{"id":11995,"date":"2018-10-30T19:38:03","date_gmt":"2018-10-30T19:38:03","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/?post_type=chapter&#038;p=11995"},"modified":"2024-05-07T16:56:53","modified_gmt":"2024-05-07T16:56:53","slug":"virtual-private-networks-vpns","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/chapter\/virtual-private-networks-vpns\/","title":{"raw":"Virtual Private Networks (VPNs)","rendered":"Virtual Private Networks (VPNs)"},"content":{"raw":"<div class=\"textbox learning-objectives\">\r\n<h3>Learning Outcomes<\/h3>\r\n<ul>\r\n \t<li>Discuss how businesses can use Virtual Private Networks (VPNs) to manage information<\/li>\r\n<\/ul>\r\n<\/div>\r\nA\u00a0<strong>virtual private network<\/strong>\u00a0(<strong>VPN<\/strong>) extends a\u00a0private network\u00a0(intranet) across a public network (Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network while taking advantage of the flexibility of the Internet. In a business setting, remote-access VPNs allow employees to access their company's\u00a0intranet\u00a0from home or while traveling outside the office. Site-to-site VPNs allow employees in geographically separated offices to share one cohesive virtual network.\u00a0<img class=\"aligncenter wp-image-12166 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3006\/2018\/10\/11183725\/512px-Virtual_Private_Network_overview.svg_.png\" alt=\"A diagram showing the connections in an Internet VPN. There are four users or locations with computing machines: The head office, two regional offices, and remote\/roaming users. Each user is connected to the others via the internet.\" width=\"512\" height=\"362\" \/>\r\n\r\nTo ensure security, the VPN connection is established using encryption protocols and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN.\r\n\r\nAlthough VPNs cannot make online connections completely secure, they can increase privacy and security. For example, to prevent disclosure of private information, VPNs typically allow only authenticated remote access using encryption\u00a0techniques.\r\n\r\nSome of the security advantages of a VPN include the following:\r\n<ul>\r\n \t<li>even if the network traffic is accessed, an attacker would see only\u00a0encrypted data<\/li>\r\n \t<li>sender\u00a0authentication\u00a0is required to prevent unauthorized users from accessing the VPN<\/li>\r\n \t<li>the VPN messaging is designed to detect instances of tampering with transmitted messages<\/li>\r\n<\/ul>\r\nAs security concerns continue to grow in the digital age, more and more companies are emerging to serve the growing demand for VPN services. Which service a business chooses will be determined by its planned uses for the VPN.\r\n<div class=\"textbox tryit\">\r\n<h3>Practice Question<\/h3>\r\nhttps:\/\/assess.lumenlearning.com\/practice\/19311f57-d219-4f80-a115-5d4b05f815ac\r\n<\/div>","rendered":"<div class=\"textbox learning-objectives\">\n<h3>Learning Outcomes<\/h3>\n<ul>\n<li>Discuss how businesses can use Virtual Private Networks (VPNs) to manage information<\/li>\n<\/ul>\n<\/div>\n<p>A\u00a0<strong>virtual private network<\/strong>\u00a0(<strong>VPN<\/strong>) extends a\u00a0private network\u00a0(intranet) across a public network (Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network while taking advantage of the flexibility of the Internet. In a business setting, remote-access VPNs allow employees to access their company&#8217;s\u00a0intranet\u00a0from home or while traveling outside the office. Site-to-site VPNs allow employees in geographically separated offices to share one cohesive virtual network.\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12166 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3006\/2018\/10\/11183725\/512px-Virtual_Private_Network_overview.svg_.png\" alt=\"A diagram showing the connections in an Internet VPN. There are four users or locations with computing machines: The head office, two regional offices, and remote\/roaming users. Each user is connected to the others via the internet.\" width=\"512\" height=\"362\" \/><\/p>\n<p>To ensure security, the VPN connection is established using encryption protocols and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN.<\/p>\n<p>Although VPNs cannot make online connections completely secure, they can increase privacy and security. For example, to prevent disclosure of private information, VPNs typically allow only authenticated remote access using encryption\u00a0techniques.<\/p>\n<p>Some of the security advantages of a VPN include the following:<\/p>\n<ul>\n<li>even if the network traffic is accessed, an attacker would see only\u00a0encrypted data<\/li>\n<li>sender\u00a0authentication\u00a0is required to prevent unauthorized users from accessing the VPN<\/li>\n<li>the VPN messaging is designed to detect instances of tampering with transmitted messages<\/li>\n<\/ul>\n<p>As security concerns continue to grow in the digital age, more and more companies are emerging to serve the growing demand for VPN services. Which service a business chooses will be determined by its planned uses for the VPN.<\/p>\n<div class=\"textbox tryit\">\n<h3>Practice Question<\/h3>\n<p>\t<iframe id=\"assessment_practice_19311f57-d219-4f80-a115-5d4b05f815ac\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/19311f57-d219-4f80-a115-5d4b05f815ac?iframe_resize_id=assessment_practice_id_19311f57-d219-4f80-a115-5d4b05f815ac\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11995\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Virtual Private Networks (VPNs). <strong>Authored by<\/strong>: Linda Williams. <strong>Provided by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Virtual Private Network overview image. <strong>Authored by<\/strong>: Ludovic.ferre. <strong>Provided by<\/strong>: Wikimedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Virtual_Private_Network_overview.svg\">https:\/\/commons.wikimedia.org\/wiki\/File:Virtual_Private_Network_overview.svg<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":99672,"menu_order":14,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"Virtual Private Networks (VPNs)\",\"author\":\"Linda Williams\",\"organization\":\"Lumen Learning\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Virtual Private Network overview image\",\"author\":\"Ludovic.ferre\",\"organization\":\"Wikimedia\",\"url\":\"https:\/\/commons.wikimedia.org\/wiki\/File:Virtual_Private_Network_overview.svg\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"1fc5c8fa-0e4a-4fda-88d2-ea9d1a7dbab1, 9971d62f-d124-4e6a-94fd-281369e52b40","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11995","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/users\/99672"}],"version-history":[{"count":13,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11995\/revisions"}],"predecessor-version":[{"id":15537,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11995\/revisions\/15537"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11995\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/media?parent=11995"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11995"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=11995"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/license?post=11995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}