Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Q1. What are key challenges in VPN security?

Q2. What are key drawbacks in VPN security?

Q3. What are the solutions to the problems in VPN security?

Problems

VPN (Virtual Private Network) is a term which provides a method for communication network which is a combination of network that focus on the secure establishment of connection tunnel by making use of unsecured network. VPN focus on the transmission of data through method of tunnelling [1]. In this method the packet is wrapped or encapsulated into a packet. This header provides routing of information so that it can be located into a shared network before its arrival at the endpoint. The logical path for the travelling of encapsulated packets is known as tunnel.  At the end point it is DE capsulated and given or forwarded to final destination. Tunnelling protocol generally operate in Open system interconnection, network layer and data link layer. VPN makes use of encryption for providing confidentiality [2]. After the establishment of a network VPN makes use of tunnelling method for encryption of data into a secure network. Packets are passed over the network in such a way that they cannot provide decryption of various keys. This mainly ensures the fact data is not disclosed or any kind of changes are not done during its transmission. VPN provides a high check on data integrity which mainly ensures that data containing important information is not tampered during its transmission. 

Problems related to working of VPN technology and security issues has been discussed in details. All the challenges and drawbacks VPN technology has been discussed in brief in the coming pages of report. Possible solution and future of research area has been discussed in details in coming pages of the report. All the issues like hacking attacks, authentication for user, client side risk and consideration for security has been discussed [3]. There are generally two security breaches with VPN security namely VPN hijacking and man in the middle attacks has been discussed in detail in this report. There are generally four types of VPN deployment namely remote access VPN, Intranet VPN, Extranet VPN and WAN replacement. There are mainly four types of VPN namely remote access namely firewall based VPN, hardware based VPN and software based VPN. VPN technology provides a method by which information can be easily transmitted over the internet. It generally allows user to securely enter into virtual private network so that it can easily provide accessing of data and communication by making use of insecure network like internet.   

  • Improving the security of VPN.
  • Close integration of various operation in VPN security.
  • To provide overview of VPN security from review papers.
  • To provide solutions to the identified problems.

VPN stands for virtual private Network. The system of the client is ultimate target. An intruder can easily exploit misconfiguration in the system of client or any other kind of tool for hacking for launching attack. This is generally inclusive of two facts namely VPN hijacking and Man-in the middle attack. VPN hijacking is nothing but unauthorised access to the establishment of VPN connection form a distant and remote client and connection of networks [4]. Man in the middle generally stresses on the traffic which is being sent to the communication parties which is inclusive of insertion, deletion and modification of messages and redirecting of it. There are generally three type of authentication namely user authentication, risk on the side of client and lastly virus and malware infection. A VPN security should be establishment only by an authenticated user [5]. VPN client is generally connected to a network by the help of broadband connection and at the same interval of time VPN network is established by making use of split tunnelling method. Personal firewall should be properly installed and configured on the machine of client so that it can block or stop unauthorised access to the client which ensures its safety from any kinds of attacks. Many of the recent remote access to client of VPN which is generally inclusive of personal firewalls. Other configuration checks are VPN client which is generally inclusive of configuration checks like client is not being able to connect its network if anti-virus software is not running properly  or  signature of VPN  are out of date.

VPN Security Consideration

VPN connection can be easily strengthened by making use of firewalls. An IDS (Intrusive Detection System) or IPS (Intrusion prevention system) is generally used for analysing and monitoring of various attacks in a more efficient way. Antivirus should be installed in remote links and networks sever so that it can easily prevent network and server from spreading [6]. Unsecured system is very simple and it should not be considered for establishment of VPN connection in an internal network. Logging and authorized function should be properly provided so that it can easily monitor authorised access in an attempt [7]. Best quality of training should be provided to network administrator and other staff so that they can easily check the best practices and policies for its implementation. Guidelines and policies of security ensures to makes use of VPN and network support so that it can properly distributed to following parities for controlling and governing of VPN [8]. Proper placing of VPN at entry point can be placed in demilitarised zone which is used for protection in an internal network. It is not advised for splitting of tunnel for accessing internet or any other kind of insecure network at the time of establishment of VPN connection [9]. If split tunnelling mechanism is used to accessing internet a firewall and IDS can be detected and prevented from any kind of potential attack from different kinds of insecure networks.

