Question

In: Computer Science

Use google to search for VPN uses. Make a list of how a company that hires...

Use google to search for VPN uses. Make a list of how a company that hires remote employees might us a VPN. What kinds of hardware and software do you need to run a VPN? List general steps to install and use a VPN. Describe security risks of using VPNs to a business. Submit your findings in a brief 250 word essay.

Solutions

Expert Solution

******* Answer is a bit lengthy for your ease so please pick out the points you might find very much apt and pls give a thumbs up if you are satisfied with the answer...*********

VPN which is also called as Virtual Private Network was first developed in order to make a secure connection between two networks or machines but with the rapid growth of increased restrictions and surveillance VPN are used to serve many different uses, such as:

1. Access Restricted Sites and bypass Content Surveillance:

Many countries now a day have web censorship such as restrictions to access several sites that fall under various categories such as Government Sites, Adult sites, Sites containing potential violence, Games that contain abusive content etc. These countries put up some firewalls to block access to these sites at the same time these restrictions also set up content surveillance to see what users are browsing, but with the use of a VPN server it will allow user to bypass these restrictions and surveillance and access the complete world wide web.

2. Mask Your IP Address and change the Location:

VPN allows users to hide their IP address and showing a valid temporary IP address which looks real and also allows users to manipulate their location so it looks like the user is accessing internet from an entirely different location such as different country place etc.

3. Use Open Pubic Networks or Wi-fi Securely:

Open networks or public wi-fi offer very less security or no security such as if two people are connected to a same open network then it is possible one of the user may use hacking attacks on the other user, but with the use of a VPN it prevents attackers from collecting sensitive or private information.

4. Secure communication for Enterprise Organisations:

VPN was developed to provide a secure communication between different branches of an organisation located at different locations. It is mainly used in case of remote employees working for an organisation, using VPN a user in one location can access a hardware device such as a printer at another location or branch through a secure connection.

An organisation might have different branches located at different location across the world, to establish a secure communication and data transfers between these branches the organisation cant rely on the traditional network securities, so VPN's are used to establish a secure connection across the organisation, an organisation might have several employees working remotely at different locations, these remote employees require a secure network connection to communicate with other employees so that no third party will eavesdrop on the communication and performing attacks on the data transfer to steal sensitive information in such cases these organisation use VPN's to secure the communication site-to-site transfer and prevent potential attacks.

Hardware and Software needed to run a VPN:

  • A VPN software at both ends of communication. Some of the most commonly used VPN softwares are Nord VPN, Express VPN, Setup VPN(free) etc.
  • VPN-aware routers to allow legitimate VPN traffic to pass
  • VPN server to manage the incoming and outgoing traffic and encrypting the communication

Steps to Install and Use a VPN:

  • There are several VPN third party providers such as Nord VPN, Express VPN etc which have their own applications that can be installed to connect to their VPN network.
  • On an Operation System navigate to Network Settings and select VPN options
  • Fill all the necessary credentials such as the VPN provider, Server name and address, user credentials etc. and save it.
  • In network connection your newly created VPN Connetion will appear, open its options select connect.

Risks of using VPN:

  • VPN has been providing secure network communication and preventing privacy threats since a long time but with the rapid growth of cloud computing architecture the chances of privacy threats have been increasing on a larger scale.
  • The management of handling multiple VPN connections from multiple VPN providers might cause hurdles in data transmission increasing visibility to attacks.
  • VPN security systems are slowly getting obsolete due to advent to cloud computing architecture organisations are relying other security advanced alternatives like direct links etc. and VPN's are being used for general purposes such as accessing restricted content.

Related Solutions

Create a List object that uses the binary search algorithm to search for the string "A"....
Create a List object that uses the binary search algorithm to search for the string "A". Display a message box indicating whether the value was found. Language: C#
Evaluate the use of VPN and propose an alternate solution for a company to expand their...
Evaluate the use of VPN and propose an alternate solution for a company to expand their existing VPN network to another country e.g. New Zealand. In proposing an alternate VPN network design, consider the following factors: 150 new users added 5 users in New Zealand 20% growth of users in 4 years for the entire network
Use Google to do a web search for the website of the corporation of your choice...
Use Google to do a web search for the website of the corporation of your choice that has not been researched by another student. Find that corporation's annual report to stock-holders on the website. Note that you can use other sites to find the following information but in either case include a link to your reference(s). Answer the following questions: 1. What does the report say about the corporation's view of future business challenges and the market in which it...
Google could be regarded as the search engine monopolist of the world. How would you assess...
Google could be regarded as the search engine monopolist of the world. How would you assess the Elasticity of Demand of Google; according to you, a. is it high, b. is it low, c. is it medium or d. is it impossible to tell? Please explain. ANSWER:
How has Google been effective in getting and maintaining monopoly power as a search engine? Is...
How has Google been effective in getting and maintaining monopoly power as a search engine? Is this sustainable?
JAVA How to make a graph class that uses a linked list class to store nodes...
JAVA How to make a graph class that uses a linked list class to store nodes and linked list within each node to store adjacency list The linked list class has been made already.   import java.util.*; public class LinkedList implements Iterable { private int size = 0; private Node head; private Node tail; private class Node { private T data; private Node prev; private Node next; public Node(T data) { this.data = data; } }    public Iterator iterator() {...
Over time, Google grew from an Internet search company to a global mass of related and...
Over time, Google grew from an Internet search company to a global mass of related and unrelated businesses operating around the globe. Google’s founders decided to give the organization a new name, Alphabet, to reflect its current diversity. They also gave it a new structure that would allow the highly specialized operations to function interdependently, meaning that there is flexibility and some autonomy but also unification and coordination. What type of structure is Alphabet using? a. International divisions b. Global...
Consider that you are in charge of all paid search advertising through Google for your company....
Consider that you are in charge of all paid search advertising through Google for your company. One of your colleagues is in charge of Instagram advertising. Your boss is in the process of putting together the marketing budget and has asked you to weigh in on how much should be allotted for Facebook advertising. He tells you that he feels that the organization’s funds would be better put toward increasing spending on Instagram as opposed to Google paid search advertisements....
Design a program which uses functions to sort a list and perform a binary search. Your...
Design a program which uses functions to sort a list and perform a binary search. Your program should: Iinitialize an unsorted list (using the list provided) Display the unsorted list Sort the list Display the sorted list. Set up a loop to ask the user for a name, perform a binary search, and then report if the name is in the list. Use a sentinel value to end the loop. Do not use the Python built in sort function to...
Search online and find the most recent Big Mac Index and make a list of 10...
Search online and find the most recent Big Mac Index and make a list of 10 countries including US. Which currencies are over valued and which under valued (if any)? Provide a possible explanation of why a selected currency is over valued.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT