VPN and why you should start using it
A virtual private network
(VPN) is a network that is constructed using public wires, usually the
Internet to connect to a private network, such as a company's internal network.
There are a number of systems that enable you to create networks using the Internet as the
medium for transporting data. A VPN secures the private network, using encryption and other security mechanisms
to ensure that only authorized users can
access the network and that the data cannot be intercepted.
A
VPN is designed to provide a secure, encrypted tunnel in which to transmit the
data between the remote user and the company network. The information
transmitted between the two locations via the encrypted tunnel cannot be read
by anyone else because the system contains several elements to secure both the
company's private network and the outside network through which the remote user
connects through.
The
first step to security is usually a firewall between
the client and the host server, requiring the remote user to establish an
authenticated connection with the firewall. Encryption is also an important
component of a secure VPN. Encryption works by having all data sent from one
computer encrypted in such a way that only the computer it is sending to can
decrypt the data.
Now there
are many VPN network protocol
VPN systems
may be classified by:
·
The protocol used
to tunnel the traffic
·
The tunnel's
termination point location, e.g., on the customer edge or network-provider
edge
·
The type of
topology of connections, such as site-to-site or network-to-network
·
The levels of
security provided
·
The OSI layer they
present to the connecting network, such as Layer 2 circuits or Layer 3 network
connectivity
·
The number of
simultaneous connections
IPSec
A set of protocols developed by
the IETF to support secure exchange of packets at the IP layer. IPsec has been
deployed widely to implement VPNs. IPsec supports two encryption modes:
Transport and Tunnel.
PPTP
The Point-to-Point Tunneling
Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S.
Robotics and several remote access vendor companies, known collectively as the
PPTP Forum.
L2TP
Layer Two (2) Tunneling Protocol
is an extension to the PPP protocol that enables ISPs to operate Virtual
Private Networks (VPNs).
VPNs cannot
make online connections completely anonymous, but they can usually increase
privacy and security. To prevent disclosure of private information, VPNs
typically allow only authenticated remote access using tunneling protocols and
encryption techniques.
The VPN
security model provides:
·
Confidentiality such
that even if the network traffic is sniffed at the packet level (see network
sniffer and deep packet inspection), an attacker would only see encrypted
data
·
Sender authentication to
prevent unauthorized users from accessing the VPN
·
Message integrity to
detect any instances of tampering with transmitted messages
Now we’re done
with the technical stuff (well not really), let’s move to the part where I tell
you why you should be using a VPN:
When you connect to a VPN, you usually launch a VPN client on
your computer (or click a link on a special website), log in with your
credentials, and your computer exchanges trusted keys with a faraway server.
Once both computers have verified each other as authentic, all of your internet
communication is encrypted and secured from eavesdropping.
A VPN alone is just a way to
bolster your security and access resources on a network you’re not physically
connected to. What you choose to do with a VPN is a different story. Usually,
VPN users fall into a few separate categories:
- The student/worker. This person has responsibilities to attend to, and uses a
VPN provided by their school or company to access resources on their
network when they’re at home or traveling. In most cases, this person
already has a free VPN service provided to them, so they’re not exactly
shopping around. Also, if they’re worried about security, they can always
fire up their VPN when using airport or cafe WI-Fi to ensure no one’s
snooping on their connection
- The downloader. Whether they’re downloading legally or illegally, this
person doesn’t want on some company’s witch-hunt list just because they
have a torrenting app installed on their computer. VPNs are the only way
to stay safe when using something like BitTorrent—everything else is just a false sense of security. Better
safe than trying to defend yourself in court or paying a massive fine for
something you may or may not have even done, right?
- The privacy minded and security advocate. Whether
they’re a in a strictly monitored environment or a completely free and
open one, this person uses VPN services to keep their communications
secure and encrypted and away from prying eyes whether they’re at home or
abroad. To them, unsecured connections mean someone’s reading what you
say.
- The globetrotter. This person wants to watch the Olympics live as they happen, without dealing
with their crummy local networks. They want to check out their favorite TV
shows as they air instead of waiting for translations or re-broadcasts (or
watch the versions aired in other countries,) listen to
location-restricted streaming internet radio, or want to use a new web
service or application that looks great but for some reason is limited to
a specific country or region.
There are 2 type of VPN service providers:
- Free VPN Providers are more likely to log your activities and serve
contextual ads while you’re connected. They’re also more likely to use
your usage habits to tailor future ads to you, have fewer exit locations,
and weak commitments to privacy. They may offer great features, but if
logging and privacy are important to you, you may want to avoid them.
However, if you just need quick, painless security while traveling on a
budget, they’re a great option.
- Subscription VPN Providers usually take your privacy a bit more seriously, since you’re paying for the service. It’s unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first.
So if you’re one of the people mentioned above then vpn is
perfect for you and that is why you should be using one, but wait! There is
more
Using a VPN doesn’t mean you’re invulnerable. You should
still make sure you’re using HTTPS whenever possible, and you should still be careful about what you download.
Some VPN service providers—especially mobile ones—bundle their clients with
anti-malware scanners to make sure you’re not downloading viruses or trojans.
So which
are the top 5 VPN you should start using?
1.
Private internet access
2.
proXPN
3.
torVPN
4. expressVPN
5. it is worth mentioning here that opera browser has a VPN
embedded in their browser, worth checking out (and FREE!)
Comments
Post a Comment