2012年12月21日星期五

session hijacking

Virtual Private Network is a network within a network. This is very popular with businesses that have people working remotely. Basically what we have here is a utilization of the network already provided by the internet. The internet infrastructure can be used as the network for remote employees to access their corporate systems. Corporate environments have a far greater need for tight security. This is achieved by creating a VPN (virtual private network) on top of the normal internet connection. This type of connection allows for greater security and encryption. Only authenticated users can access the corporate network and the data being transferred cannot be intercepted monclerダウン. So this VPN (virtual private network) connection is being run through the internet public network. Virtual Private Networks claim to solve majority of the security problems faced by the enterprises. Most of the issues were related to secure data transfer over the public internet. The internet's greatest asset is ubiquity and openness but this is its greatest weakness as well. VPN seems to have been a solution to the weakness. Two components are needed to make this scenario work. First, there needs to be a virtual private network setup which has the server VPN software installed (and a good router with a firewall). The next would be to have the client VPN software installed on the remote employees machines. Once the client machine is on the internet モンクレール ダウン, they would use the VPN client software to communicate to the corporate server VPN where authentication occurs. Once the server identifies the connecting client as a valid machine モンクレール, access to the network is granted. From then on all information to/from the client to the server is traveling along this virtual private network and is protected by the additional layer of encryption and security provided. Many technologies have come up and claim to be VPN technologies: SSL VPN, MPLS VPN to name some. Some basic questions are how do we define VPN? Why do we need a VPN and what are the technologies used in deploying VPN? Organizations in the past deployed private networks like LAN or WAN for their mission critical applications. A performance predictable and secure infrastructure was the end result. A growing number of businesses cannot afford setting up a private network and existing networks had to reach out to customers to gain a market edge. This is the area where the internet scores its points. Networking basics still present a few bottlenecks. Bandwidth constraints, security problems due to increased exposure, threats like spoofing, session hijacking, sniffing and man-in-the-middle attacks have exposed data in transit. Finally, there can be a cost savings if determining whether a leased line or VPN is for you. Leased lines can increase in price based on the geographic distance between sites. A virtual private network does not and in fact is more scaleable. (This is a general statement ONLY. It's best to consult with your communications broker prior to making this decision. A broker will be able to provide much more information when compared to speaking with a specific vendor).

没有评论:

发表评论