SlideShare a Scribd company logo
1 of 14
VPN
(Virtual Private Network)
Bijaya Khadka
College for Professional Studies
B.Sc IT VI
100115431,
Secure
low Cost
Head office in Maitedevi Branch office in Lalitpur
TRADITIONAL CONNECTIVITY
Cost?
Security?
Scability?
 A VPN is a private network that uses a public network
(usually the Internet) to connect remote sites or users
together.
VPN offers two main advantages over alternative technologies:
o Cost savings
o Network scalability
oSecure
VPN: WHAT IS IT?
VPN: WHAT IS IT?
TYPES OF VPN
 remote-access (connecting an individual computer to a network)
 site-to-site (connecting two networks together).
REMOTE ACCESS
SITE TO SITE VPN
VPN SECURITY
VPN SECURITY COMPONENT
 VPN Tunneling
 Encryption
 Authentication
 Keys
 Intrusion detection firewalls
VPN SECURITY COMPONENT
 Encryption
 Technique for scrambling and unscrambling information
 Unscramble – called clear-text
 Scrambled information – cipher-text
 Authentication
 Determine if the sender is the authorized person and if
the data has been redirect or corrupted
 User/System Authentication
 Data Authentication
VPN SECURITY COMPONENT
 Intrusion detection firewalls
 Monitors traffic crossing network parameters and
protects enterprises from unauthorized access
 Packet-level firewall checks source and destination
 Application-level firewall acts as a host computer
between the organization’s network and the Internet
FUTURE OF VPN
 VPN popularity
 Companies choosing VPN
 Cost efficient?
 New way of communicating?
Thank You

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

What's hot (19)

Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Vpn
VpnVpn
Vpn
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet security
 
Vpn
VpnVpn
Vpn
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
VPN
VPNVPN
VPN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN
VPNVPN
VPN
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 

Viewers also liked

Anger and Eating
Anger and EatingAnger and Eating
Anger and Eating
InnerHelper
 
Meeting the needs of diverse learners at nana’s
Meeting the needs of diverse learners at nana’sMeeting the needs of diverse learners at nana’s
Meeting the needs of diverse learners at nana’s
Karen Jones
 
biomass treatment and modelling -torrefaction_review inl boardman
biomass treatment and modelling -torrefaction_review inl boardmanbiomass treatment and modelling -torrefaction_review inl boardman
biomass treatment and modelling -torrefaction_review inl boardman
Steve Wittrig
 

Viewers also liked (17)

Preguntas que pueden salir
Preguntas que pueden salirPreguntas que pueden salir
Preguntas que pueden salir
 
Anger and Eating
Anger and EatingAnger and Eating
Anger and Eating
 
Meeting the needs of diverse learners at nana’s
Meeting the needs of diverse learners at nana’sMeeting the needs of diverse learners at nana’s
Meeting the needs of diverse learners at nana’s
 
Focus group_new
Focus group_new Focus group_new
Focus group_new
 
bp china cas joint programs Roles of cecc eil ceftf
bp china cas joint programs Roles of cecc eil ceftfbp china cas joint programs Roles of cecc eil ceftf
bp china cas joint programs Roles of cecc eil ceftf
 
Parts Distribution – Level 1
Parts Distribution – Level 1Parts Distribution – Level 1
Parts Distribution – Level 1
 
biomass treatment and modelling -torrefaction_review inl boardman
biomass treatment and modelling -torrefaction_review inl boardmanbiomass treatment and modelling -torrefaction_review inl boardman
biomass treatment and modelling -torrefaction_review inl boardman
 
Overview of BP Tsinghua Low Carbon Laboratory for DOE Secretary Chu
Overview of BP Tsinghua Low Carbon Laboratory for DOE Secretary ChuOverview of BP Tsinghua Low Carbon Laboratory for DOE Secretary Chu
Overview of BP Tsinghua Low Carbon Laboratory for DOE Secretary Chu
 
Koučování zaměřené na řešení (ukázka)
Koučování zaměřené na řešení (ukázka)Koučování zaměřené na řešení (ukázka)
Koučování zaměřené na řešení (ukázka)
 
Coal an energy resource
Coal an energy resourceCoal an energy resource
Coal an energy resource
 
Crif acacias flipped proyecto final
Crif acacias flipped proyecto finalCrif acacias flipped proyecto final
Crif acacias flipped proyecto final
 
2016 2017 ogrenci-el_kitabi
2016 2017 ogrenci-el_kitabi2016 2017 ogrenci-el_kitabi
2016 2017 ogrenci-el_kitabi
 
Thesis Proposal Presentation_Higgins
Thesis Proposal Presentation_HigginsThesis Proposal Presentation_Higgins
Thesis Proposal Presentation_Higgins
 
Organizationl Behaviour in an Engineering Sector Organization
Organizationl Behaviour in an Engineering Sector OrganizationOrganizationl Behaviour in an Engineering Sector Organization
Organizationl Behaviour in an Engineering Sector Organization
 
Apache Hive 2.0: SQL, Speed, Scale
Apache Hive 2.0: SQL, Speed, ScaleApache Hive 2.0: SQL, Speed, Scale
Apache Hive 2.0: SQL, Speed, Scale
 
Modbus
ModbusModbus
Modbus
 
Bp methanol presentation to China ndrc for methanol as fuels 2006
Bp methanol presentation to China ndrc for methanol as fuels  2006Bp methanol presentation to China ndrc for methanol as fuels  2006
Bp methanol presentation to China ndrc for methanol as fuels 2006
 

Similar to Virtual Private Network (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Vpn
VpnVpn
Vpn
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Virtual Private Network

  • 1. VPN (Virtual Private Network) Bijaya Khadka College for Professional Studies B.Sc IT VI 100115431,
  • 2. Secure low Cost Head office in Maitedevi Branch office in Lalitpur
  • 4.  A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. VPN offers two main advantages over alternative technologies: o Cost savings o Network scalability oSecure VPN: WHAT IS IT?
  • 6. TYPES OF VPN  remote-access (connecting an individual computer to a network)  site-to-site (connecting two networks together).
  • 10. VPN SECURITY COMPONENT  VPN Tunneling  Encryption  Authentication  Keys  Intrusion detection firewalls
  • 11. VPN SECURITY COMPONENT  Encryption  Technique for scrambling and unscrambling information  Unscramble – called clear-text  Scrambled information – cipher-text  Authentication  Determine if the sender is the authorized person and if the data has been redirect or corrupted  User/System Authentication  Data Authentication
  • 12. VPN SECURITY COMPONENT  Intrusion detection firewalls  Monitors traffic crossing network parameters and protects enterprises from unauthorized access  Packet-level firewall checks source and destination  Application-level firewall acts as a host computer between the organization’s network and the Internet
  • 13. FUTURE OF VPN  VPN popularity  Companies choosing VPN  Cost efficient?  New way of communicating?