Description
The file is attached below with all the instructors, Thank you.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running Head: THE VIRTUAL PRIVATE NETWORK
Virtual Private Network.
Student’s Name:
Instructor’s Name:
Course Name and Number
Date:
1
Surname 2
Introduction
The virtual Private Network (VPN) is a technology that was developed as a way to
create a safe and encrypted connection for less secure networks, like the internet. It allows
users to securely access corporate applications hence ensuring the safety of data as it travels
through secure tunnels. Authentication methods such as the use of passwords and other
unique identification ways are crucial and must be applied by the VPN users. The VPN
through the VPN solution tends to serve the purpose of dial-in access service since the VPN
service provider has the ability to host services, the VPN customers present to it (Rosado,
2013).
A well-designed VPN is prone to use several methods so as to keep connection and
data secure. They include; data confidentiality, which is the most important service whereby
data is encrypted in that all the data that one computer had, is taken, when sending to another
encoding it to take a form that only that particular computer is able to decode. Data integrity
is very crucial as verification is an important aspect to be considered when encrypting to
ensure that data safety. Data origin authentication whereby the sources of all data sent is
identified, this safeguards against various attacks intending to spoof the identity of the sender.
Anti-replay is whereby a network is able to detect and reject replayed packages and being
able to prevent spoofing.
Data tunnelling is an activity that aids in cases where it is desirable to hide identity
device originating traffic as the process involves encapsulating an entire package within
another and sending it over a network. Data tunnelling requires three different protocols;
passenger protocol which is the original data that is carried, encapsulating protocol which
serves as the protocol that is wrapped around the origina...