Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Networks and VPN

867 views

Published on

Computer Networks and how it relates to Internet Security

Published in: Technology
  • Be the first to comment

Networks and VPN

  1. 1. Networks and VPN<br />Computer Networks and how it relates to Internet Security<br />
  2. 2. Purpose<br />The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security.<br />Topics Covered:<br />Computer Networks <br />IP Addressing<br />Traffic Routing<br />Security<br />
  3. 3. Networking Terms<br />Network Switch<br />Connects multiple computers on network<br />Router<br />Connects a network to the Internet<br />Contains a list of its known addresses<br />Protects its own network from the outside<br />Ethernet cable<br />Connects a computer to a network<br />WIFI<br />A wireless connection to a network<br />
  4. 4. Computer Network<br />A computer network is a collection of computers that are connected and are communicating.<br />They generally communicate through a communication device called a network switch, or switch for short.<br />
  5. 5. Network Types<br /><ul><li>LAN - Local Area Network
  6. 6. WAN - Wide Area Network
  7. 7. VPN - Virtual Private network</li></ul>Computer networks come in various types, shapes, and sizes. We’ll talk about the following:<br />
  8. 8. Local Area Networks<br />A LAN is a network that is limited to a specific geographical location.<br />Used in a home, smaller school, or smaller business.<br />The computers will likely be connected using Ethernet cables or though WIFI.<br />
  9. 9. Wide Area Networks<br />A WAN is a collection of LANs that are interconnected, or simply, a network of LANs.<br />A WAN is useful for:<br />Splitting larger networks<br />Joining together networks in different geographical locations.<br />
  10. 10. Communication<br />So, how do these computers communicate?<br />In order for computers to communicate with each other, they need to have an addressing scheme.<br />Networks use Internet Protocol addresses(IP addresses).<br />
  11. 11. IP Addresses<br />An IP address is a numeric number assigned to a device. Each IP address on a particular network is unique.<br />The IP address tells the networking equipment the device’s location on the network.<br />Think of it like your house address:<br />Your street and house number identify your location. However, they may not be unique, but they are unique within your zip code.<br />
  12. 12. Public and Private IP Addresses<br />An IP address may be public or private.<br />
  13. 13. Public and Private IP Addresses<br />Think about it like a university mail system.<br />
  14. 14. Public and Private IP Addresses<br />The student’s mailbox at the university is private and only has meaning to the university.<br />
  15. 15. Public and Private IP Addresses<br />The university’s address is public and known by the post office.<br />
  16. 16. Public and Private IP Addresses<br />The post office only knows to deliver the mail to the university.<br />
  17. 17. Public and Private IP Addresses<br />The university then has the information to know which student’s box the mail goes in.<br />
  18. 18. Routers<br />Routers direct or route the internet traffic.<br />When a router receives data with a destination IP address, it knows where to send it.<br />Routers come in all shapes and sizes and are built for different purposes.<br />Home router<br />Commercial router<br />
  19. 19. Routing<br />The university post office acts like a router:<br />It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere.<br />When it receives mail from the public post office, it determines what to do with it.<br />If the student’s mailbox exists, it is delivered. If the student’s mailbox does not exist, the mail is discarded or returned.<br />
  20. 20. Security<br />Now that you understand how networks operate, let’s talk a bit about security.<br />
  21. 21. Unsecure WAN<br />Typically, most data across the internet is open and can be intercepted and then downloaded.<br />For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded.<br />A VPN can prevent this scenario!<br />
  22. 22. Virtual Private Network<br />A VPN extends a LAN to a remote user using a public network, such as the internet.<br />This is possible by creating a secure tunnel from the user to a VPN Server on another network.<br />Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.<br />
  23. 23. A WAN using VPN<br />A VPN creates a tunnel through the Internet.<br />The data exchange between the office networks are all encrypted.<br />Each office can now access the data in the other offices as if they were on the same network.<br />
  24. 24. Why use a VPN?<br />Securely access files on a remote LAN with ease<br />Cost Effective<br />Location hiding<br />
  25. 25. VPN – Location Hiding<br />Tom recently moved to Turkey<br />Tom needs YouTube for a school assignment<br />…but, Turkey blocks YouTube<br />
  26. 26. VPN – Location Hiding<br />Tom has an idea!<br />Tom connects to his school’s network in the USA via VPN<br />
  27. 27. VPN – Location Hiding<br />Bingo! He can know access YouTube.<br />Why? The VPN allowed him to view YouTube as if he was physically connected at his school.<br />
  28. 28. Resources<br />http://www.ehow.com/about_4671848_what-is-vpn.html<br />http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf<br />http://en.wikipedia.org/wiki/Routing_table<br />http://en.wikipedia.org/wiki/Router<br />http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm<br />http://en.wikipedia.org/wiki/IP_address<br />http://en.wikipedia.org/wiki/Computer_network<br />http://en.wikipedia.org/wiki/Virtual_private_network<br />
  29. 29. Image References<br />Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg<br />School IP: http://commons.wikimedia.org/wiki/File:School_ip.svg<br />Router: http://commons.wikimedia.org/wiki/File:Router.svg<br />File Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.png<br />VPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg<br />RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg<br />LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg<br />LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg<br />House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg<br />Mailboxes: http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg<br />
  30. 30. Image References cont.<br />D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpg<br />Cisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png<br />Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677|<br />Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg<br />Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpg<br />Public sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG<br />Mail truck: http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg<br />Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG<br />Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg<br />
  31. 31. Image References cont.<br />Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.png<br />YouTube: http://commons.wikimedia.org/wiki/File:Youtube.svg<br />No Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg<br />

×