Psycology 2
Psycology 2
Psycology 2
Submitted by
Adeel Sheikh
Roll No. 57124-F19
Class BSCS 8-C
Q1. What are the benefits or disadvantages of VPNs? Briefly mention
the ways in which VPNs can be implemented.
Advantages of a VPN
The advantages of a VPN can apply to the workplace as well. VPNs are ideal for
remote work setups because employees can use them to have secure connections
to their workplace PCs and company applications and files, no matter where they
are. Using a VPN for business ensures that valuable customer and company data
is as safe as it can be, even when working from home.
Businesses today need to consider internet safety more than ever. With more
people than ever working from home, sensitive company and customer
information is at a higher risk of theft.
For example, say an employee connects to a work computer remotely on a public
network without using a VPN. Theoretically, anyone on that public network could
1
gain access to the internal company network because the employee did nothing
to hide their information.
Cost-Effective Security
There are new "security solutions" every day, but the latest software
and firewalls can be expensive and may end up causing more issues than they
prevent. You can avoid steep licensing fees or monthly charges by using a VPN.
While it might not scan for viruses or block intruders from trying to connect to
your PC, a VPN prevents the need for those features by essentially making you
invisible online.
Gaming Pros
If you have the bandwidth, using a VPN while gaming can have some advantages.
The bonuses include protection from DDoS attacks or angry players trying to gain
access to your home network. The region-free capabilities of using a VPN also
means that you could choose which servers to use when playing a game, which
could even improve your connection speeds in some situations. Some gaming
titles may only be available in specific regions, and a VPN could give you access to
those games as well.
Disadvantages of a VPN
Before deciding to use a VPN, it’s important to understand the disadvantages of a
VPN as well. The good news is that in most cases, the pros far outweigh the cons.
Those same companies that want to charge people more based on location found
out about VPN use and recently have taken steps to combat it. Some ecommerce
2
sites utilize software known as VPN blockers, which works to identify and prevent
users from using VPNs.
Complicated Set Up
While connecting to the internet may be easy, setting up a VPN is not. A VPN is
essentially an encrypted tunnel that hides the information inside. Failing to set up
the VPN correctly can result in leaks. Information leaks can occur when using a
VPN that is not correctly configured. These leaks are significantly more dangerous
than browsing the web without a VPN, because the leak shows that you are trying
to use a VPN to hide information, thus drawing attention from unwanted parties.
Dropped Connections
Even the best VPN can sometimes drop the connection. When a VPN loses
connectivity, it is not the same as merely losing Wi-Fi and being disconnected
from the internet. A dropped connection over VPN means that your true network
information is now on display for anyone. This also means that during a dropped
connection, your ISP can see what sites you are visiting. If any site you visit
violates an ISP's terms of service— like a torrent, for example — they could shut
down your connection right then and there.
Gaming Cons
3
IPsec originally defined two protocols for securing IP packets: Authentication
Header (AH) and Encapsulating Security Payload (ESP). The former provides data
integrity and anti-replay services, and the latter encrypts and authenticates data.
The IPsec suite also includes Internet Key Exchange (IKE), which is used to
generate shared security keys to establish a security association (SA). SAs are
needed for the encryption and decryption processes to negotiate a security level
between two entities. A special router or firewall that sits between two networks
usually handles the SA negotiation process.
4
packet to add authentication data and protect the contents from
modification.
IKE. Defined in RFC 7296, IKE is a protocol that enables two systems or
devices to establish a secure communication channel over an untrusted
network. The protocol uses a series of key exchanges to create a secure
tunnel between a client and a server through which they can send
encrypted traffic. The security of the tunnel is based on the Diffie-
Hellman key exchange.
5
includes mechanisms that mitigate certain threats – e.g., Denial Of Service (DOS)
and anti-replay protection.
In ISAKMP, SA and key management are separate from any key exchange
protocols; so, in a sense ISAKMP is an "abstract" protocol – it provides a
framework for authentication and key management and supports many actual
key exchange protocols (e.g., IKE). ISAKMP defines header and payload formats
but needs an instantiation to a specific set of protocols. Such an instantiation is
denoted as the ISAKMP Domain Of Interpretation (DOI): an example of this for the
IPsec/IKE is the IPsec DOI [RFC2407].
IKEv1 specifies two significant negotiation phases for IKE and IPsec SA
establishment:
6
Q4 Write the steps to use IPsec in Windows 7/10/11 to implement?
To use IPsec (Internet Protocol Security) in Windows 7, 10, or 11 to
implement secure communication, follow these steps:
1. Open the Control Panel: Click on the Start button and then select Control
Panel.
2. Navigate to "Network and Sharing Center": In the Control Panel window,
locate the "Network and Internet" category and click on "Network and
Sharing Center."
3. Set up a new connection or network: In the Network and Sharing Center,
click on "Set up a new connection or network."
4. Select "Connect to a workplace" and click Next: In the "Set up a connection
or network" wizard, choose "Connect to a workplace" and click Next.
5. Choose "Use my Internet connection (VPN)": In the "Connect to a
Workplace" wizard, select "Use my Internet connection (VPN)."
6. Enter the IP address or domain name of the VPN server: Type in the IP
address or domain name of the VPN server you want to connect to and
provide a name for the connection. You can also select whether to allow
other people on the computer to use the connection.
7. Click "Next" and then "Finish": After entering the necessary details, click on
Next and then Finish to complete the VPN setup.
8. Open the network connections settings: Go back to the Control Panel and
select "Network and Sharing Center" again. From there, click on "Change
adapter settings" on the left-hand side of the window.
9. Configure the VPN adapter properties: Locate the VPN connection you just
created, right-click on it, and choose "Properties" from the context menu.
10.Enable IPsec for the VPN connection: In the VPN connection properties
window, go to the "Security" tab and click on "IPsec Settings."
11.Configure IPsec settings: In the IPsec Settings window, you can specify the
IPsec policy to use. You can choose from predefined policies or create
custom ones based on your requirements. Select the desired policy and
click OK.
12. Apply the changes: Back in the VPN connection properties window,
click OK to save the IPsec settings.