2023 Provide 2 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 | Assignment Collections
Computer Science 2023 Remote Access Risks Responses
2023 Provide 2 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 | Assignment Collections
Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
Virtual Private Networks (VPN) may be getting more utilization over the last year and half than ever before. Simply because it seems more and more people are teleworking due to COVID 19. Some types of VPNs are Point to Point Tunneling Protocols (PPTP), OpenVPN and Secure Socket Tunneling Protocol (SSTP). All of these VPNs are utilized for the purpose of creating a secure tunnel or linkage from a private network to a public network. This enables the user to send and receive data as if they were connected to a private network.
PPTP is one of the oldest versions of a VPN, due to it being one of the oldest versions it is also considered one of the more vulnerable VPNs. The PPTP does offer quicker connection speeds than some of the other VPNs, but lacks some of the more secure features of modern modems. The OpenVPN has grown in popularity as it is deemed almost unbreakable due to it’s strong encryption and authentication. Lastly, the SSTP is popular due to it being compatible with most Microsoft applications. The downside to the SSTP is it is proprietary property and developers do not have the underlying code. However, this may not be a downside to Microsoft or Microsoft users as it could help enhance the security of the VPN.
Though VPNs are a means to secure data on a public network, anything that touches the internet is vulnerable to being hacked. Some of the techniques used to circumvent VPNs are, malicious ads (bait and switch), login credentials and DDOS attacks. Malicious ads can carry malware, if users are not able to identify the fraudulent add before clicking the add, malware could be loaded onto the machine. Log-in credentials can stolen and used to connect to a VPN, again this is up to the user to secure their data, if users are careless with their passwords, VPN security can be circumvented. Lastly, DDOS attacks can be utilized against VPNs, however depending on the type of VPN utilized a DDOS attack could be thwarted, but it is a technique utilized by havers.
Overall VPNs are effective at thwarting most attacks to a network and are encouraged for use.
V/r
Jeff Cannon
https://www.technadu.com/can-vpn-be-hacked/45630/
https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols
RESPONSE 2:
Virtual Private Network (VPN) allows for a private network connection over the Internet. VPNs creates a secure tunnel for the transmission of network traffic. There are two types of VPNs: remote access and site-to-site.
Remote access VPN allows users to connect via a secure VPN tunnel to access a private networks services and resources while off-site. Remote VPNs also serve to bypass regional Internet restrictions by routing your connection using a different patch where those restrictions do not exist.
Site-to-site VPN or router-to-router VPN is used by larger companies that have satellite office in different locations. Site-to-site VPN allows those satellite locations to connect to other sites within their network structure.
Although VPNs are used to establish a secure connection over the Internet, they are still subject to security risks depending on the type of encryption algorithm used to secure the connection. Encryption of these tunnels can be broken is there are known vulnerabilities or if the encryption key is accessed by a bad actor. The success of stealing encryption keys uses multiple tactics like trickery, computing power, time dedicated to breaking keys, and behind-the-scenes persuasion (VPN Mentor, 2021). Another existing vulnerability for VPNs tracing of your location based on IP leaks via your web browser during the transmission network traffic.
-Claudia
References:
Geeks for Geeks. (10 April 2019). Types of Virtual Private Network (VPNS) and it Protocols. Retrieved 18 August 2021 from https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/
VPN Mentor (27 Jun 2021). Can VPNs Be Hacked? We Did The Research, Here’s the 2021 Guide. Retrieved 18 August 2021 from https://www.vpnmentor.com/blog/can-vpns-hacked-take-deeper-look/
We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.