Cyber Unit3 Lecture 4
Cyber Unit3 Lecture 4
Class A: 0.0.0.0-127.255.255.255
Class B: 128.0.0.0-191.255.255.255
Class C: 192.0.0.0-223.255.255.255
Class D: 224.0.0.0-239.255.255.255
Class E: 240.0.0.0-255.255.255.255
The use of IP addresses typically happens behind the scenes. The process
works like this:
https://www.youtube.com/watch?v=xGjGQ24cXAY GARY
https://www.youtube.com/watch?v=_wQTRMBAvzg
VPN stands for virtual private network. A virtual private network (VPN) is a
technology that creates a safe and encrypted connection over a less secure
network, such as the internet.
The name only suggests that it is Virtual “private network” i.e., user can be the
part of local network sitting at a remote location. It makes use of tunneling
protocols to establish a secure connection.
1. Encryption
2. Encapsulation.
3. Tunneling
NEED OF VPN
When you're using a public Wi-Fi network, even one that's password-protected, a
VPN is your best friend. If a hacker is on the same Wi-Fi network, it's actually
quite easy for them to snoop on your data. The basic security that your average
coffee shop uses, a WPA2 password, doesn't actually protect you from others
on the network in a robust way.
Using a VPN will add an extra layer of security to your data, ensuring you
bypass the coffee shop's ISP and encrypting all your communication. Hackers will
need to find easier prey.
Often, the VPN will allow you to use streaming services that you paid for and
have access to in your home country, but for international rights issues aren't
available in another. Using a VPN can make it seem like you're enjoying the
service just like you were at home. VPN use sees huge spikes from non-U.S.
countries during events like the Super Bowl and March Madness. Netflix is always
trying to crack down on VPN users, but many VPN providers are continuously
adapting their services in response. It's a bit of a whack-a-mole game, but some
VPNs do, in fact, poke through.
Travelers may also be able to find cheaper airfare when using a VPN, as
prices can vary from region to region.
Many employers require the use of a VPN to access company services remotely,
for security reasons. A VPN that connects to your office's server can give you
access to internal company networks and resources when you're not in the
office. It can do the same for your home network while you're out and about.
Some countries don't have the same protections for press freedom, speech, and
expression that many Western countries have, and a few regimes even take
draconian measures to monitor and take action against those they see as threats to
the regime.
It should almost go without saying that for political dissidents, using a VPN
(among other privacy tools) is essential for internet use within an oppressive
regime. They're not a catch-all solution, though, and governments are beginning to
crack down on their use.
Even in the comfort of your own home, doing your regular internet thing, using a
VPN isn't a terrible idea. Generally, it will keep you from leaving footprints on the
web for your ISP to scoop up.
6. Bypass restrictions
Using a computer at certain locations, such as a school or library, will not offer the
full internet, but rather a filtered, partially censored version. While in some cases
this works for the protection of users, in other cases it can be frustrating when
trying to look into a blocked topic.
There are times when some research needs to be done without tipping your hand.
For example, if one company wants to look at the available jobs or policies at a
competitor, it would be ideal to do this without revealing their IP address,
especially if this is done from the workplace.
A VPN is an effective cloak in these cases, as the user will be assigned a totally
different IP address, and it can be chosen to be geographically disparate for an
additional element of safety.
VPN
HOW VPN WORKS?
See this video before reading what is written next to it, it will help you.
https://www.youtube.com/watch?v=yB1KiboEWC4
If you were a political refugee and your location was confidential for your
safety but you needed to communicate with key people in your home country,
how would you do it?
Well, one way would be writing the message on a postcard with the address of
the final recipient and then put the postcard into an envelope and post it to a
trusted friend in your home country. When your friend receives it, he opens the
envelope, puts a stamp on the postcard and posts it. The final recipient of the
postcard has no knowledge of where the postcard came from since the stamp is
local.
The act of putting the postcard into the envelope with its own address is
equivalent to encapsulation and when you do this with data on the Internet, you
create a virtual private network tunnel, commonly called 'VPN tunneling'.
Although this is technically a VPN, it's not really private until you encrypt the
contents of the envelope. Without encryption, we could still hide our identity but
what if the final recipient was powerful enough and had friends in the post
office? In this case the post office employee could see the stamp on the envelope
before it reached your friend and leak your location.
To achieve a much higher level of security, you need to encrypt the contents of
the postcard inside the envelope so that only yourself and your friend can decode
it. Now if anyone intercepted and opened it, they would have no idea who the
postcard was addressed to nor would they understand the contents of the message.
When your friend receives the envelope, he would open it and decrypt the message
and forward it to its final recipient. In the context of a public VPN service, your
friend would be the VPN service and the final recipient would be the website you
are browsing.
It is worth noting at this point that the message sent from your friend to the final
recipient cannot be encrypted since the final recipient does not have the decryption
key. Equally, when using a VPN service, the data sent from the VPN service to the
destination website cannot be encrypted; however, your private IP address has
been replaced with the address of the VPN service so your identity is still masked.
Whilst communicating with your friend, it's as if there is a secure tunnel between
the two of you protecting the contents. This is why it is called a virtual tunnel or
more commonly, a VPN tunnel.
The origin of your data is hidden so the websites and servers you visit can’t see
where your activity originated. Rather, the activity appears to originate at the
location of the VPN’s server.
The process of encapsulating the data hides its origin, but it isn’t automatically
private or secure from hackers or government surveillance. To achieve a higher
level of security, your data must also be encrypted so if your data is intercepted
between your device and the VPN’s server, it can’t be read or understood.
You have a right to privacy—even when you’re online. And when you use a VPN
tunnel to go online, you protect your online activity and private data from hackers,
governments and corporations who want to watch what you do.
VPN protocols
IP security (IPsec)
OpenVPN