SlideShare uma empresa Scribd logo
1 de 29
Networks and VPN Computer Networks and how it relates to Internet Security
Purpose The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security. Topics Covered: Computer Networks  IP Addressing Traffic Routing Security
Networking Terms Network Switch Connects multiple computers on network Router Connects a network to the Internet Contains a list of its known addresses Protects its own network from the outside Ethernet cable Connects a computer to a network WIFI A wireless connection to a network
Computer Network A computer network is a collection of computers that are connected and are communicating. They generally communicate through a communication device called a network switch, or switch for short.
Network Types ,[object Object]
WAN - Wide Area Network
VPN - Virtual Private networkComputer networks come in various types, shapes, and sizes.  We’ll talk about the following:
Local Area Networks A LAN is a network that is limited to a specific geographical location. Used in a home, smaller school, or smaller business. The computers will likely be connected using Ethernet cables or though WIFI.
Wide Area Networks A WAN is a collection of LANs that are interconnected, or simply, a network of LANs. A WAN is useful for: Splitting larger networks Joining together networks in different geographical locations.
Communication So, how do these computers communicate? In order for computers to communicate with each other, they need to have an addressing scheme. Networks use Internet Protocol addresses(IP addresses).
IP Addresses An IP address is a numeric number assigned to a device.  Each IP address on a particular network is unique. The IP address tells the networking equipment the device’s location on the network. Think of it like your house address: Your street and house number identify your location.  However, they may not be unique, but they are unique within your zip code.
Public and Private IP Addresses An IP address may be public or private.
Public and Private IP Addresses Think about it like a university mail system.
Public and Private IP Addresses The student’s mailbox at the university is private and only has meaning to the university.
Public and Private IP Addresses The university’s address is public and known by the post office.
Public and Private IP Addresses The post office only knows to deliver the mail to the university.
Public and Private IP Addresses The university then has the information to know which student’s box the mail goes in.
Routers Routers direct or route the internet traffic. When a router receives data with a destination IP address, it knows where to send it. Routers come in all shapes and sizes and are built for different purposes. Home router Commercial router
Routing The university post office acts like a router: It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere. When it receives mail from the public post office, it determines what to do with it. If the student’s mailbox exists, it is delivered.  If the student’s mailbox does not exist, the mail is discarded or returned.
Security Now that you understand how networks operate, let’s talk a bit about security.
Unsecure WAN Typically, most data across the internet is open and can be intercepted and then downloaded. For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded. A VPN can prevent this scenario!
Virtual Private Network A VPN extends a LAN to a remote user using a public network, such as the internet. This is possible by creating a secure tunnel from the user to a VPN Server on another network. Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.
A WAN using VPN A VPN creates a tunnel through the Internet. The data exchange between the office networks are all encrypted. Each office can now access the data in the other offices as if they were on the same network.
Why use a VPN? Securely access files on a remote LAN with ease Cost Effective Location hiding
VPN – Location Hiding Tom recently moved to Turkey Tom needs YouTube for a school assignment …but, Turkey blocks YouTube
VPN – Location Hiding Tom has an idea! Tom connects to his school’s network in the USA via VPN
VPN – Location Hiding Bingo! He can know access YouTube. Why?  The VPN allowed him to view YouTube as if he was physically connected at his school.
Resources http://www.ehow.com/about_4671848_what-is-vpn.html http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf http://en.wikipedia.org/wiki/Routing_table http://en.wikipedia.org/wiki/Router http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm http://en.wikipedia.org/wiki/IP_address http://en.wikipedia.org/wiki/Computer_network http://en.wikipedia.org/wiki/Virtual_private_network
Image References Gnome Network:  http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg School IP:  http://commons.wikimedia.org/wiki/File:School_ip.svg Router:  http://commons.wikimedia.org/wiki/File:Router.svg File Lock:  http://commons.wikimedia.org/wiki/File:Lock_icon.png VPN Tunnel:  http://commons.wikimedia.org/wiki/File:VPN_remote.jpg RJ45 Jack:  http://commons.wikimedia.org/wiki/File:Network-wired.svg LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg

Mais conteúdo relacionado

Mais procurados

Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)IMRAN KHAN
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3Tutorials Tips Tricks
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service providerAtika Zaimi
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNSovello Hildebrand
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceTransweb Global Inc
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse networkcmorfoot
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Computer networks
Computer networksComputer networks
Computer networksSudar Sudar
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networkingshierly pabello
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshowchairesj
 

Mais procurados (20)

Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
5 - Networking
5 - Networking5 - Networking
5 - Networking
 
IP Address
IP AddressIP Address
IP Address
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
Assignment no 4
Assignment no 4Assignment no 4
Assignment no 4
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network
NetworkNetwork
Network
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPN
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse network
 
Data Communication
Data Communication Data Communication
Data Communication
 
Computer networks
Computer networksComputer networks
Computer networks
 
Wlan Basics
Wlan BasicsWlan Basics
Wlan Basics
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
 

Semelhante a Networks and VPN

What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdfEIHEducation
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptxKviskvis
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2MDHASNAIN23
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdfEIHEducation
 
Computing - Networks
Computing - NetworksComputing - Networks
Computing - NetworksJamie Hutt
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfsunil shukla
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptxSonuSingh81247
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfAceAtigaVallo
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsSovello Hildebrand
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 

Semelhante a Networks and VPN (20)

