SlideShare a Scribd company logo
VIRTUAL PRIVATE NETWORK(VPN)
ABOUT VPN
 A virtual private network (VPN) is a technology that
creates a safe and encrypted connection over a less
secure network, such as the internet. VPN technology
was developed as a way to allow remote users and
branch offices to securely access corporate applications
and other resources. To ensure safety, data travels
through secure tunnels and VPN users must use
authentication methods -- including passwords,
tokens and other unique identification methods -- to
gain access to the VPN.
TYPES OF VPN
There are two basic types of VPN-
 Remote Access VPN- It allows a user to connect to a private
network and avail its services and resources securely. The
connection between the user and the private network
happens through the internet and the connection is secure
and private. It is useful for business as well as home users.
 Site to Site VPN- It is also called as router-to-router VPN
and is mostly used in corporate businesses. Companies,
located at different geographical locations connect to the
network of one office location to the network of another
office location. When networks of the multiple
offices of the same company are connected using
site-to-site VPN, it is called as intranet based VPN.
When companies use site-to-site VPN to connect to
the office of different company, it is called as
extranet based VPN. Basically, a site-to-site VPN
creates a virtual bridge between the networks at
geographically distant offices and connects them
through the internet and maintain a secure and
private communication between the networks.
TYPES OF VPN PROTOCOLS
 Internet Protocol Security or IPSec- Internet Protocol
Security or IPSec is used to secure Internet communication
across an IP network. IPSec secures Internet Protocol
communication by authenticating the session and encrypts
each data packet during the connection.
IPSec operates in two modes, Transport mode and
Tunneling mode, to protect data transfer between two
different networks. The transport mode encrypts the
message in the data packet and the tunneling mode
encrypts the entire data packet. IPSec can also be used with
other security protocols to enhance the security system.
 Layer 2 Tunneling Protocol (L2TP):L2TP or Layer 2
Tunneling Protocol is a tunneling protocol that is usually
combined with another VPN security protocol like IPSec to
create a highly secure VPN connection. L2TP creates a
tunnel between two L2TP connection points and IPSec
protocol encrypts the data and handles secure
communication between the tunnel.
 Point – to – Point Tunneling Protocol (PPTP): PPTP or
Point-to-Point Tunneling Protocol creates a tunnel and
encapsulates the data packet. It uses a Point-to-Point
Protocol (PPP) to encrypt the data between the
connection. PPTP is one of the most widely used VPN
protocol and has been in use since the time of Windows 95.
Apart from Windows, PPTP is also supported on Mac and
Linux.
ADVANTAGES OF VPN
• Enriched Security- When you connect to a network like
the VPN, the data is kept secured and encrypted. In this
way, the information is kept away from the hacker’s eyes.
• Remote Control- In case of a company, the advantage of
having a VPN is that the information can be accessed even
from home or any other place. That’s why VPN can increase
productivity within a company.
• Share files- A VPN service can be used if you have a
group that needs to share data for an extended period.
• Online Anonymity- Through a VPN you can browse the web
in complete anonymity. Compared to hide IP software or web
proxies, the advantage of a VPN service is that it allows access
to both web applications and websites in complete
anonymity.
• Unblock websites and bypass filters- VPNs are great for
accessing blocked websites or for bypassing internet filters.
That is why there is an increased number of VPN services
used in countries where internet censorship is applied.
 Change IP address- If you need an IP address from
another country, the VPN can provide it.
 Better performance- Bandwidth and efficiency of the
network can generally be increased once a VPN solution
is implemented.
 Reduce Costs- Once a VPN network is created, the
maintenance cost is very low. More than that, if you opt
for a service provider, the network setup and surveillance
is no more a concern.
DISADVANTAGES OF VPN
 Performance Issues- If you are using a VPN service, it may
create a problem while taking to the website one wants to get
access. The VPN service connects the user to a private
network. Some Virtual Private Networks might take a longer
time to load the website which is to be accessed. This is the
most common disadvantage which may be seen in using a
VPN service.
 Matter of legality- The use of Virtual Private Networks
(VPNs) may not be legal in a country. Local organizations
and companies may face the problems of censorship to a
particular website. This is mainly due to the absence of direct
control over the Internet while
Using a VPN. So a reliability of a VPN comes under
question. However, it is not illegal in India as there is not
any specific law regarding VPN.
 VPN might intrude in one’s online activity and use his
data- Some VPN providers might ask for data in exchange
of service. There is no complete protection of your online
browsing as it can be tracked by the VPN service providers.
Even though a VPN can hide the real IP address and
remove internet restrictions, but there is no security of
one’s online browsing. So the care must be taken while
using a free or a low cost VPN.
 Difficulty in its Set-Up:- It might not be very difficult for
Individual users to use a VPN service which can simply
be achieved by downloading it in the form of any app or
software. But companies may find it difficult to set-up a
virtual private network over their premises which may ,
in result, bring complexity to their network connections
and affect each device used in the companies.
 Add more costs- VPN is a premium service which is not
available free. If one wants to use a VPN router, he will
also need an additional router hardware with it. There
are a lot of private connections but they are generally not
reliable and have lots of limitations.
VPNs in India
How does an Indian VPN work?
If you are living in India and plan to travel to any part of
the world, you can connect back to your home
network. You can connect back to home with your
family and friends. This means that if you are an
Indian living in any part of the world, can securely and
privately get access to internet. Some of the frequently
used VPNs in India are-
 ExpressVPN
 NordVPN
 PrivateVPN
 IPVanish
 ProtonVPN
The above mentioned VPNs in India provide more
than a thousand servers and locations with respective
average speeds, allow torrents and number of
connections at the same time with supported systems
like MacOS, Windows, Android, iOs and windows
Phone. So VPNs
Case Law
 Internet Service Providers vs. UOI (2005):-
" We observed that though VPN is being defined and discussed by
both the parties, on access through Internet as well as on direct
leased line. The Respondent mentioned that the VPN provided
on direct leased line by ISPs is not allowed. This stand of the
DOT we accept because by basic definition of ISP, it has to be
only Internet based activity. License of ISP permits them the
activity concerned with access of Internet and use of its content
for IT enabled services. As rightly contended by DOT, VPN was
not allowed as a part of ISP license, it is fair for us, therefore, to
hold that it becomes a separate service. The quantum of entry fee
and revenue share to be charged for a separate service from the
service provider would require the recommendations of TRAI as
per Sec 11 (1)(a)(i)(ii) of TRAI Act.”
Thank you
SONALIKA SINGH
B.A.L.L.B
DIV- B
ROLL NO. 59

