Networks and VPN

813 views

Published on

Computer Networks and how it relates to Internet Security

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
813
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
25
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svgSchool IP : http://commons.wikimedia.org/wiki/File:School_ip.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svgFile Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.pngVPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg
  • RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg
  • Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg
  • Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svg
  • Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg
  • House Number:http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg
  • Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpgPublic sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG
  • Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  • Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  • Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG
  • Mail truck:http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg
  • Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  • D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpgCisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png
  • Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677|
  • Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg
  • Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg
  • Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.pngYouTube:http://commons.wikimedia.org/wiki/File:Youtube.svgNo Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg
  • Networks and VPN

    1. 1. Networks and VPN<br />Computer Networks and how it relates to Internet Security<br />
    2. 2. Purpose<br />The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security.<br />Topics Covered:<br />Computer Networks <br />IP Addressing<br />Traffic Routing<br />Security<br />
    3. 3. Networking Terms<br />Network Switch<br />Connects multiple computers on network<br />Router<br />Connects a network to the Internet<br />Contains a list of its known addresses<br />Protects its own network from the outside<br />Ethernet cable<br />Connects a computer to a network<br />WIFI<br />A wireless connection to a network<br />
    4. 4. Computer Network<br />A computer network is a collection of computers that are connected and are communicating.<br />They generally communicate through a communication device called a network switch, or switch for short.<br />
    5. 5. Network Types<br /><ul><li>LAN - Local Area Network
    6. 6. WAN - Wide Area Network
    7. 7. VPN - Virtual Private network</li></ul>Computer networks come in various types, shapes, and sizes. We’ll talk about the following:<br />
    8. 8. Local Area Networks<br />A LAN is a network that is limited to a specific geographical location.<br />Used in a home, smaller school, or smaller business.<br />The computers will likely be connected using Ethernet cables or though WIFI.<br />
    9. 9. Wide Area Networks<br />A WAN is a collection of LANs that are interconnected, or simply, a network of LANs.<br />A WAN is useful for:<br />Splitting larger networks<br />Joining together networks in different geographical locations.<br />
    10. 10. Communication<br />So, how do these computers communicate?<br />In order for computers to communicate with each other, they need to have an addressing scheme.<br />Networks use Internet Protocol addresses(IP addresses).<br />
    11. 11. IP Addresses<br />An IP address is a numeric number assigned to a device. Each IP address on a particular network is unique.<br />The IP address tells the networking equipment the device’s location on the network.<br />Think of it like your house address:<br />Your street and house number identify your location. However, they may not be unique, but they are unique within your zip code.<br />
    12. 12. Public and Private IP Addresses<br />An IP address may be public or private.<br />
    13. 13. Public and Private IP Addresses<br />Think about it like a university mail system.<br />
    14. 14. Public and Private IP Addresses<br />The student’s mailbox at the university is private and only has meaning to the university.<br />
    15. 15. Public and Private IP Addresses<br />The university’s address is public and known by the post office.<br />
    16. 16. Public and Private IP Addresses<br />The post office only knows to deliver the mail to the university.<br />
    17. 17. Public and Private IP Addresses<br />The university then has the information to know which student’s box the mail goes in.<br />
    18. 18. Routers<br />Routers direct or route the internet traffic.<br />When a router receives data with a destination IP address, it knows where to send it.<br />Routers come in all shapes and sizes and are built for different purposes.<br />Home router<br />Commercial router<br />
    19. 19. Routing<br />The university post office acts like a router:<br />It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere.<br />When it receives mail from the public post office, it determines what to do with it.<br />If the student’s mailbox exists, it is delivered. If the student’s mailbox does not exist, the mail is discarded or returned.<br />
    20. 20. Security<br />Now that you understand how networks operate, let’s talk a bit about security.<br />
    21. 21. Unsecure WAN<br />Typically, most data across the internet is open and can be intercepted and then downloaded.<br />For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded.<br />A VPN can prevent this scenario!<br />
    22. 22. Virtual Private Network<br />A VPN extends a LAN to a remote user using a public network, such as the internet.<br />This is possible by creating a secure tunnel from the user to a VPN Server on another network.<br />Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.<br />
    23. 23. A WAN using VPN<br />A VPN creates a tunnel through the Internet.<br />The data exchange between the office networks are all encrypted.<br />Each office can now access the data in the other offices as if they were on the same network.<br />
    24. 24. Why use a VPN?<br />Securely access files on a remote LAN with ease<br />Cost Effective<br />Location hiding<br />
    25. 25. VPN – Location Hiding<br />Tom recently moved to Turkey<br />Tom needs YouTube for a school assignment<br />…but, Turkey blocks YouTube<br />
    26. 26. VPN – Location Hiding<br />Tom has an idea!<br />Tom connects to his school’s network in the USA via VPN<br />
    27. 27. VPN – Location Hiding<br />Bingo! He can know access YouTube.<br />Why? The VPN allowed him to view YouTube as if he was physically connected at his school.<br />
    28. 28. Resources<br />http://www.ehow.com/about_4671848_what-is-vpn.html<br />http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf<br />http://en.wikipedia.org/wiki/Routing_table<br />http://en.wikipedia.org/wiki/Router<br />http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm<br />http://en.wikipedia.org/wiki/IP_address<br />http://en.wikipedia.org/wiki/Computer_network<br />http://en.wikipedia.org/wiki/Virtual_private_network<br />
    29. 29. Image References<br />Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg<br />School IP: http://commons.wikimedia.org/wiki/File:School_ip.svg<br />Router: http://commons.wikimedia.org/wiki/File:Router.svg<br />File Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.png<br />VPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg<br />RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg<br />LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg<br />LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg<br />House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg<br />Mailboxes: http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg<br />
    30. 30. Image References cont.<br />D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpg<br />Cisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png<br />Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677|<br />Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg<br />Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpg<br />Public sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG<br />Mail truck: http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg<br />Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG<br />Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg<br />
    31. 31. Image References cont.<br />Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.png<br />YouTube: http://commons.wikimedia.org/wiki/File:Youtube.svg<br />No Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg<br />

    ×