Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login

Virtual private network

  • July 7, 2023
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments

 

 

Virtual private network

Subject :Science and technology

Section: Awareness in IT

What is a VPN?

  • A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
  • The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.
  • VPN technology is widely used in corporate environments.
  • As it is totally disconnected from the rest of the web, it is a secure system. The network can be used safely by the government, companies, and military to utilise system resources.

How does a virtual private network (VPN) work?

  • A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels.
  • An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.

Is VPN traffic encrypted?

  • Yes, traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a tunnel.
  • VPN traffic from a device such as a computer, tablet, or smartphone is encrypted as it travels through this tunnel. Offsite employees can then use the virtual network to access the corporate network.

Protocols of VPN

To build stable networks, there are many distinct VPN protocols are used. Some protocols of this kind are listed below

  • IPsec (IP security)
  • PPTP (Point to Point Tunneling Protocol)
  • L2TP (Layer 2 Tunneling Protocol)
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
Science and tech Virtual private network

Recent Posts

  • Daily Prelims Notes 23 March 2025 March 23, 2025
  • Challenges in Uploading Voting Data March 23, 2025
  • Fertilizers Committee Warns Against Under-Funding of Nutrient Subsidy Schemes March 23, 2025
  • Tavasya: The Fourth Krivak-Class Stealth Frigate Launched March 23, 2025
  • Indo-French Naval Exercise Varuna 2024 March 23, 2025
  • No Mismatch Between Circulating Influenza Strains and Vaccine Strains March 23, 2025
  • South Cascade Glacier March 22, 2025
  • Made-in-India Web Browser March 22, 2025
  • Charting a route for IORA under India’s chairship March 22, 2025
  • Mar-a-Lago Accord and dollar devaluation March 22, 2025

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Course Portal
Search