Mobile and Wireless Data Security Group work: Naim Latifi Alvaro Pariente
What is VPN ? <ul><ul><li>Virtual Private Networks provides secure data transmission across public network infrastructure ...
Secure connection
VPN server-client
Security mechanisms through VPN <ul><ul><li>Authorization - VPN connections are only created for users and routers that ha...
VPN cont’d <ul><li>VPNs today use of the IPsec protocol. It provides the following types:  </li></ul><ul><li>-Confidential...
IPsec protocol
. THANK YOU FOR YOUR ATTENTION  !
Upcoming SlideShare
Loading in …5
×

Presentation VPN

903 views
833 views

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
903
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
8
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Presentation VPN

  1. 1. Mobile and Wireless Data Security Group work: Naim Latifi Alvaro Pariente
  2. 2. What is VPN ? <ul><ul><li>Virtual Private Networks provides secure data transmission across public network infrastructure and incorporating data encryption and tunneling techniques to provide data security. </li></ul></ul><ul><ul><li>VPN enable to create or join a private network across an existing public network by opening a temporary, encrypted connection between two host. </li></ul></ul><ul><ul><li>It uses the existing structure that encompasses both LAN and WAN. </li></ul></ul><ul><ul><li>Some benefits of using VPN: </li></ul></ul><ul><li>- data security is undoubtedly a major issue </li></ul><ul><li>- losing password </li></ul><ul><ul><li>From the economic point of view, creating a VPN maybe be less expansive than maintaining leased lines. In fact lost data may turn out to be more expensive. </li></ul></ul>
  3. 3. Secure connection
  4. 4. VPN server-client
  5. 5. Security mechanisms through VPN <ul><ul><li>Authorization - VPN connections are only created for users and routers that have been authorised. </li></ul></ul><ul><ul><li>Data Encryption- the protocols used to create VPN connection allow encrypted data to be sent over a network. </li></ul></ul><ul><ul><li>Authentication- This is a vital security concern. </li></ul></ul><ul><ul><li>Packet Filtering – to enhance security of VPN server, packet filtering must be configured so that the server only performs VPN routing </li></ul></ul><ul><ul><li>VPN can be build around various protocol depending on both the hardware and software capabilities . </li></ul></ul><ul><ul><li>VPN’s recognized protocols are PPTP and L2TP combined with IPsec. </li></ul></ul>
  6. 6. VPN cont’d <ul><li>VPNs today use of the IPsec protocol. It provides the following types: </li></ul><ul><li>-Confidentiality </li></ul><ul><li>- Integrity </li></ul><ul><li>- Data origin authentication </li></ul><ul><li>- Traffic analysis protection </li></ul><ul><ul><li>Three scenarios of VPN: </li></ul></ul><ul><li>- remote user access </li></ul><ul><li>- Tunneling </li></ul>
  7. 7. IPsec protocol
  8. 8. . THANK YOU FOR YOUR ATTENTION !

×