Introduction to cyber security: stay safe online (2024)

Introduction to cyber security: stay safe online (1)

Figure 3

Show description|Hide description

This is a photograph from a film scene in which two people in the Wild West are shooting at each other.

Figure 3

You’ve just learned how firewalls can protect individual computers and local networks from attack. Next, you’ll learn about the uses of virtual private networks (VPNs).

In some ways, our local networks resemble forts sitting in the Wild West of a Hollywood movie. Inside strong walls, life goes on as normal, with data being exchanged freely between trusted machines. Meanwhile, beyond the firewall there is the lawless frontier of the internet; traffic crossing the internet must make a risky journey largely unprotected.

The problem of secure data transmission is especially acute for organisations based in several physical locations, such as those who need to exchange information with sub-contractors or those with a dispersed workforce such as sales teams or home workers.

Traditionally, companies invested in private communications links (usually called leased lines) whose cost might run to thousands of pounds per month. Most organisations cannot justify such an investment and in any case, leased lines cannot serve a mobile or highly dispersed workforce. So the lawless frontier of the internet is our only choice – this is where VPNs come to the rescue!

A VPN, as the name implies, is a means of creating a private network across an untrusted network such as the internet. VPNs can be used for a number of different purposes such as:

  • to securely connect isolated local area networks (LANs) across the internet
  • to allow mobile users remote access to a corporate network using the internet
  • to control access within an intranet environment.

VPN concepts for a corporate network

VPNs are typically implemented using dedicated network devices (sometimes this might be a firewall) and software. There are two parts to the software; the first, called aVPN client, is installed on the computer of anyone who wants to be part of the VPN. The client is responsible for connecting users to the VPN so that it can send and receive information in a secure manner with, in this example, a corporate network. The second part is theVPN serverwhich is part of a dedicated network device, usually located on the perimeter of an organisation’s network. The server software typically performs the authentication of users and route traffic to the corporate network.

The VPN software creates a path known as a ‘tunnel’ between the VPN client and the VPN server. It can establish this ‘tunnel’ by using any third party or untrusted network such as the internet. Unlike other paths through the internet, information which passes through this ‘tunnel’ can be encrypted to protect it from inspection or modification. So we can use these tunnels to protect our data while it crosses the lawless frontier of the internet back to the safety of our forts!

VPN concepts for an open network

Some parts of the Internet are much more dangerous than others. In particular, public wi-fi connections in cafes, hotels, airports can allow your data to be intercepted and your movements to be tracked. Some countries also routinely monitor all Internet traffic as it enters or leaves the country as well as internal traffic.

A VPN service can offer a VPN client to run on your computer and VPN servers at safe locations around the world which provide a gateway onto the Internet. When you connect with your VPN client to a VPN service an encrypted tunnel connects your computer to the remote VPN server. It appears to the outside world as though your own computer is located at the VPN exit point in another country.

Free VPN services are available but tend to be quite slow. If personal security is particularly important take care to use a service that doesn’t log user data in any way. ProtonVPN is an example of such a service https://protonvpn.com/ [Tip: hold ⌘ and click a link to open it in a new tab. (Hide tip)] .

VPN concepts for a personal private network

It is quite possible to install VPN server software on your own private computer at home, and leave it running when you are away from home. A VPN client software on your mobile device connects to your own home VPN server. An encrypted tunnel connects your mobile device wherever you are and gives you secure access to your home computer. To the outside Internet it appears as though you are accessing the Internet from home.

Introduction to cyber security: stay safe online (2024)
Top Articles
Brochet record : les 10 plus gros brochets pêchés en France
Fuse
Mackenzie Rosman Leaked
Arkansas Gazette Sudoku
Nwi Police Blotter
Otis Department Of Corrections
Mustangps.instructure
Www Movieswood Com
Visustella Battle Core
Which aspects are important in sales |#1 Prospection
Inevitable Claymore Wow
Ivegore Machete Mutolation
What is Cyber Big Game Hunting? - CrowdStrike
Nutrislice Menus
Dignity Nfuse
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Weepinbell Gen 3 Learnset
Drago Funeral Home & Cremation Services Obituaries
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Mega Personal St Louis
Panola County Busted Newspaper
Fleet Farm Brainerd Mn Hours
پنل کاربری سایت همسریابی هلو
4 Times Rihanna Showed Solidarity for Social Movements Around the World
Ocala Craigslist Com
Gunsmoke Tv Series Wiki
Kristy Ann Spillane
Meggen Nut
Marlene2295
Funky Town Gore Cartel Video
County Cricket Championship, day one - scores, radio commentary & live text
Used 2 Seater Go Karts
Shiftwizard Login Johnston
Solarmovie Ma
About Us | SEIL
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Whitehall Preparatory And Fitness Academy Calendar
Fifty Shades Of Gray 123Movies
Indio Mall Eye Doctor
303-615-0055
Let's co-sleep on it: How I became the mom I swore I'd never be
Casamba Mobile Login
062203010
Bob And Jeff's Monticello Fl
Emily Tosta Butt
Craigslist Odessa Midland Texas
Sallisaw Bin Store
Shell Gas Stations Prices
Mit diesen geheimen Codes verständigen sich Crew-Mitglieder
Free Carnival-themed Google Slides & PowerPoint templates
Cognitive Function Test Potomac Falls
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 6799

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.