Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Dynamic Virtual Private Network
Post: #1

Definition

Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally designed with businesses in mind. It lacks the technology required for secure business transactions and communications. A challenge therefore arises for businesses with intranet, i.e. how to establish and maintain trust in an environment which was originally designed for open access to information. More specifically, a way has to be found to secure an intranet without impinging on its inherent benefits of flexibility, interoperability and ease of use.

Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provide both high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs. Our dynamic VPN can provide this flexibility based on a unique agent-based architecture as well as other features.

Because information can now be made available in such a flexible and fine-grained fashion, a company's files, documents or data that had to locked in the past can now be accessed in either whole or in part to carefully selected groups of users in precisely determined ways. As a result, a dynamic VPN is an intranet enabler. It enables an intranet to offer more services and services than it could otherwise, thereby allowing the business to make more use of its information resources.

In order to accommodate new, changing and expanding groups of users and provide these users with information in a number of ways, intranets should deliver several benefits, including flexibility, interoperability, ease of use and extendibility. In particular, they should be open and and standards based, so information can be read by different users with different applications on different platforms.

However, the benefits promised by intranets lead to an important challenge for businesses using this technology: how to establish and maintain trust in an environment which was designed originally for free and open access to information. The Internet was not designed with business security in mind. It was designed by universities as an open network where users could access, share and add to information as early as possible. A way has to be found to secure an intranet for businesses without impinging on the intranet's inherent benefits of flexibility interoperability and ease of use. Indeed, an ideal solution must also provide not only the highest levels of security but also security in such a way that users can easily access, modify and share more information, not less, under carefully controlled and maintained conditions.

The most appropriate and successful answer to this challenge will be a DYNAMIC VIRTUAL PRIVATE NETWORK. Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provides both extremely high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs.

A dynamic VPN is actually an intranet enabler. It enables an intranet to offer more resources and services than it could otherwise, thereby allowing the business to make more use of its information resources.

Major Drawbacks Of VPN

The single major problem on the road to VPN is network security. Because VPN is connected to a public network. , the internet, it is prone to be hacked. Though all networks have some basic security that prevents such access they are often insufficient. The main threat is to the data that is transmitted through the internet. Then the user at this has to be sure that the person at the other is really the person who he claims to be. This protects data through a combination of encryption, host authentication and protocol tunneling. The commonly used basic protecting data is encryption. This involves scrambling the data using an algorithm so that even if the transmitted data is tapped, it cannot be decoded without the correct key.
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Lightbulb Virtual Laser Keyboards (Download PPT,Abstract,Report) computer science crazy 493 106,505 28-03-2016 04:10 AM
Last Post: zotufalist
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 1,921 14-07-2015 02:24 PM
Last Post: seminar report asees
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 7,253 10-02-2015 05:52 PM
Last Post: seminar report asees
  VIRTUAL KEYBOARD A SEMINAR REPORT Computer Science Clay 17 22,504 25-01-2015 09:57 AM
Last Post: Beslanlox
  Virtual keyboard computer science crazy 3 2,494 17-09-2014 10:23 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,765 30-03-2014 04:40 AM
Last Post: Guest
  Dynamic Synchronous Transfer Mode computer science crazy 3 3,672 19-02-2014 03:29 AM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 12 8,964 17-07-2013 04:08 PM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 2,832 28-02-2013 02:42 PM
Last Post: Guest
  network security seminar report computer science technology 13 10,587 24-01-2013 12:42 PM
Last Post: seminar details