TO: Prof. EllisÂ
FROM: Shoron RezaÂ
DATE: 3/26/21Â
SUBJECT: Expanded Definition of Virtual Private Network (VPN)
Table of Contents
Introduction
The scientific term I selected for this expanded definition project is VPN, which is an acronym for Virtual Private Network. Below is a summary of my findings and the knowledge I have gained from researching this term. I will be discussing the various definitions and components I have discovered online through journal articles, encyclopedias and other relevant sources.
Definitions
According to Britannica, the official definition of a Virtual Private Network is âa private computer network deployed over a public telecommunications network, such as the Internet. A VPN typically includes one or more connected corporate intranets, or local area networks (LANs), which users at remote locations can access using a password authentication systemâ (Britannica, 2016). In simpler terms, VPNâs are systems that permit public internet networks to be utilized as private networks with the purpose of increasing security. It provides more privacy and a secure connection within a public network. When you are in a public place such as a cafĂ© or a library, you most likely would want to use their public Wi-Fi network to access the internet. However, this is not safe due to the fact that the information from your device will then be accessible by everyone else using the same Wi-Fi network. That is where VPN comes into play with providing an extra layer of security. You will still be able to access the internet with the public Wi-Fi, but will be safeguarded by the Virtual Private Network. Based on the Network Encyclopedia, âVPNs use tunneling technologies to allow users to access private network resources through the Internet or another public network. Users enjoy the same security and features formerly available only in their private networksâ (Editor, 2020). This emphasizes that with a VPN, there is much more security and is the safer option when it comes to surfing the web through a public connection.
Context
Back in 1996, employees working for Microsoft Corporation created a procedure called PPTP, which stands for point-to-point tunneling protocol. It was a system of designing a protected network between users through encoding data and establishing a tunnel over local area network (LAN) or wide area network (WAN) connections. This procedure allows the transfer of confidential and significant data securely, even within public networks. The only thing needed to send and receive secured information through PPTP is a username, password and an IP address. Due to these simple requirements, PPTP has continued to be one of the most popular types of VPN. Originally, VPNâs were utilized by big corporations but throughout the years, internet users have become more alert to the probability of threats with working online and have started discovering more secure ways of using the internet. Nowadays, VPNâs are being used by many people to safely access the internet, avoid being hacked, prevent viruses from entering their technological devices and finally, ensuring online privacy.
According to MujoviÄ, the purpose of a VPN is âto create a private connection between multiple people and devices across the Internet. In effect it is an Internet within an Internet, secure private and encrypted from prying eyes, malware, hackers and anyone else who may wish to know where you surf, or where you are surfing fromâ (MujoviÄ, 2018). This actively demonstrates the importance of using a VPN when you are accessing a public network. It can protect your personal data and sensitive information from being stolen by cybercriminals. The term VPN is also discussed in context to multiprotocol label switching in a journal article. The writer states âa network in which customer connectivity amongst multiple sites is deployed on a shared infrastructure, that utilizes the same security, management, and quality of service policies that are applied in a private networkâ (Azher et al, 2005). The article provides an overview of the multiprotocol label switching VPN technology services and how it relates to other types of VPN. It highlights the problems linked to delivering VPN services in a MPLS setting.
Working Definition
The scientific term Virtual Private Network directly correlates to my major in Networking & Security because of how and why it was initially created. To sum up everything that has been stated so far, VPNs were formed to protect users from getting their data stolen by unauthorized individuals also known as âhackersâ or âcybercriminals.â With a VPN, all your data is directed through an encrypted cybernetic tunnel. By this, your IP address is unknown when using public networks, making its location hidden to everyone. Cybersecurity continues to be a developing field due to the advancement and use of technology within our generation. With the help of VPNs, your data can now be safe and protected.
References
Britannica, T. Editors of Encyclopaedia (2016, June 3). Virtual private network. Encyclopedia Britannica. https://www.britannica.com/technology/virtual-private-network
Editor. (2020, March 7). Virtual Private Network (VPN). Network Encyclopedia. https://networkencyclopedia.com/virtual-private-network-vpn/
I. Azher, M. Aurengzeb and K. Masood, “Virtual Private Network Implementation Over Multiprotocol Label Switching,” 2005 Student Conference on Engineering Sciences and Technology, Karachi, Pakistan, 2005, pp. 1-5, doi: 10.1109/SCONEST.2005.4382902.
MujoviÄ, V. (2018, August 17). The History of VPN Creation: Purpose of VPN.
https://www.le-vpn.com/history-of-vpn/.