How can we balance ourselves to protect from feelings of anxiety?
How would you use data about network traffic to deter attacks to the network? question based...
How would you use data about network traffic to deter attacks to the network? question based on computer forensics
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT