Question

In: Computer Science

Use google to search for VPN uses. Make a list of how a company that hires...

Use google to search for VPN uses. Make a list of how a company that hires remote employees might us a VPN. What kinds of hardware and software do you need to run a VPN? List general steps to install and use a VPN. Describe security risks of using VPNs to a business. Submit your findings in a brief 250 word essay.

Solutions

Expert Solution

******* Answer is a bit lengthy for your ease so please pick out the points you might find very much apt and pls give a thumbs up if you are satisfied with the answer...*********

VPN which is also called as Virtual Private Network was first developed in order to make a secure connection between two networks or machines but with the rapid growth of increased restrictions and surveillance VPN are used to serve many different uses, such as:

1. Access Restricted Sites and bypass Content Surveillance:

Many countries now a day have web censorship such as restrictions to access several sites that fall under various categories such as Government Sites, Adult sites, Sites containing potential violence, Games that contain abusive content etc. These countries put up some firewalls to block access to these sites at the same time these restrictions also set up content surveillance to see what users are browsing, but with the use of a VPN server it will allow user to bypass these restrictions and surveillance and access the complete world wide web.

2. Mask Your IP Address and change the Location:

VPN allows users to hide their IP address and showing a valid temporary IP address which looks real and also allows users to manipulate their location so it looks like the user is accessing internet from an entirely different location such as different country place etc.

3. Use Open Pubic Networks or Wi-fi Securely:

Open networks or public wi-fi offer very less security or no security such as if two people are connected to a same open network then it is possible one of the user may use hacking attacks on the other user, but with the use of a VPN it prevents attackers from collecting sensitive or private information.

4. Secure communication for Enterprise Organisations:

VPN was developed to provide a secure communication between different branches of an organisation located at different locations. It is mainly used in case of remote employees working for an organisation, using VPN a user in one location can access a hardware device such as a printer at another location or branch through a secure connection.

An organisation might have different branches located at different location across the world, to establish a secure communication and data transfers between these branches the organisation cant rely on the traditional network securities, so VPN's are used to establish a secure connection across the organisation, an organisation might have several employees working remotely at different locations, these remote employees require a secure network connection to communicate with other employees so that no third party will eavesdrop on the communication and performing attacks on the data transfer to steal sensitive information in such cases these organisation use VPN's to secure the communication site-to-site transfer and prevent potential attacks.

Hardware and Software needed to run a VPN:

  • A VPN software at both ends of communication. Some of the most commonly used VPN softwares are Nord VPN, Express VPN, Setup VPN(free) etc.
  • VPN-aware routers to allow legitimate VPN traffic to pass
  • VPN server to manage the incoming and outgoing traffic and encrypting the communication

Steps to Install and Use a VPN:

  • There are several VPN third party providers such as Nord VPN, Express VPN etc which have their own applications that can be installed to connect to their VPN network.
  • On an Operation System navigate to Network Settings and select VPN options
  • Fill all the necessary credentials such as the VPN provider, Server name and address, user credentials etc. and save it.
  • In network connection your newly created VPN Connetion will appear, open its options select connect.

Risks of using VPN:

  • VPN has been providing secure network communication and preventing privacy threats since a long time but with the rapid growth of cloud computing architecture the chances of privacy threats have been increasing on a larger scale.
  • The management of handling multiple VPN connections from multiple VPN providers might cause hurdles in data transmission increasing visibility to attacks.
  • VPN security systems are slowly getting obsolete due to advent to cloud computing architecture organisations are relying other security advanced alternatives like direct links etc. and VPN's are being used for general purposes such as accessing restricted content.

Related Solutions

Use a search engine such as Google to do the following: Report the revenues for the...
Use a search engine such as Google to do the following: Report the revenues for the bottom line of the current (last) budget approved by Congress (surplus or shortage). Report the deficit for the bottom line of the current (last) budget approved by Congress (surplus or shortage). Report the debt held by the public for the bottom line of the current (last) budget approved by Congress (surplus or shortage). Discuss the inferences drawn from the numbers collected and provide insight...
Create a List object that uses the binary search algorithm to search for the string "A"....
Create a List object that uses the binary search algorithm to search for the string "A". Display a message box indicating whether the value was found. Language: C#
Evaluate the use of VPN and propose an alternate solution for a company to expand their...
Evaluate the use of VPN and propose an alternate solution for a company to expand their existing VPN network to another country e.g. New Zealand. In proposing an alternate VPN network design, consider the following factors: 150 new users added 5 users in New Zealand 20% growth of users in 4 years for the entire network
Use Google to do a web search for the website of the corporation of your choice...
Use Google to do a web search for the website of the corporation of your choice that has not been researched by another student. Find that corporation's annual report to stock-holders on the website. Note that you can use other sites to find the following information but in either case include a link to your reference(s). Answer the following questions: 1. What does the report say about the corporation's view of future business challenges and the market in which it...
Select a topic or organization, use Google to search, and view the results. What are the...
Select a topic or organization, use Google to search, and view the results. What are the forms of advertising do you see there? How are they different? Describe the types of online advertising available today. Which type of advertising does Google currently dominate? Why? How can Google be successful in the display advertising business? What other areas of growth are likely to be pursued by Google in the future?
Use Google to search for online storage services or cloud backup. Look for an article or...
Use Google to search for online storage services or cloud backup. Look for an article or post that describes available services for remote backups. List two services and locate additional information about each, including how to enroll, costs to use, known security risks or breaches and customer reviews. Find articles that describe how companies are adopting online storage services and locate statistics about how many currently are doing so as well as predictions. Have you ever used an online storage...
A company uses AD and RADIUS To authenticate VPN in Wi-Fi connections. The Chief Information Security...
A company uses AD and RADIUS To authenticate VPN in Wi-Fi connections. The Chief Information Security Officer initiates a protect to extend a third-party MFA solution to VPN. During the pilot phase, VPN users successfully get an MFA challenge; however, they also get the challenge when connecting to Wi-Fi, which is not desirable. Which of the following best explains why you just are getting the MFA challenge in using Wi-Fi? In the radius server, the proxy rule has not specified...
Please use the search engine (Such as google and baidu) to visit four different websites about...
Please use the search engine (Such as google and baidu) to visit four different websites about hotels or scenic spots, describe the features of these sites and multimedia elements. What kind of multimedia presentation does the site take? Video? Flash? 3D animation or only images? Please use the search engine (Such as google and baidu) to visit four different websites about hotels or scenic spots, describe the features of these sites and multimedia elements. What kind of multimedia presentation does...
Use Google to search for articles discussing the built-in security features of at least two web...
Use Google to search for articles discussing the built-in security features of at least two web browsers. Submit your findings in a brief 250 word essay.
Please use the search engine (Such as google and baidu) to visit four different websites about...
Please use the search engine (Such as google and baidu) to visit four different websites about hotels or scenic spots, describe the features of these sites and multimedia elements.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT