Remote access risks responses | Computer Science homework help

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Virtual Private Networks (VPN) may be getting more utilization over the last year and half than ever before.  Simply because it seems more and more people are teleworking due to COVID 19.  Some types of VPNs are Point to Point Tunneling Protocols (PPTP), OpenVPN and Secure Socket Tunneling Protocol (SSTP).  All of these VPNs are utilized for the purpose of creating a secure tunnel or linkage from a private network to a public network.  This enables the user to send and receive data as if they were connected to a private network.

PPTP is one of the oldest versions of a VPN, due to it being one of the oldest versions it is also considered one of the more vulnerable VPNs.  The PPTP does offer quicker connection speeds than some of the other VPNs, but lacks some of the more secure features of modern modems.  The OpenVPN has grown in popularity as it is deemed almost unbreakable due to it’s strong encryption and authentication.  Lastly, the SSTP is popular due to it being compatible with most Microsoft applications.  The downside to the SSTP is it is proprietary property and developers do not have the underlying code.  However, this may not be a downside to Microsoft or Microsoft users as it could help enhance the security of the VPN.

Though VPNs are a means to secure data on a public network, anything that touches the internet is vulnerable to being hacked.  Some of the techniques used to circumvent VPNs are, malicious ads (bait and switch), login credentials and DDOS attacks.  Malicious ads can carry malware, if users are not able to identify the fraudulent add before clicking the add, malware could be loaded onto the machine.  Log-in credentials can stolen and used to connect to a VPN, again this is up to the user to secure their data, if users are careless with their passwords, VPN security can be circumvented.  Lastly, DDOS attacks can be utilized against VPNs, however depending on the type of VPN utilized a DDOS attack could be thwarted, but it is a technique utilized by havers. 

Overall VPNs are effective at thwarting most attacks to a network and are encouraged for use.

V/r

Jeff Cannon

https://www.technadu.com/can-vpn-be-hacked/45630/

https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols

RESPONSE 2:

Virtual Private Network (VPN) allows for a private network connection over the Internet.  VPNs creates a secure tunnel for the transmission of network traffic.  There are two types of VPNs:  remote access and site-to-site. 

Remote access VPN allows users to connect via a secure VPN tunnel to access a private networks services and resources while off-site.  Remote VPNs also serve to bypass regional Internet restrictions by routing your connection using a different patch where those restrictions do not exist.

Site-to-site VPN or router-to-router VPN is used by larger companies that have satellite office in different locations.  Site-to-site VPN allows those satellite locations to connect to other sites within their network structure. 

Although VPNs are used to establish a secure connection over the Internet, they are still subject to security risks depending on the type of encryption algorithm used to secure the connection. Encryption of these tunnels can be broken is there are known vulnerabilities or if the encryption key is accessed by a bad actor.  The success of stealing encryption keys uses multiple tactics like trickery, computing power, time dedicated to breaking keys, and behind-the-scenes persuasion (VPN Mentor, 2021).  Another existing vulnerability for VPNs tracing of your location based on IP leaks via your web browser during the transmission network traffic.  

-Claudia 

References:

Geeks for Geeks. (10 April 2019).  Types of Virtual Private Network (VPNS) and it Protocols.  Retrieved 18 August 2021 from https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/

VPN Mentor (27 Jun 2021). Can VPNs Be Hacked? We Did The Research, Here’s the 2021 Guide.  Retrieved 18 August 2021 from https://www.vpnmentor.com/blog/can-vpns-hacked-take-deeper-look/

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

    Take your studies to the next level with our experienced specialists

    Chat
    Hello, my name is Derreck. Kindly drop your inquiry; I will get back to you shortly. (WhatsApp)+254 729 707 173