I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.
Describe the issues involved with deployment, placement, and implementation of a Virtual Private Network (VPN).
Taking CEH course in conjunction with this college course has been an eye-opener. Personally, I am all about Virtual Private Network for home based business and personal usage. However, VPN system becomes more complicated when it branches out to virtually connect all users, regardless of the location, to an enterprise network. Before deploying a remote access VPN, there are some crucial elements that need to be taken into consideration, like the type of VPN (Software-based VPN clients or Hardware-based VPN clients), the type of VPN encryption (IPSec or SSL encryption), VPN connectivity models (Remote-access, Intranet, Extranet VPNs), and VPN configurations (Site-to-site and Client-to-Site VPNs). All of these options sound great but the most common issue with deploying any type of VPN stems from users mishandling the integrity of VPNs.
Stewart highlighted in his book some VPN threats are a result of a user misconfigureing the VPN without comprehending the impact of the changes or maintaining it by running a vulnerability management tool against it (Stewart, 2014) The same steps we discussed last week about managing any type of firewall, it applies to an enterprise VPN in order to ensure its security. We all know that VPNs are intended to secure our communications over public networks while remotely connecting to a corporate network. However, it becomes counter-productive when VPNs become a source of vulnerabilities, mainly susceptible to Denial of service attacks by overloading your VPN with a flood of traffic. Further, VPNs are not armed to detect application attacks like cross-site scripting and SQL injections. It even gets worse when corporate VPN users connect to the network while using the tunnel client mode, which can invite waves of viruses and Trojans to the internal corporate network.
Stewart, J. M. Network Security, Firewalls and VPNs. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/9781284107715/
Virtual Private Networks (VPNs) is a server that you connect with to reroute your internet activities. VPNs help companies and government agencies to perform their duties every day no matter where the location is. Organizations can “transmit private and sensitive data securely over a public intermediary network. The can serve as the cheap long-distance carrier for WAN connections established using VPNs”(Steward, 2014 pg. 75). For organizations whose offices are scattered in many locations, VPNs provide a better way for communication and access data over a secure network from a remote location typically through IPsec or Internet protocol security.
VPNs have many benefits but there are other challenges that need to be taking into consideration before its deployment, placement, and implementation. Quality of service is usually affected when it comes to VPNs. The link depends on how the stability and availability that the Internet provider offers in addition to any other network connection between the endpoints (Steward, 2014). This means that the network reliable and its performance depends on the provider of the internet. The VPNs can be affected by the speed and the traffic of the network.
VPNs traffic needs to be encrypted to make sure it is secure through the transmission process. Implementing and deploying VPNs is not knowledge and understanding of networks and their security problems. When a company or government agencies do not plan and configure their network well they are a risk of data snooping, thieve and other attacks. VPNs are nor safe from vulnerability whether it is encrypted or not. Data transmitting through VPNs can be a risk if the computers are infected with malicious codes that can traverse theVPNs link into organization LAN (Steward, 2014).
Stewart, J. M. (2014). Network Security, Firewalls and VPNs, 2nd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781284107715