SlideShare a Scribd company logo
VPN
VIRTUAL PRIVATE NETWORK
What is a VPN?
1. A Virtual Private Network (VPN) is a secure way of connecting to a
private network using the internet or any unsecure public
network to transport the network data packets privately, using
encryption
2. A VPN allows you to connect to the internet anonymously. Various
protocols create a private network that hides your internet traffic
over public Wi-Fi, preventing spying and hacking. In a world
where “online privacy” is becoming the biggest oxymoron of our
time.
How does it work?
1. A VPN works by routing your device’s internet
connection through your chosen VPN’s private
server rather than your internet service provider
(ISP) so that when your data is transmitted to the
internet, it comes from the VPN rather than your
computer.
2. A VPN can be used to send any kind of network
traffic securely, including voice, video, or data.
How does encryption work?
1. Encryption hides information in such a way (basically transforming it to
gibberish) that it cannot be read without a very strong password, which
is known as a key. This key essentially breaks the complicated code
that your data has been turned into. Only your computer and the VPN
server know this key. The process of decoding your data is known as
decryption, which is the process of making encrypted information
readable again through the application of the key.
2. Example: when you enter your credit card details into a website, that
information is encrypted and rendered unreadable until it reaches its
end destination.
Check on learning
1. Q: A VPN can be used to send what kind of internet traffic?
2. A: A VPN can be used to send any kind of network traffic securely, including voice,
video, or data.
3. Q: What is a key?
4. A: A key breaks the complicated code that your data is turned into so that only your
computer and the VPN service provider can read it.
5. Q: What is an ISP?
6. A: Internet Service Provider.
How does it protect you?
1. By disguising your IP address and geographic location
2. It does this by creating a data tunnel from your local ISP and placing you onto the
web from a completely different gateway city or country. Even if your VPN provider
is based in the United States, you can appear to be in places like Canada, Australia,
Germany, Turkey, or even the Bahamas.
3. By encapsulating your internet traffic inside a hidden tunnel
4. A VPN protects your online traffic by encapsulating any data packets you send
inside a secondary, encrypted packet.
5. As your data travels through a private VPN tunnel, it’s scrambled via encryption.
Common encryption includes OpenVPN, PPTP, L2TP/IPSec (Layer 2 Tunneling
Protocol) and IKEv2/IPSec (Internet Key Exchange version 2).
Is it perfect?
1. A VPN is not fool proof method of securing your internet traffic on the internet. Such
downsides include your VPN service can see your IP and what you are doing and if
hacked or owned by someone who wants to find you, they can.
2. They can install malware that is hard to detect and can be installed without you
knowing, which means your info will be leaked from the malware.
3. Your VPN can leak your real IP at times.
4. Clickbait VPN providers.
5. Some companies ban the use of VPN’s
PPTP
1. Point-to-Point Tunneling Protocol (PPTP).
PPTP (Point-to-Point Tunneling Protocol) VPN Encryption: 128-bit
VPN Security: Basic encryption
VPN Speed: Fast due to the low encryption rate
Stability: Very good and stable on most Wi-Fi networks
Compatibility: Most computer, tablet, and mobile operating systems come with PPTP
Least secure method. Developed by Microsoft but not used by them, been compromised before.
L2TP/IPsec
1. Layer 2 Tunneling Protocol/ Internet protocol security
L2TP/IPsec (Layer 2 Tunneling Protocol over Internet Protocol Security) VPN Encryption: 256-bit
VPN Security: Highest encryption. This protocol encapsulates and checks data integrity
twice.
VPN Speed: Requires more processing power because of the 2x encapsulation
Stability: Stable on NAT-supported devices
Compatibility: Like PPTP, it is included in most device operating systems
A good VPN solution for non-critical use. However this protocol has been compromised
before. Nevertheless, it remains a good protocol, particularly for mobile phones.
OpenVPN
1. VPN Encryption: 160-bit and 256-bit
VPN Security: OpenVPN provides the highest encryption. OpenVPN authenticates the data
with digital certificates and is the most secure VPN protocol.
VPN Speed: This protocol has the best performance. Speeds are fast and are not susceptible
to high latency connections or long-distance transfers. Is your network connection stable and
provide the right speeds?
Stability: Most reliable and stable, even behind wireless routers, on non-reliable networks and
on Wi-Fi.
Compatibility: OpenVPN is supported by most desktop operating systems, Android mobile and
tablet devices.
Across the IT world, OpenVPN is the best all around VPN solution. One downside could be
the need for third party software on all platforms. May require IT to help set up if not familiar
with VPN’s.
SSTP
1. Secure Socket Tunneling Protocol
VPN Encryption: 256-bit
VPN Security: Highest encryption. SSTP depends on cipher, but usually very strong AES
VPN Speed: Speeds are fast and can bypass most firewalls
Stability: This protocol is very stable and reliable.
Compatibility: SSTP is primarily used in a Windows only environment, but is available for
Linux, RouterOS and SEIL. Because it is a proprietary protocol owned by Microsoft, it
cannot be independently audited for backdoors.
SSTP offers most of the advantages of OpenVPN; however, it is mostly limited to a
windows environment.
Conclusion
1. A VPN is a good method for protecting yourself online and maintaining online security.
2. Different VPN providers and protocols offer different things and it is always a good idea to do
your own research.
3. Especially overseas, the use of a VPN to protect yourself against hackers and other threats is
something to consider.
4. Back home, the use of a VPN over public Wi-Fi will protect you and your information.
5. They are relatively inexpensive, NordVPN offers 1 year of coverage at $83.88.
Questions?

