Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Last Updated: Mar 27, 2024
Difficulty: Easy
Leveraging ChatGPT - GenAI as a Microsoft Data Expert
Speaker
Prerita Agarwal
Data Specialist @
23 Jul, 2024 @ 01:30 PM

Introduction 

VPN stands for Virtual Private Network. It is a technology or a service that helps create a safe, encrypted connection. It provides inline privacy by creating a private network from a public internet connection. It uses tunnelling protocols to provide users with such connections. Thus, this allows a user to send and receive data across the internet securely.

Examples -  Some examples where VPNs are used:-

  1. To play games without the user’s ISP slowing him/her down.
  2. To watch Youtube and other streaming services without the user’s ISP slowing him/her down.
  3. To watch free streaming TV in other countries.
  4. To shop online while abroad. 

How does VPN work?

VPN uses tunnelling protocols to create a point-to-point connection that unauthorized users cannot access. Every VPN will use different tunnelling protocols. The tunnelling protocol used will depend on the platform where VPN is used and thus provide data encryption at varying strengths. Next comes the end-point device, which needs a VPN client running locally or in the cloud. The VPN client will not be noticeable to the end-user unless any performance issue is created.

Data will be transmitted from the client machine to a point in the VPN network. The VPN point will encrypt the data and send it through the internet. Another point in the VPN network will decrypt the data and send it to the appropriate internet resource. Then the internet resource will send the data back to the point where it will get encrypted. This encrypted data will go to another point in the VPN network that will decrypt the data and send it back to the client machine.

Source

Get the tech career you deserve, faster!
Connect with our expert counsellors to understand how to hack your way to success
User rating 4.7/5
1:1 doubt support
95% placement record
Akash Pal
Senior Software Engineer
326% Hike After Job Bootcamp
Himanshu Gusain
Programmer Analyst
32 LPA After Job Bootcamp
After Job
Bootcamp

Types of VPN

VPN can be of the following types:-

  1. Remote Access VPN
  2. Intranet-based site-to-site VPN
  3. Extranet based site-to-site VPN

Features of VPN

  1. It provides several server locations.
  2. It is cost-effective.
  3. It supports the router.
  4. It is highly encrypted and secure.
  5. It provides safety against DNS leaks.

Applications of VPN

  1. It protects our identity.
  2. It provides privacy to the user.
  3. It helps users to bypass geographic restrictions easily.
  4. It also enables users to protect themselves from being logged while torrenting.

What does VPN hide?

  1. It helps in hiding the user’s browsing history.
  2. It helps in hiding the user’s location and IP address.
  3. Helps in hiding users’ web activity.
  4. It helps in hiding the user’s location for streaming.

How to choose a VPN?

Points to keep in mind when choosing a VPN are:-

  1. We need to figure out what we need a VPN for.
  2. Next, we need to look at each VPN’s qualities and match our priorities with theirs.
  3. Then we need to check which devices are compatible.
  4. We need to find a VPN with a user-friendly interface.
  5. Then, in the end, we need to ensure that all the important locations are covered.

Advantages of VPN

  1. VPN provides privacy.
  2. VPN helps users to bypass geographic restrictions easily.
  3. VPN prevents bandwidth throttling.
  4. VPN improves the gaming experience.
  5. VPN can also bypass firewalls.

Disadvantages of VPN

  1. VPN has legality issues.
  2. Sometimes VPN can slow down the internet speed.
  3. VPN might have configuration issues.
  4. VPN can also have privacy issues.

FAQs

  1. Name some VPN Protocols.
    IP Security, OpenVPN, Secure Socket Layer, Transport Layer Security, PPTP, L2TP.
  2. Define Kill Switch.
    Kill Switch is defined as the last resort security feature. When a VPN connection is disrupted, the kill switch will play its role by automatically disconnecting the device from the internet so that the IP address is not exposed.
  3. State the types of Kill Switches.
    Active KIll Switch Protocol and Passive Kill Switch Protocol.
  4. What does SSTP stand for?
    Secure Socket Tunneling Protocol.
  5. On what does Remote Access VPN rely?
    It usually relies on IPsec or SSL to secure the connection.

Key Takeaways

In this article, we have extensively discussed VPN, how it works, its types, features, applications, and some other details regarding it.

We hope that this blog has helped you enhance your knowledge regarding what VPN is. If you would like to learn more, check out our articles on Active and Passive AttacksWhat is Information Security, Active Attack and Passive AttackNeed of Information Security.

Do upvote our blog to help other ninjas grow. Happy Coding!

Topics covered
1.
Introduction 
2.
How does VPN work?
3.
Types of VPN
4.
Features of VPN
5.
Applications of VPN
6.
What does VPN hide?
7.
How to choose a VPN?
8.
Advantages of VPN
9.
Disadvantages of VPN
10.
FAQs
11.
Key Takeaways