3.1.5 Flashcards

(3 cards)

1
Q

What are the benefits of using a VPN?

A

Mobility convenience: Enables remote access, allowing employees to work from home or while traveling.

Security: Provides security equivalent to a LAN, ensuring access to sensitive data remains protected.
Uses secure, non-standard communication protocols, often through non-standard port numbers.
Simple VPNs connect one client to one server, while more complex versions may enable peer-to-peer (P2P) connections.

Has changed working patterns, allowing more flexible work arrangements and improving access to company resources remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is telecommuting?

A
  • Through a VPN, it is possible to connect to a LAN that is protected from outside access through the internet.
  • Therefore, it is possible for workers to connect to a
    company’s internal network from almost anywhere in the world.
  • This gave rise to home offices, as many office jobs do not require consultation and hence can be completed from home.
  • This remote working is also called telecommuting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Outline features of a VPN that make it secure.

A

Authentication;
Nobody outside the VPN should be able to use the VPN and affect the security of the VPN,
so only user name and password authentication is not enough;
Strong user VPN authentication uses various methods, including certificates, one-time
passwords and software tokens;

Encryption;
If data intercepted, it will not be readable;
encrypting each encapsulated data packet’s content with an encryption key (the key is
shared only between the VPN’s server and clients);

Tunnelling software;
A VPN hides a user’s data by encrypting it with a tunnel created between the user’s device
and the VPN’s web server (The user then takes on the IP address of the web server (rather
than their true IP), and this leads to one advantage of a VPN (namely that a user can appear
to be in a different geographic location than they are actually located in);

Multiple exit nodes;
Makes it hard to distinguish where the data sent is originated (protecting privacy);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly