Internet Security in 2017

The new personal internet security tool

Internet Security in 2017

Local enterprise (LAN or ELA) networks are networks internal to an organization, that connections between machines belong to the organization. More often, these networks are connected to Internet through interconnection equipment. Often, companies feel the need to communicate with affiliates, customers or even staff geographically remote via internet.

The data transmitted over the Internet are much more vulnerable than when they run on an internal network to an organization, because the path is not defined in advance, which means that data follow a public network owned by different operators. So it is not impossible that on the journey, the network is listened to by a personal user or even turned away. Therefore, it is not conceivable to transmit in such sensitive information to the organization or business conditions.

The first solution to meet this need for communication secure is to connect remote networks using dedicated lines. However most companies cannot afford to connect two remote local networks through a dedicated line, it is sometimes necessary to use Internet as a transmission medium.

A good compromise is to use Internet as a transmission medium using a protocol of “encapsulation” (English tunneling where the inappropriate use of the term “tunnelisation” sometimes), that is encapsulating the data to be transmitted in encrypted way. This is called virtual private network (VPN or VPN, Virtual Private Network acronym noted) to designate the artificially created network.
This network is said to be virtual because it connects two networks “physical” by an unreliable connection (Internet) and private (local networks) because only computers on local networks to share and other VPN can “see” the data.

VPN system so contact secure at a lower cost if the implementation of terminal equipment. On the other hand it does not ensure a quality of service comparable to a leased line insofar as the physical network is public and therefore not guaranteed.

How a VPN works

A virtual private network is based on a Protocol, called tunnelisation (tunneling) Protocol, which is a protocol allowing data passing from one end of the VPN to the other to be secured by cryptography algorithms.

The term of “tunnel” is used to symbolize the fact that between the input and output of the VPN the data is encrypted (encrypted) and therefore incomprehensible for anyone located between both ends of the VPN, as if the data were in a tunnel. In the case of a VPN established between two machines, called VPN client element to encrypt and decrypt the data on the side (client) user and VPN server (or more generally)
remote access server) the item numbering and deciphering the data side of the organization.

This way, when a user requires access to the virtual private network, its request will be sent in clear system bridge, which will connect to the remote network through a public network infrastructure, then transmit the request in encrypted way. The remote computer will then provide the data to the VPN server of the local network that will transmit the encrypted response. Reception on the user VPN client, the data will be decrypted and then passed to the user.

Leave a Reply

Your email address will not be published. Required fields are marked *