Now we are using the update technology have given businesses and client users a mostly of connection choices. A typical user might work from a laptop running Windows Vista while in the office or at home it doesn't matter. The office network might be accessed through a wall jack, with heavily monitored traffic.
we are use At home the user may be connect over a local wireless LAN with fast Internet from a Dsl connection. On the road the user probably connects via a combination of a smart phone, such as a Black Berry running the latest version of the Black Berry OS, and a super-lightweight net book running Linux; the network could be a Wi-Fi hotspot or a wireless broadband connection.
The Virtual private networks provide chance to make a secure network connection across a public network through the use of encryption because it is very important when user connect his network that time secure his connection and network Although, VPNs provide privacy and a level of trust. Before discussing the various trust issues associated with VPNs, it's necessary to note that the term itself has multiple implementations. VPN types include network-to-network, multiple service host-server, to single-service host-server. Each of these implementations can be used in a cloud computing environment, and each has security strengths and weaknesses.
The old Virtual private networks technology we can connect only the network-to-network VPN. This architecture has the greatest risk associated with it, due in part to the number of hosts involved. While this architecture would not likely be used in the client-to-cloud connection, it could be used within the cloud, especially with server farms or mashups.
The Virtual private networks the network-to-network VPN presents some good security challenges. The possibility was to hack via the encrypted tunnel without fear of detection is a strong incentive for any would-be hacker. This model gives an attacker the ability to use many services on many hosts in order to gain access and control of cloud computing data. The network-to-network VPN provides network transparency and management that enables inspection of the traffic after the point of decryption, but it does not protect the data payload end-to-end.
Source: http://searchsecurity.techtarget.com.au/articles/33071-Which-VPN-should-you-use-for-cloud-connections-
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment