Virtual private network vpns, Computer Networking

Virtual Private Network  ( VPNs)

When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for travelling and  remote users to send or receive their information with less concern. This  means that  someone out there must create a VPN.

By definition a VPN is a virtual private  network. Let  take the pieces of a VPN and describe them one  at a time.

Virtual means almost  not quite or not real. Real circuits are physical  we can see them  touch  them  and kick the tires  virtual circuits look they  are there and act like  they are there. They  do everything as though they are there but they  really  are not  there.

Private  means that it its  dedicated to a specific  organization or individual  and not  available to the public.

Network  a network is the grouping  of circuits that connect the  various  locations between  to the public.

For  security  point so view  organization  can use  types of strategies:

a.Private networks

b.Hybrid networks

c.Virtual private networks

Posted Date: 3/18/2013 11:36:24 PM | Location : United States

Related Discussions:- Virtual private network vpns, Assignment Help, Ask Question on Virtual private network vpns, Get Answer, Expert's Help, Virtual private network vpns Discussions

Write discussion on Virtual private network vpns
Your posts are moderated
Related Questions
Question 1 Define Router. Explain its type Question 2 List and discuss the different concepts of EIGRP Question 3 Explain the concept of autonomous system Autonomo

When the signal hits to each other, collision accord.

What are the main categories based on which applications of computer network can be categorized? The major areas under which the applications for computer network can be divide

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al

Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP, IGRP and OSPF.

Define the term - public knowledge information It is essential to distinguish between public knowledge information and the more detailed pieces of information relating to spec

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s