More Related Content

What's hot

Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
Global Knowledge Training
 
Internet Leased lines
Internet Leased linesInternet Leased lines
Internet Leased lines
Corporate Services
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
Firewalls
FirewallsFirewalls
Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
Binod Poudel
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
Sehajbir Singh
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
Amjad Bhutto
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 

What's hot (20)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Computer network
Computer networkComputer network
Computer network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Internet Leased lines
Internet Leased linesInternet Leased lines
Internet Leased lines
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Firewalls
FirewallsFirewalls
Firewalls
 
Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

Similar to Virtual private network(vpn)

Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
AceAtigaVallo
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
Humza Sajid
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
Vograce
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdf
EIHEducation
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
EIHEducation
 
What is a VPN.pdf
What is a VPN.pdfWhat is a VPN.pdf
What is a VPN.pdf
EIHEducation
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
SonuSingh81247
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
Top 10 vpn
Top 10 vpnTop 10 vpn
Top 10 vpn
top10nvpn
 

Similar to Virtual private network(vpn) (20)

Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
 
What is a VPN.pdf
What is a VPN.pdfWhat is a VPN.pdf
What is a VPN.pdf
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Top 10 vpn
Top 10 vpnTop 10 vpn
Top 10 vpn
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Virtual private network(vpn)

  • 2. ABOUT VPN  A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources. To ensure safety, data travels through secure tunnels and VPN users must use authentication methods -- including passwords, tokens and other unique identification methods -- to gain access to the VPN.
  • 3. TYPES OF VPN There are two basic types of VPN-  Remote Access VPN- It allows a user to connect to a private network and avail its services and resources securely. The connection between the user and the private network happens through the internet and the connection is secure and private. It is useful for business as well as home users.  Site to Site VPN- It is also called as router-to-router VPN and is mostly used in corporate businesses. Companies, located at different geographical locations connect to the network of one office location to the network of another
  • 4. office location. When networks of the multiple offices of the same company are connected using site-to-site VPN, it is called as intranet based VPN. When companies use site-to-site VPN to connect to the office of different company, it is called as extranet based VPN. Basically, a site-to-site VPN creates a virtual bridge between the networks at geographically distant offices and connects them through the internet and maintain a secure and private communication between the networks.
  • 5. TYPES OF VPN PROTOCOLS  Internet Protocol Security or IPSec- Internet Protocol Security or IPSec is used to secure Internet communication across an IP network. IPSec secures Internet Protocol communication by authenticating the session and encrypts each data packet during the connection. IPSec operates in two modes, Transport mode and Tunneling mode, to protect data transfer between two different networks. The transport mode encrypts the message in the data packet and the tunneling mode encrypts the entire data packet. IPSec can also be used with other security protocols to enhance the security system.
  • 6.  Layer 2 Tunneling Protocol (L2TP):L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined with another VPN security protocol like IPSec to create a highly secure VPN connection. L2TP creates a tunnel between two L2TP connection points and IPSec protocol encrypts the data and handles secure communication between the tunnel.  Point – to – Point Tunneling Protocol (PPTP): PPTP or Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the data packet. It uses a Point-to-Point Protocol (PPP) to encrypt the data between the connection. PPTP is one of the most widely used VPN protocol and has been in use since the time of Windows 95. Apart from Windows, PPTP is also supported on Mac and Linux.
