Virtual Private Networking: Do You Want Your Data Cyber Safe?
IT Blog, Useful Tips,

Virtual Private Networking: Do You Want Your Data Cyber Safe?

2 m read
QArea Expert
QArea Expert
September 30, 2015
Share on
Reading Time: 2 minutes

A little bit of history

Before the advent of the Internet all the communication in the US was performed via telephone system and went through central hubs. If anything happened with some of them (nuclear attack, for instance), the communication infrastructure would be broken and communication between cities would be disabled.

During the times of Cold War, with all the arm race and threats of nuclear attacks poised over the USA, this seemed pretty feasible and alarming, so the U.S militaries found the solution and the Internet was invented (Arpanet at that time)It is a self-repairing system. The communication goes through a set of routers. If anything happens with some of them, the system will automatically restructure itself through another set of routers. But the Internet is a public network and thus anyone can hack into it and take any data they want. This poises a huge security problem which was eventually resolved too. To protect sensitive data VPN (Virtual Private Network) was created. It allows you to connect securely computers and networks.

How it works

VPN uses a tunneling protocol. It sets a tunnel and encrypts the data traveling inside the tunnel. If the  tunnel ‘feels’ that someone is trying to intrude into it, it will shut itself down and recreate itself through another set of routers.

Security components

  • Authentication (you have to provide credentials)
  • Tunnel (tunneling protocol is used)
  • Encryption (the data are encrypted, so even if somebody manages to grab them, they will be absolutely useless)

Different kinds of protocols

  • Point to point tunnel protocols. They are not recommended to use since they are considered outdated and not secure
  • IP security (IPsec protocols) are mostly used in enterprises, when a server sits in the organization or in the office and employees want to reach some data remotely. For instance, IBM use them as their encryption protocols
  • SSL encryption protocols are employed mostly for average users

Advantages

  • It allows to connect securely computers and networks
  • It allows you to act as if you were local (you can access programs which are forbidden in some countries, for instance, Skype)

Pitfalls

  • Bad wiring in your building will affect the quality of work of VPN
  • Old routers may not connect to VPN (if they don’t have VPN pass-through)
  • VPN is a client-server technology and you should make sure that the vendor of client corresponds to the vendor of server
  • Your Internet upload speed really matters

Categories

Recent Posts

  • Using Microservices to Improve Software Performance

    Using Microservices to Improve Software Performance

    Read more Using Microservices to Improve Software Performance
  • The Best Languages for Microservices

    The Best Languages for Microservices

    Read more The Best Languages for Microservices
  • 8 Reasons You Need To Go #Golang

    8 Reasons You Need To Go #Golang

    Read more 8 Reasons You Need To Go #Golang
  • The Best Uses of Iot in Healthcare Industry

    The Best Uses of Iot in Healthcare Industry

    Read more The Best Uses of Iot in Healthcare Industry
  • QArea at DLD Digital Conference (Tel Aviv)

    QArea at DLD Digital Conference (Tel Aviv)

    Read more QArea at DLD Digital Conference (Tel Aviv)
  • Who Runs Microservices? Devops

    Who Runs Microservices? Devops

    Read more Who Runs Microservices? Devops

Subscribe

Yes

Tags
Share on
Close icon
Privacy Preference Center