Mateo Avila’s Expanded Definition of Virtual Private Network (VPN)

TO: Prof. Jason Ellis

FROM: Mateo Avila

DATE: 3/17/2021

SUBJECT: Expanded Definition of Virtual Private Network (VPN)

Introduction:

The purpose of this document is to provide an Expanded Definition that shows general understanding and use of the following term. The term that I am defining is Virtual Private Network (VPN). This provides an introduction for College Undergraduates that are studying Computer Networking and Security. I am discussing the way it is defined and the way it is used in context by providing several quoted definitions and several quoted sentences that use Virtual Private Network (VPN) in the context. Definitions, context, and finally my working definition will be provided in the order that it was mentioned.

Definitions:

The definition of Virtual Private Network (VPN) according to Encyclopedia of Small Business “Virtual private network (VPNS) are systems that use public networks to carry private information and maintain privacy through the use of a tunneling protocol and security procedures.” (Encyclopedia of Small Business, 2018) Meaning that public connectivity between people, companies, organizations, etc. are kept secure through tunneling protocol which is basically encapsulation of packets. Providing extra layers of security which will be harder to break. This keeps our location as safe.

“A system that uses code to securely access a computer in a different location via the internet. When working from home, you can securely access the office network using the company’s virtual private network” (Oxford, 2021) This definition also provides an example, which is very helpful. According to Oxford, companies use Virtual Private Network to secure their employees with access to the companies working space. This provides security to the Company as well as the employees. This definition is most likely used by people with very little knowledge about technology because it even shows an example to further understand the term.

“A VPN establishes a protected communications link across a public network between the remote computer and the computers physical linked in the local network” (Hoyle, 2018) This definition basically explains the same concept as the Encyclopedia of Small Business. They both mention public network and one uses carrying private information and the other one uses communications links when referring to securely establishing connectivity.

Context:

“In fact, F-Secure says that Freedome’s App Security contains the same scanning engine as its Safe Antivirus, meaning with Freedome installed you don’t need an extra antivirus app.” (Paul, 2019) This quote shows how different apps for Virtual Private Network not only secure your location but also it incorporates tools such as antivirus. This shows how apps for Virtual Private Network have evolve thought out the years. This term is used as a security means for personal information and detection of virus. This scenario of Virtual Private Network is intended to target individuals as an audience. It talks about different types of VPNs and tries to advice you on which you should use depending upon your needs.

“A VPN allows an enterprise to interconnect geographically dispersed sites throughout a public network infrastructure. It is likely to be used by customers instead of networks constructed using private lines.” (Lamti, 2000). Meaning that Virtual Private Networks are beneficial to enterprises because it allows secure communication all over the world within their private lines. In this way, customers can securely gain access to what they are looking for and to trust their information such as back accounts.

“The encrypted messages are sent between a few well-defined points, such as a company headquarters and its branch offices, making part of their journey over the Internet.” (Babcock, 1998) This quoted shows how companies were using Virtual Private Network to encrypt messages in order to flow around the Internet to reach to its final destination securely. This quote by Babcock and the quote by Lamti, provides us examples of how enterprises, companies, business, utilize network communication by implementing security procedures and tools to provide a successful and most importantly secure environment for its customers and its data.

“If you do not have a secure connection especially on a public wireless network that anyone could use online intruders could potentially spy on the websites you visit and even steal passwords and other credentials you enter. Using a VPN while connected to any unprotected public access network is generally advised for information safety” (Biersdorfer, 2017) This quote publish in The New York Times related to first quote publish in an online article by Paul. It relates in a sense that both authors talk about personal security for us, instead of talking about company or business like the others two quotes did. Biersdorfer argues that Virtual Private Network is a key in information security when using public wireless network connections.

Working Definition:

Based on the definitions and quoted sentences about Virtual Private Network (VPN), my working definition about this term is the following. Virtual Private Network (VPN) sets public network communications with encryptions and other security steps in order to secure your data and personal information protection throughout the communication time. Virtual Private Network is so relevant because of the different apps and encryptions which are used to ensure our privacy. This technology keeps on innovating and finding new ways to provide security and integrity for network communication.

References:

Babcock, C. (1998). The art of building VPN firewalls. Inter@ctive Week, 5(29), 18. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=10&sid=a4d7e10e-19f9-441a-9b7a-8ebeea80195e%40pdc-v-sessmgr05&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=976979

Biersdorfer, J.D. (2017). Tunneling though the internet on vacation. The New York Times. https://www.nytimes.com/2017/08/22/technology/personaltech/tunneling-though-the-internet-on-vacation.html?searchResultPosition=2

Hoyle, B. (2018, June 8th). Computer Hardware Security. Encyclopedia of Espionage, Intelligence, and Security. https://www.encyclopedia.com/social-sciences-and-law/law/crime-and-law-enforcement/computer-hardware-security

Lamti, L., & Yacoub, B. (2000). On managing traffic over virtual private network links. Journal of Communications and Networks, 2(2), 138-146. https://ieeexplore-ieee-org.citytech.ezproxy.cuny.edu/stamp/stamp.jsp?tp=&arnumber=6596734

Leaner’s Dictionaries, O. (2021). Virtual private network. Oxford.com. virtual-private-network noun – Definition, pictures, pronunciation and usage notes | Oxford Advanced Learner’s Dictionary at OxfordLearnersDictionaries.com

Paul, I. (2019). 5 Best Vpns for Android. PCWorld, 37(4), 81-86. http://web.a.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=8&sid=5161d3b1-9062-40dc-a8cd-4b9fa00c5047%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=135617888&db=a9h

Small business, E. (2018, June 8th). Virtual private networks. Encyclopedia.com. https://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-and-computing/virtual-private

Leave a Reply