DSpace Repository

Networks Security (Virtual Private Network)

Show simple item record

dc.contributor.author Muhammad Younas
dc.date.accessioned 2022-10-06T10:36:26Z
dc.date.available 2022-10-06T10:36:26Z
dc.date.issued 2003
dc.identifier.uri http://hdl.handle.net/123456789/13498
dc.description Supervised by Mr. Zarrar Javaid en_US
dc.description.abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private tunnel through the public cloud to realize cost savings and productivity enhancements from remote access applications. VPN meets the four key enterprise requirements of compatibility, security, availability and manageability. A VPN is an extension of an enterprise's private intranet across a public network (the Internet) creating a secure private connection, essentially through a private tunnel. VPNs securely convey information across the Internet connection remote users, branch offices, and business partners into an extended corporate network . VPN and its services, their implementation, the three main types of VPNs. VPN services A virtual private network (VPN) consists of a set of geographically disparate sites that can communicate securely over a public or shared infrastructure. IPbased VPNs (IP-VPN) enable business customers seamlessly to receive the same security, connectivity and reliability from any other private network, and can be used to offer the following services: • Intranet-connectivity between corporate sites. • Dial-in Access-business employees can access the corporate network remotely. • Extranet- secure connectivity between a community of users or business partners whose access is restricted to the resources defined for that community. VPNs can be built in various ways. Some consist of routers and firewalls that are inter-connected to the physical or logical leased line of carriers and service providers. Others might include a combination of application proxy firewall, encryption, intrusion detection, tunneling, and key management. en_US
dc.language.iso en en_US
dc.publisher Computer Sciences en_US
dc.relation.ispartofseries MS(CS);T-656
dc.subject Networks Security en_US
dc.subject Virtual Private Network en_US
dc.title Networks Security (Virtual Private Network) en_US
dc.type MS Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account