More Related Content

Similar to VPN.pptx

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
AceAtigaVallo
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN
VPNVPN
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
The vpn
The vpnThe vpn
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Vpn security
Vpn security Vpn security
Vpn security
AnushiyaAron
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
All About VPN
All About VPNAll About VPN
All About VPN
Vicente A. Aragon D.
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
Swarup Kumar Mall
 

Similar to VPN.pptx (20)

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
The vpn
The vpnThe vpn
The vpn
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn security
Vpn security Vpn security
Vpn security
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
All About VPN
All About VPNAll About VPN
All About VPN
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

VPN.pptx

  • 2. What is a VPN? 1. A Virtual Private Network (VPN) is a secure way of connecting to a private network using the internet or any unsecure public network to transport the network data packets privately, using encryption 2. A VPN allows you to connect to the internet anonymously. Various protocols create a private network that hides your internet traffic over public Wi-Fi, preventing spying and hacking. In a world where “online privacy” is becoming the biggest oxymoron of our time.
  • 3. How does it work? 1. A VPN works by routing your device’s internet connection through your chosen VPN’s private server rather than your internet service provider (ISP) so that when your data is transmitted to the internet, it comes from the VPN rather than your computer. 2. A VPN can be used to send any kind of network traffic securely, including voice, video, or data.
  • 4.
  • 5.
  • 6. How does encryption work? 1. Encryption hides information in such a way (basically transforming it to gibberish) that it cannot be read without a very strong password, which is known as a key. This key essentially breaks the complicated code that your data has been turned into. Only your computer and the VPN server know this key. The process of decoding your data is known as decryption, which is the process of making encrypted information readable again through the application of the key. 2. Example: when you enter your credit card details into a website, that information is encrypted and rendered unreadable until it reaches its end destination.
  • 7.
  • 8. Check on learning 1. Q: A VPN can be used to send what kind of internet traffic? 2. A: A VPN can be used to send any kind of network traffic securely, including voice, video, or data. 3. Q: What is a key? 4. A: A key breaks the complicated code that your data is turned into so that only your computer and the VPN service provider can read it. 5. Q: What is an ISP? 6. A: Internet Service Provider.
  • 9. How does it protect you? 1. By disguising your IP address and geographic location 2. It does this by creating a data tunnel from your local ISP and placing you onto the web from a completely different gateway city or country. Even if your VPN provider is based in the United States, you can appear to be in places like Canada, Australia, Germany, Turkey, or even the Bahamas. 3. By encapsulating your internet traffic inside a hidden tunnel 4. A VPN protects your online traffic by encapsulating any data packets you send inside a secondary, encrypted packet. 5. As your data travels through a private VPN tunnel, it’s scrambled via encryption. Common encryption includes OpenVPN, PPTP, L2TP/IPSec (Layer 2 Tunneling Protocol) and IKEv2/IPSec (Internet Key Exchange version 2).
