b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations.
c.Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an ‘odd’ number or Topic 2 if it ends in an ‘even’ number.
A virtual private network (VPN) could be defined as a form of technology that would be helpful for the creation of a public network. With the help of the VPN network, it would be very much useful for the business organizations to perform their operations in an efficient manner. The purpose of the VPN is to work in a similar manner as that of a firewall in order to secure the data within the computer when it would be connected to the internet . The use of VPNs are becoming popular due to their usage within several forms of business and corporate organizations. These are also used by private individuals. The VPN connection has the capability of offering secured connections within the internet platform .
Any form of organization would wish to secure their working environment. This would majorly be possible with the help of a secure form of connection within their workplace, which could be provided by the VPN connections. Organizations also provide a secure working environment for the security of their clients and also their space . This could be highly achieved with the influence of VPN connection, which has the capability of offering various forms of advantages.
Concerns for Organizations in terms of Communication
There are several forms of problems within the communication with the clients by the organizations. Some of the issues that are faced by companies are:
- Access to Information – In some organizations, information is not sent to all the employees at real time basis. There might be some amount of problems that are faced by organizations such as internet issues during sending of email to clients or employees or verbal modes of communication and many others.
- Access to Proper Information– Some of the critical information within the organization is not always sent to the client or employees. This is meant to secure the confidentiality of information.
These issues are mainly faced by organizations in terms of communication. In order to solve the above issues, organizations should be able to implement VPN enabled softwares for gaining the benefits of transmission of information . Some of the advantages of VPN enabled technologies and software solutions are:
- Savings of Cost– The implementation of VPN softwares would be helpful for organizations in saving lots of money in several situations. The cost of maintaining the servers cannot be compared with other form of approaches.
- Network Stability– The cost of building of a dedicated form of private network would seem to be reasonable with the expansion of the business as this cost would overshoot with the passage of time .
- Security– VPN also provides better use of software resources in terms of software. The organizations transfer sensitive form of information between various locations and with clients. This would be possible with the best form of security protocols. The VPN technology makes use of encryption and tunneling technology for the coating of the vital information with some form of additional security layer. This form of layer would not be able to get penetrated except the receiver of the information.
The packages of VPNs are stuffed with several benefits for the organizations. They provide safer and cheaper alternatives for the organizations. Small, medium and large scale business organizations should mainly choose the advantages offered by VPN in order to save the initial costs so that they would be able to focus on the expansion and growth of the organization.
Security of VPN
The Virtual Private Networks helps in ensuring the safety of the private network within the organization. They would ensure the safety within the sharing of data in a remote manner with the help of these private networks. VPNs help in securing the online data within the online platform.
Security Issues of VPN
Although VPNs are considered to be a highly secured platform, still there are some issues that need to be taken into consideration for the security of the devices. Some of the important security issues of VPN are:
Client and Server Issues – The VPN client application would face some problems during the start-up process. The reinstallation of the application might be able to fix the problems based within the client side. There are some other forms of issues based on the fact that the application might not have been installed in a proper manner. Another form of chance would explain that the application supporting the VPN technology might not have been updated on a regular format, which would result in the improper form of working processes of the VPN application . This problem could be resolved with the process of updating of the VPN application. The updating of the application would also help in increasing the efficiency of the application and thus ensure a proper and safe environment.
The problem of server overloading occurs within the server side. There are some instances in which the VPN would not be able to establish a form of connection with the VPN server as these servers would only handle limited requests based on connection at a single time.
Passive Monitoring – In this technique, the hackers would be able to monitor and collect the data from the host computer .
Brute Force Attacks – Many of the providers of VPN based services make use of old form of protocols based on tunneling. These are extremely vulnerable and prone to get hacked with the attack based on brute-force. In order to mitigate the risks from this attack, the VPN service provider should make use of updated and latest protocols, which would be highly helpful for the security within the devices against any form of attacks .
Based on the above discussion, it could be concluded that the VPN technologies play a major role for the development of the internet platform and thus securing the various forms of connections within the business organization. The current stated the various aspects of VPN that mainly focussed on the increasing of VPN and their importance within the sector. The VPN also helps in providing several forms of benefits to the organizations in various aspects. The VPN helps in ensuring the fact that the organizations would not face any problem during conducting any form of business transactions and thus they would ensure a healthy environment.
The impact of the technology of VPN has made tremendous growth in the recent past as they have continuously increased with the expanse of the technological sector . VPN technology has a great potential for the growth as they have the major form of responsibility of improving the technological space. Though there are several issues, which would be taken care of by the developers of the technology. The VPN also has a huge capability to grow as they support the backend services of various technologies .
 Liyanage, Madhusanka, Mika Ylianttila, and Andrei Gurtov. "IP-based virtual private network implementations in future cellular networks." In Handbook of Research on Progressive Trends in Wireless Communications and Networking, pp. 44-66. IGI Global, 2014.
 Jain, Raj, and Subharthi Paul. "Network virtualization and software defined networking for cloud computing: a survey." IEEE Communications Magazine 51, no. 11 (2013): 24-31.
 Daya, Bhavya. "Network security: History, importance, and future." University of Florida Department of Electrical and Computer Engineering 4 (2013).
 Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and Computer Engineering, 4.
 Alshalan, Abdullah, Sandeep Pisharody, and Dijiang Huang. "A survey of mobile VPN technologies." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1177-1196.
 Wang, Anjing, Mohan Iyer, Rudra Dutta, George N. Rouskas, and Ilia Baldine. "Network virtualization: Technologies, perspectives, and frontiers." Journal of Lightwave Technology31, no. 4 (2013): 523-537.
 Rao, Ashwin, A. Molavi Kakhki, Abbas Razaghpanah, Amy Tang, Shen Wang, Justine Sherry, Phillipa Gill et al. "Using the middle to meddle with mobile." CCIS, Northeastern University, Tech. Rep., December (2013).
 Kumar, Umesh, and Sapna Gambhir. "A literature review of security threats to wireless networks." International Journal of Future Generation Communication and Networking 7, no. 4 (2014): 25-34.
 Kyusakov, Rumen, Jens Eliasson, Jerker Delsing, Jan van Deventer, and Jonas Gustafsson. "Integration of wireless sensor and actuator nodes with IT infrastructure using service-oriented architecture." IEEE Transactions on industrial informatics 9, no. 1 (2013): 43-51.
 Nguyen, Kim-Khoa, Mohamed Cheriet, and Mathieu Lemay. "Enabling infrastructure as a service (IaaS) on IP networks: from distributed to virtualized control plane." IEEE Communications Magazine 51, no. 1 (2013): 136-144.