Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
    • Mains Master Notes
  • Portal Login
    • Home
    • About Us
    • Courses
      • Prelims Test Series
        • LAQSHYA 2026 Prelims Mentorship
      • Mains Mentorship
        • Arjuna 2026 Mains Mentorship
      • Mains Master Notes
    • Portal Login

    Virtual private network

    • July 7, 2023
    • Posted by: OptimizeIAS Team
    • Category: DPN Topics
    No Comments

     

     

    Virtual private network

    Subject :Science and technology

    Section: Awareness in IT

    What is a VPN?

    • A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
    • The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.
    • VPN technology is widely used in corporate environments.
    • As it is totally disconnected from the rest of the web, it is a secure system. The network can be used safely by the government, companies, and military to utilise system resources.

    How does a virtual private network (VPN) work?

    • A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels.
    • An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.

    Is VPN traffic encrypted?

    • Yes, traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a tunnel.
    • VPN traffic from a device such as a computer, tablet, or smartphone is encrypted as it travels through this tunnel. Offsite employees can then use the virtual network to access the corporate network.

    Protocols of VPN

    To build stable networks, there are many distinct VPN protocols are used. Some protocols of this kind are listed below

    • IPsec (IP security)
    • PPTP (Point to Point Tunneling Protocol)
    • L2TP (Layer 2 Tunneling Protocol)
    • SSL (Secure Sockets Layer)
    • TLS (Transport Layer Security)
    Science and tech Virtual private network
    Footer logo
    Copyright © 2015 MasterStudy Theme by Stylemix Themes
        Search