SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
How Encryption for Strong Security
             Works

Introduction
Prerequisites
Background Information
What Makes a VPN?




                            Group C
Introduction
      ●   The world has
          changed a lot in the
          last couple of
          decades.
      ●   Many companies
          have facilities spread
          out across the
          country, or even
          around the world.
Prerequisites
       ●   As the popularity of
           the Internet has
           grown, businesses
           have turned to it as a
           means of extending
           their own networks.
Background Information
           ●   Remote_Access-Also
               callde a Virtual
               Private Dial-up
               Network, this is a
               user-to-LAN
               connection used by a
               company that has
               employees who need
               to connect to the
               private network from
               various remote
What Makes a VPN?
         ●   Site-to-Site-Through
             the use of dedicated
             equipment and large-
             scale encryption, a
             company can connect
             multiple fixed sites
             over a public network
             such as the Internet.
References




Network Management System

    http://www.cisco.com/.../tec...65.shtml

Contenu connexe

Tendances (8)

Fibre Tooling Innovations
Fibre Tooling InnovationsFibre Tooling Innovations
Fibre Tooling Innovations
 
V P N
V P NV P N
V P N
 
TemporaryInternetConnection
TemporaryInternetConnectionTemporaryInternetConnection
TemporaryInternetConnection
 
Pepwave max
Pepwave max Pepwave max
Pepwave max
 
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
Zabbix at Netco (Tobias van Hoogen / 12-02-2015)
 
Aastra Intelligate
Aastra Intelligate Aastra Intelligate
Aastra Intelligate
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Homework3
Homework3Homework3
Homework3
 

Similaire à week13

VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 

Similaire à week13 (20)

cloud computing related to communication.pdf
cloud computing related  to communication.pdfcloud computing related  to communication.pdf
cloud computing related to communication.pdf
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Shape your remote connection to your GCE instance
Shape your remote connection to your GCE instanceShape your remote connection to your GCE instance
Shape your remote connection to your GCE instance
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPN
 
Maximising Network Connectivity
Maximising Network ConnectivityMaximising Network Connectivity
Maximising Network Connectivity
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Infographic: Supercharge your Networking Career
Infographic: Supercharge your Networking CareerInfographic: Supercharge your Networking Career
Infographic: Supercharge your Networking Career
 
VPN
VPNVPN
VPN
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
 
Brief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdfBrief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdf
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

week13

  • 1. How Encryption for Strong Security Works Introduction Prerequisites Background Information What Makes a VPN? Group C
  • 2. Introduction ● The world has changed a lot in the last couple of decades. ● Many companies have facilities spread out across the country, or even around the world.
  • 3. Prerequisites ● As the popularity of the Internet has grown, businesses have turned to it as a means of extending their own networks.
  • 4. Background Information ● Remote_Access-Also callde a Virtual Private Dial-up Network, this is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote
  • 5. What Makes a VPN? ● Site-to-Site-Through the use of dedicated equipment and large- scale encryption, a company can connect multiple fixed sites over a public network such as the Internet.
  • 6. References Network Management System http://www.cisco.com/.../tec...65.shtml