  • 7. ADVANTAGES OF VPN • Enriched Security- When you connect to a network like the VPN, the data is kept secured and encrypted. In this way, the information is kept away from the hacker’s eyes. • Remote Control- In case of a company, the advantage of having a VPN is that the information can be accessed even from home or any other place. That’s why VPN can increase productivity within a company. • Share files- A VPN service can be used if you have a
  • 8. group that needs to share data for an extended period. • Online Anonymity- Through a VPN you can browse the web in complete anonymity. Compared to hide IP software or web proxies, the advantage of a VPN service is that it allows access to both web applications and websites in complete anonymity. • Unblock websites and bypass filters- VPNs are great for accessing blocked websites or for bypassing internet filters. That is why there is an increased number of VPN services used in countries where internet censorship is applied.
  • 9.  Change IP address- If you need an IP address from another country, the VPN can provide it.  Better performance- Bandwidth and efficiency of the network can generally be increased once a VPN solution is implemented.  Reduce Costs- Once a VPN network is created, the maintenance cost is very low. More than that, if you opt for a service provider, the network setup and surveillance is no more a concern.
  • 10.
  • 11. DISADVANTAGES OF VPN  Performance Issues- If you are using a VPN service, it may create a problem while taking to the website one wants to get access. The VPN service connects the user to a private network. Some Virtual Private Networks might take a longer time to load the website which is to be accessed. This is the most common disadvantage which may be seen in using a VPN service.  Matter of legality- The use of Virtual Private Networks (VPNs) may not be legal in a country. Local organizations and companies may face the problems of censorship to a particular website. This is mainly due to the absence of direct control over the Internet while
  • 12. Using a VPN. So a reliability of a VPN comes under question. However, it is not illegal in India as there is not any specific law regarding VPN.  VPN might intrude in one’s online activity and use his data- Some VPN providers might ask for data in exchange of service. There is no complete protection of your online browsing as it can be tracked by the VPN service providers. Even though a VPN can hide the real IP address and remove internet restrictions, but there is no security of one’s online browsing. So the care must be taken while using a free or a low cost VPN.
  • 13.  Difficulty in its Set-Up:- It might not be very difficult for Individual users to use a VPN service which can simply be achieved by downloading it in the form of any app or software. But companies may find it difficult to set-up a virtual private network over their premises which may , in result, bring complexity to their network connections and affect each device used in the companies.  Add more costs- VPN is a premium service which is not available free. If one wants to use a VPN router, he will also need an additional router hardware with it. There are a lot of private connections but they are generally not reliable and have lots of limitations.
  • 14. VPNs in India How does an Indian VPN work? If you are living in India and plan to travel to any part of the world, you can connect back to your home network. You can connect back to home with your family and friends. This means that if you are an Indian living in any part of the world, can securely and privately get access to internet. Some of the frequently used VPNs in India are-  ExpressVPN  NordVPN
  • 15.  PrivateVPN  IPVanish  ProtonVPN The above mentioned VPNs in India provide more than a thousand servers and locations with respective average speeds, allow torrents and number of connections at the same time with supported systems like MacOS, Windows, Android, iOs and windows Phone. So VPNs
  • 16. Case Law  Internet Service Providers vs. UOI (2005):- " We observed that though VPN is being defined and discussed by both the parties, on access through Internet as well as on direct leased line. The Respondent mentioned that the VPN provided on direct leased line by ISPs is not allowed. This stand of the DOT we accept because by basic definition of ISP, it has to be only Internet based activity. License of ISP permits them the activity concerned with access of Internet and use of its content for IT enabled services. As rightly contended by DOT, VPN was not allowed as a part of ISP license, it is fair for us, therefore, to hold that it becomes a separate service. The quantum of entry fee and revenue share to be charged for a separate service from the service provider would require the recommendations of TRAI as per Sec 11 (1)(a)(i)(ii) of TRAI Act.”