Networks and VPN


Published on

Computer Networks and how it relates to Internet Security

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Gnome Network: IP : Lock: Tunnel:
  • RJ45 Jack:
  • Network:
  • Network:
  • Gnome Network:
  • House Number:
  • Private sign: sign:
  • Mailboxes:
  • Mailboxes:
  • Cardiff University:
  • Mail truck:
  • Mailboxes:
  • D-Link Router: Router:
  • Letter:|
  • Paddle lock:
  • Tunnel:
  • Turkey Map: Sign:
  • Networks and VPN

    1. 1. Networks and VPN<br />Computer Networks and how it relates to Internet Security<br />
    2. 2. Purpose<br />The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security.<br />Topics Covered:<br />Computer Networks <br />IP Addressing<br />Traffic Routing<br />Security<br />
    3. 3. Networking Terms<br />Network Switch<br />Connects multiple computers on network<br />Router<br />Connects a network to the Internet<br />Contains a list of its known addresses<br />Protects its own network from the outside<br />Ethernet cable<br />Connects a computer to a network<br />WIFI<br />A wireless connection to a network<br />
    4. 4. Computer Network<br />A computer network is a collection of computers that are connected and are communicating.<br />They generally communicate through a communication device called a network switch, or switch for short.<br />
    5. 5. Network Types<br /><ul><li>LAN - Local Area Network
    6. 6. WAN - Wide Area Network
    7. 7. VPN - Virtual Private network</li></ul>Computer networks come in various types, shapes, and sizes. We’ll talk about the following:<br />
    8. 8. Local Area Networks<br />A LAN is a network that is limited to a specific geographical location.<br />Used in a home, smaller school, or smaller business.<br />The computers will likely be connected using Ethernet cables or though WIFI.<br />
    9. 9. Wide Area Networks<br />A WAN is a collection of LANs that are interconnected, or simply, a network of LANs.<br />A WAN is useful for:<br />Splitting larger networks<br />Joining together networks in different geographical locations.<br />
    10. 10. Communication<br />So, how do these computers communicate?<br />In order for computers to communicate with each other, they need to have an addressing scheme.<br />Networks use Internet Protocol addresses(IP addresses).<br />
    11. 11. IP Addresses<br />An IP address is a numeric number assigned to a device. Each IP address on a particular network is unique.<br />The IP address tells the networking equipment the device’s location on the network.<br />Think of it like your house address:<br />Your street and house number identify your location. However, they may not be unique, but they are unique within your zip code.<br />
    12. 12. Public and Private IP Addresses<br />An IP address may be public or private.<br />
    13. 13. Public and Private IP Addresses<br />Think about it like a university mail system.<br />
    14. 14. Public and Private IP Addresses<br />The student’s mailbox at the university is private and only has meaning to the university.<br />
    15. 15. Public and Private IP Addresses<br />The university’s address is public and known by the post office.<br />
    16. 16. Public and Private IP Addresses<br />The post office only knows to deliver the mail to the university.<br />
    17. 17. Public and Private IP Addresses<br />The university then has the information to know which student’s box the mail goes in.<br />
    18. 18. Routers<br />Routers direct or route the internet traffic.<br />When a router receives data with a destination IP address, it knows where to send it.<br />Routers come in all shapes and sizes and are built for different purposes.<br />Home router<br />Commercial router<br />
    19. 19. Routing<br />The university post office acts like a router:<br />It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere.<br />When it receives mail from the public post office, it determines what to do with it.<br />If the student’s mailbox exists, it is delivered. If the student’s mailbox does not exist, the mail is discarded or returned.<br />
    20. 20. Security<br />Now that you understand how networks operate, let’s talk a bit about security.<br />
    21. 21. Unsecure WAN<br />Typically, most data across the internet is open and can be intercepted and then downloaded.<br />For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded.<br />A VPN can prevent this scenario!<br />
    22. 22. Virtual Private Network<br />A VPN extends a LAN to a remote user using a public network, such as the internet.<br />This is possible by creating a secure tunnel from the user to a VPN Server on another network.<br />Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.<br />
    23. 23. A WAN using VPN<br />A VPN creates a tunnel through the Internet.<br />The data exchange between the office networks are all encrypted.<br />Each office can now access the data in the other offices as if they were on the same network.<br />
    24. 24. Why use a VPN?<br />Securely access files on a remote LAN with ease<br />Cost Effective<br />Location hiding<br />
    25. 25. VPN – Location Hiding<br />Tom recently moved to Turkey<br />Tom needs YouTube for a school assignment<br />…but, Turkey blocks YouTube<br />
    26. 26. VPN – Location Hiding<br />Tom has an idea!<br />Tom connects to his school’s network in the USA via VPN<br />
    27. 27. VPN – Location Hiding<br />Bingo! He can know access YouTube.<br />Why? The VPN allowed him to view YouTube as if he was physically connected at his school.<br />
    28. 28. Resources<br /><br /><br /><br /><br /><br /><br /><br /><br />
    29. 29. Image References<br />Gnome Network:<br />School IP:<br />Router:<br />File Lock:<br />VPN Tunnel:<br />RJ45 Jack:<br />LAN Network:<br />LAN/WAN Network:<br />House Number: House Number:<br />Mailboxes:<br />
    30. 30. Image References cont.<br />D-Link Router:<br />Cisco Router:<br />Letter:|<br />Paddle lock:<br />Private sign:<br />Public sign:<br />Mail truck:<br />Cardiff University:<br />Tunnel:<br />
    31. 31. Image References cont.<br />Turkey Map:<br />YouTube:<br />No Sign:<br />