Cyber Security – VPN Jan – 2020 Ken Knapp
Virtual Private Network
Virtual in that it is not permanent
Private in that the payload data is encrypted
Network, the communication medium that is used
How does a VPN work?
VPN is an encrypted network tunneling protocol. It allows a user to encrypt their data while using a public network; like the internet. Both sender and receiver have a “compatible” VPN.
Should I use one? Depends.
It provides more privacy
Makes it much more difficult for a hacker to obtain your PII, Personally Identifiable Information if your data in encrypted. A VPN, by definition, encrypts data between a sender and receiver.
How do I get one?
VPNs are included in Microsoft, Mac and some, not all, but a few Linux/’nix’ operating systems.
VPNs are also included in the major cell phone brands and carriers, Samsung, Apple, Motorola, T-Mobile, AT&T, Verizon and Sprint. You can purchase an independent 3rd party VPN product as well. See below.
We will follow Alice down the ‘rabbit hole’.
What is the significance of 5914?
Do I need a proxy? What is a Proxy?
A proxy acts in the place of its client.
Read, go over services
https://azure.microsoft.com/en-us/services/vpn-gateway/?&ef_id=EAIaIQobChMI_p3n4uaP5wIVBNNkCh1CRg9DEAAYBCAAEgKPK_D_BwE:G:s&OCID=AID2000128_SEM_Tw7eOVzb&MarinID=Tw7eOVzb_343217245174_vpn_e_c__48089306844_kwd-11666721&lnkd=Google_Azure_Nonbrand&gclid=EAIaIQobChMI_p3n4uaP5wIVBNNkCh1CRg9DEAAYBCAAEgKPK_D_BwE