VPN is a virtual private network, a set of technologies that allows providing one or more network connections over another network. Deciphering the name: a network is an association of several devices by some type of communication that allows exchanging of information. Virtual intangible, not physical; that is, it does not matter through which communication channels it is laid. The physical and logical topologies may or may not be the same. Private, an outside user cannot enter this network, only those who have been allowed access are there. In a private network, it is necessary to mark the participants and their traffic in order to distinguish it from the rest, someone else’s information. Also, in such a network, data is protected by cryptographic means, simply speaking, it is encrypted.
VPN is committed to increasing the level of privacy and protection of any data. This technology is used when connecting to Wi-Fi in a cafe or subway so that hackers cannot steal the data. When using a public network, it is safe, except to view sites in a browser. If a person uses social networks, an attacker cannot only intercept confidential information but also use it for their own purposes by logging into this very social network on behalf of someone else. Even worse, if he or she succeeds in hacking the mail, then all the applications associated with this mailbox will be attacked. But the most unpleasant thing can be a leak of bank card data if a user decides to transfer money to someone by connecting to free Wi-Fi. In addition, VPN is used to ensure anonymity. It is impossible to calculate what sites the user visits, what browser he or she uses, and where he or she is.
As for my classmates, I fully agree with Selvin De Leon. First, he rightly acknowledged that VPN is aimed at maintaining both the integrity of data and the ability to customize access to it. Secondly, an important clarification is the protection and non-proliferation of the company’s IP address, allowing large corporations to function effectively and without risks. At the same time, it is worth highlighting databases that are often attacked by hackers and subsequently leaked information (Hicks, 2021). Frameworks and VPNs together provide a high degree of secrecy and lack of access to data by unauthorized persons.
Reference
Hicks, R. M. (2021). Implementing always-on VPN. Modern mobility with Microsoft Windows 10 and Windows server 2022. Apress.