What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
What is a VPN.pdf
What is a VPN.pdfWhat is a VPN.pdf
What is a VPN.pdf
 
AWS VPC .pptx
AWS  VPC .pptxAWS  VPC .pptx
AWS VPC .pptx
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptx
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdf
 
Computing - Networks
Computing - NetworksComputing - Networks
Computing - Networks
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Class note 4
Class note 4Class note 4
Class note 4
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
 
Kai
KaiKai
Kai
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Private LTE.pdf
Private LTE.pdfPrivate LTE.pdf
Private LTE.pdf
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Networks and VPN

  • 1. Networks and VPN Computer Networks and how it relates to Internet Security
  • 2. Purpose The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security. Topics Covered: Computer Networks IP Addressing Traffic Routing Security
  • 3. Networking Terms Network Switch Connects multiple computers on network Router Connects a network to the Internet Contains a list of its known addresses Protects its own network from the outside Ethernet cable Connects a computer to a network WIFI A wireless connection to a network
  • 4. Computer Network A computer network is a collection of computers that are connected and are communicating. They generally communicate through a communication device called a network switch, or switch for short.
  • 5.
  • 6. WAN - Wide Area Network
  • 7. VPN - Virtual Private networkComputer networks come in various types, shapes, and sizes. We’ll talk about the following:
  • 8. Local Area Networks A LAN is a network that is limited to a specific geographical location. Used in a home, smaller school, or smaller business. The computers will likely be connected using Ethernet cables or though WIFI.
  • 9. Wide Area Networks A WAN is a collection of LANs that are interconnected, or simply, a network of LANs. A WAN is useful for: Splitting larger networks Joining together networks in different geographical locations.
  • 10. Communication So, how do these computers communicate? In order for computers to communicate with each other, they need to have an addressing scheme. Networks use Internet Protocol addresses(IP addresses).
  • 11. IP Addresses An IP address is a numeric number assigned to a device. Each IP address on a particular network is unique. The IP address tells the networking equipment the device’s location on the network. Think of it like your house address: Your street and house number identify your location. However, they may not be unique, but they are unique within your zip code.
  • 12. Public and Private IP Addresses An IP address may be public or private.
  • 13. Public and Private IP Addresses Think about it like a university mail system.
  • 14. Public and Private IP Addresses The student’s mailbox at the university is private and only has meaning to the university.
  • 15. Public and Private IP Addresses The university’s address is public and known by the post office.
  • 16. Public and Private IP Addresses The post office only knows to deliver the mail to the university.
  • 17. Public and Private IP Addresses The university then has the information to know which student’s box the mail goes in.
  • 18. Routers Routers direct or route the internet traffic. When a router receives data with a destination IP address, it knows where to send it. Routers come in all shapes and sizes and are built for different purposes. Home router Commercial router
  • 19. Routing The university post office acts like a router: It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere. When it receives mail from the public post office, it determines what to do with it. If the student’s mailbox exists, it is delivered. If the student’s mailbox does not exist, the mail is discarded or returned.
  • 20. Security Now that you understand how networks operate, let’s talk a bit about security.
  • 21. Unsecure WAN Typically, most data across the internet is open and can be intercepted and then downloaded. For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded. A VPN can prevent this scenario!
  • 22. Virtual Private Network A VPN extends a LAN to a remote user using a public network, such as the internet. This is possible by creating a secure tunnel from the user to a VPN Server on another network. Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.
  • 23. A WAN using VPN A VPN creates a tunnel through the Internet. The data exchange between the office networks are all encrypted. Each office can now access the data in the other offices as if they were on the same network.
  • 24. Why use a VPN? Securely access files on a remote LAN with ease Cost Effective Location hiding
  • 25. VPN – Location Hiding Tom recently moved to Turkey Tom needs YouTube for a school assignment …but, Turkey blocks YouTube
  • 26. VPN – Location Hiding Tom has an idea! Tom connects to his school’s network in the USA via VPN
  • 27. VPN – Location Hiding Bingo! He can know access YouTube. Why? The VPN allowed him to view YouTube as if he was physically connected at his school.
  • 28. Resources http://www.ehow.com/about_4671848_what-is-vpn.html http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf http://en.wikipedia.org/wiki/Routing_table http://en.wikipedia.org/wiki/Router http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm http://en.wikipedia.org/wiki/IP_address http://en.wikipedia.org/wiki/Computer_network http://en.wikipedia.org/wiki/Virtual_private_network
  • 29. Image References Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg School IP: http://commons.wikimedia.org/wiki/File:School_ip.svg Router: http://commons.wikimedia.org/wiki/File:Router.svg File Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.png VPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg
  • 30. Image References cont. Mailboxes: http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpg Cisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677| Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpg Public sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG Mail truck: http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg
  • 31. Image References cont. Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.png YouTube: http://commons.wikimedia.org/wiki/File:Youtube.svg No Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg

Notas do Editor

  1. Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svgSchool IP : http://commons.wikimedia.org/wiki/File:School_ip.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svgFile Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.pngVPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg
  2. RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg
  3. Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg
  4. Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svg
  5. Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg
  6. House Number:http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg
  7. Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpgPublic sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG
  8. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  9. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  10. Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG
  11. Mail truck:http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg
  12. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  13. D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpgCisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png
  14. Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677|
  15. Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg
  16. Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg
  17. Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.pngYouTube:http://commons.wikimedia.org/wiki/File:Youtube.svgNo Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg