SlideShare a Scribd company logo
Presented TuanTB Virtual Private Network& Data Security
What is a VPN? Introduction
What is a VPN? 1. Client access Site ( Client access LAN) 2. Intranet VPN 3. Extranet VPN
What is a VPN? Remote User  Internet AI&T Company
What is a VPN? Internet BachKim Company AI&T Company Intranet VPN
What is a VPN? Guest Company Internet AI&T Company Extranet VPN
What about Security for VPN connection ? Attack  via  transmission line Attack via stealing the certificate & Key
Attack via transmission line Attacker Remote User  Internet AI&T Company
How to use a VPN? 1. OpenVPN software 2.  Two Certificate (Client & Server) and one Key. 3. Password
Security Technology ,[object Object]
Dos attacks or port flooding.
Port scanningto dertermine which server UDP Ports are in a listening state
SSL/TLS handshake initiations from unauthorized machines
Larger RSA Keys (default = 1024). By using the option: KEY_SIZE
Larger symmetric keys (default = Blowfish-128-CBC). By using the option: “cipher = …”
Thereto,…Suppose  a Attacker capture some packages. These packages brings information’VPN Server (Ex: Port, Protocol, destination or source IP,…)  They can only show that, becauce they don’t have any cer or key file. ,[object Object]
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn
Bao cao vpn

More Related Content

What's hot

Wireless security
Wireless securityWireless security
Wireless security
vinay chitrakathi
 
VPN
VPNVPN
Virtual private network
Virtual private networkVirtual private network
Virtual private network
SOHIL SUNDARAM
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
Kirti Ahirrao
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
Chandresh Suthar
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
InfoSec Institute
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
barcamp.my
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 
Vpn ppt
Vpn pptVpn ppt
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Yana Altunyan
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 

What's hot (20)

Wireless security
Wireless securityWireless security
Wireless security
 
VPN
VPNVPN
VPN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 

Similar to Bao cao vpn

Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
Darshana Viduranga
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Net Sec
Net SecNet Sec
Net Sec
backdoor
 
Practical Network Security
Practical Network SecurityPractical Network Security
Practical Network Security
Sudarsun Santhiappan
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
Security
SecuritySecurity
Security
majstors
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Kuldeep Padhiyar
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
Alex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
Quobis
 
Vpn
Vpn Vpn
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
Azad Kaki
 
The vpn
The vpnThe vpn
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
Palani Kumar
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
sharetech
 

Similar to Bao cao vpn (20)

Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Net Sec
Net SecNet Sec
Net Sec
 
Practical Network Security
Practical Network SecurityPractical Network Security
Practical Network Security
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Security
SecuritySecurity
Security
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Vpn
Vpn Vpn
Vpn
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
The vpn
The vpnThe vpn
The vpn
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 

Bao cao vpn