  • 10. Is it perfect? 1. A VPN is not fool proof method of securing your internet traffic on the internet. Such downsides include your VPN service can see your IP and what you are doing and if hacked or owned by someone who wants to find you, they can. 2. They can install malware that is hard to detect and can be installed without you knowing, which means your info will be leaked from the malware. 3. Your VPN can leak your real IP at times. 4. Clickbait VPN providers. 5. Some companies ban the use of VPN’s
  • 11. PPTP 1. Point-to-Point Tunneling Protocol (PPTP). PPTP (Point-to-Point Tunneling Protocol) VPN Encryption: 128-bit VPN Security: Basic encryption VPN Speed: Fast due to the low encryption rate Stability: Very good and stable on most Wi-Fi networks Compatibility: Most computer, tablet, and mobile operating systems come with PPTP Least secure method. Developed by Microsoft but not used by them, been compromised before.
  • 12. L2TP/IPsec 1. Layer 2 Tunneling Protocol/ Internet protocol security L2TP/IPsec (Layer 2 Tunneling Protocol over Internet Protocol Security) VPN Encryption: 256-bit VPN Security: Highest encryption. This protocol encapsulates and checks data integrity twice. VPN Speed: Requires more processing power because of the 2x encapsulation Stability: Stable on NAT-supported devices Compatibility: Like PPTP, it is included in most device operating systems A good VPN solution for non-critical use. However this protocol has been compromised before. Nevertheless, it remains a good protocol, particularly for mobile phones.
  • 13. OpenVPN 1. VPN Encryption: 160-bit and 256-bit VPN Security: OpenVPN provides the highest encryption. OpenVPN authenticates the data with digital certificates and is the most secure VPN protocol. VPN Speed: This protocol has the best performance. Speeds are fast and are not susceptible to high latency connections or long-distance transfers. Is your network connection stable and provide the right speeds? Stability: Most reliable and stable, even behind wireless routers, on non-reliable networks and on Wi-Fi. Compatibility: OpenVPN is supported by most desktop operating systems, Android mobile and tablet devices. Across the IT world, OpenVPN is the best all around VPN solution. One downside could be the need for third party software on all platforms. May require IT to help set up if not familiar with VPN’s.
  • 14. SSTP 1. Secure Socket Tunneling Protocol VPN Encryption: 256-bit VPN Security: Highest encryption. SSTP depends on cipher, but usually very strong AES VPN Speed: Speeds are fast and can bypass most firewalls Stability: This protocol is very stable and reliable. Compatibility: SSTP is primarily used in a Windows only environment, but is available for Linux, RouterOS and SEIL. Because it is a proprietary protocol owned by Microsoft, it cannot be independently audited for backdoors. SSTP offers most of the advantages of OpenVPN; however, it is mostly limited to a windows environment.
  • 15. Conclusion 1. A VPN is a good method for protecting yourself online and maintaining online security. 2. Different VPN providers and protocols offer different things and it is always a good idea to do your own research. 3. Especially overseas, the use of a VPN to protect yourself against hackers and other threats is something to consider. 4. Back home, the use of a VPN over public Wi-Fi will protect you and your information. 5. They are relatively inexpensive, NordVPN offers 1 year of coverage at $83.88.