Virtual Private Networks (VPNs)
- September 2, 2021
- Posted by: OptimizeIAS Team
- Category: DPN Topics
No Comments
Virtual Private Networks (VPNs)
Subject – Science and Tech
Context – Proposal to ban VPNs has India Inc worried
Concept –
- The proposal of the Parliamentary Standing Committee on Home Affairs to block virtual private networks (VPNs) in India has left many multinational and Indian companies in a tizzy.
- Many companies have been using VPN for enabling secure work-from-home during the pandemic.
- While the Committee has sought to ban VPNs to control cybercrime, Internet policy experts and security researchers called it a “strange and ill-judged” idea as this would have a serious impact on the data security of MNCs and financial firms operating remotely
What is a VPN?
- A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
- The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.
- VPN technology is widely used in corporate environments.
- As it is totally disconnected from the rest of the web, it is a secure system. The network can be used safely by the government, companies, and military to utilise system resources.
How does a virtual private network (VPN) work?
- A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels.
- An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.
Is VPN traffic encrypted?
- Yes, traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a tunnel.
- VPN traffic from a device such as a computer, tablet, or smartphone is encrypted as it travels through this tunnel. Offsite employees can then use the virtual network to access the corporate network.
Protocols of VPN
To build stable networks, there are many distinct VPN protocols are used. Some protocols of this kind are listed below
- IPsec (IP security)
- PPTP (Point to Point Tunneling Protocol)
- L2TP (Layer 2 Tunneling Protocol)
- SSL (Secure Sockets Layer)
- TLS (Transport Layer Security)