There are some kind of additional security consideration for the deployment of extranet VPN. Strong user authentication mechanism should be followed. The entry point of VPN can be placed in a DMZ for the prevention of various partners from accessing various internal networks. Accessing the rights should be taken as per the needs [7]. Proper necessary resources should be provided to external networks.  Owners of this resource should be provided on a regular basis. There are certain of number of consideration which must be taken like making use of certificates and tokens, secondly making use of add on authentication system. Personal firewalls should be considered or taken into account for installation and configuration properly for various kinds of client. VPN system are generally used for blocking authorized access to the client which mainly helps in ensuring its safety from any other kinds of factors [5]. The system of client should have an antivirus installed in it. The user should be aware about the various kinds of physical security.

There are certain number of security measures for choosing of VPN product. It claims to provide support for strong authentication. It is generally industry based strong encryption of algorithm which comes with a long value of key for support for the protection of confidentiality of data at the time of its transmission. It generally supports anti-virus and intrusion detection methods [4]. Digital certificate support is generally used for certification for various kinds of sites for its authentication. It claims to provide site to site authentication. Support for address management like the capability for address of client on any network can be ensured that the various kinds of address are kept to be private nature. 

This report has been prepared after gathering the response from the various journals about few of the questions that has been asked to them. The first part of analysing the problems was done successfully by the use of information gathered from the review of various kinds of journals [3]. A broad scope of the literature has been done by the use of the electronic database. The scope was limited to the peer reviewed journal articles published in English between 2012 and 2017.

Findings and Conclusion 

The above discussion helps to conclude that the company is facing various problems since its establishment. Various issues in relation to VPN method has been discussed in detail in coming pages of the report.  A literature  review has been done which   focus on the various kinds   of issue related to VPN security has been discussed in above pages   of   the report. In the above pages of the report a brief idea has been provided regarding VPN (Virtual Private Network). A list of question regarding this topic like challenges, drawbacks and solution has been discussed. The objectives of this research like improvisation of security, close integration, overview of VPN security has been discussed in the above pages of the report. A literature review has been provided regarding the topics like problems faced by VPN security, consideration of VPN, extranet VPN security of consideration has been discussed in details in the above pages of the report.

References

[1]K. Grewal and R. Dangi, "Comparative Analysis of QoS VPN Provisioning Algorithm on Traditional IP based VPN and MPLS VPN using NS-2", International Journal of Computer Applications, vol. 48, no. 1, pp. 43-46, 2012.

[2]T. Caldwell, "Locking down the VPN", Network Security, vol. 2012, no. 6, pp. 14-18, 2012.

[3]"QOS Capabilities for Building MPLS VPN", International Journal of Science and Research (IJSR), vol. 5, no. 5, pp. 2247-2251, 2016.

[4]G. Zhang, "The Solution and Management of VPN Based IPSec Technology", Applied Mechanics and Materials, vol. 686, pp. 210-219, 2014.

[5]V. Perta, M. Barbera, G. Tyson, H. Haddadi and A. Mei, "A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients", Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, 2015.

[6]V. Perta, M. Barbera, G. Tyson, H. Haddadi and A. Mei, "A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients", Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, 2015.

[7]B. B?NU??, "Security Technologies Implemented in MPLS VPN Networks", International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012.

[8]M. Liyanage, P. Kumar, M. Ylianttila and A. Gurtov, "Novel secure VPN architectures for LTE backhaul networks", Security and Communication Networks, vol. 9, no. 10, pp. 1198-1215, 2016.

[9]I. Ketut, "Methods Usage Computer for Secuity and User Compvenience", International Journal of Computer Applications, vol. 160, no. 1, pp. 1-4, 2017.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Challenges, Drawbacks, And Solutions In VPN Security Essay.. Retrieved from https://myassignmenthelp.com/free-samples/bn305-virtual-private-networks/electronic-database.html.

"Challenges, Drawbacks, And Solutions In VPN Security Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bn305-virtual-private-networks/electronic-database.html.

My Assignment Help (2021) Challenges, Drawbacks, And Solutions In VPN Security Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-networks/electronic-database.html
[Accessed 11 May 2024].

My Assignment Help. 'Challenges, Drawbacks, And Solutions In VPN Security Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/bn305-virtual-private-networks/electronic-database.html> accessed 11 May 2024.

My Assignment Help. Challenges, Drawbacks, And Solutions In VPN Security Essay. [Internet]. My Assignment Help. 2021 [cited 11 May 2024]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-networks/electronic-database.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close