0% found this document useful (0 votes)
41 views10 pages

Cyber Unit3 Lecture 4

An IP address is a unique string of numbers that identifies a device on the internet or network. IP addresses are composed of four numbers separated by periods that can range from 0-255, such as 192.158.1.38. IP addresses are allocated by IANA and ICANN to uniquely identify devices. A VPN creates a secure, encrypted connection over an unsecure network like the internet by encapsulating data packets and replacing the user's true IP address, effectively hiding their online activity and location from websites and servers.

Uploaded by

Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views10 pages

Cyber Unit3 Lecture 4

An IP address is a unique string of numbers that identifies a device on the internet or network. IP addresses are composed of four numbers separated by periods that can range from 0-255, such as 192.158.1.38. IP addresses are allocated by IANA and ICANN to uniquely identify devices. A VPN creates a secure, encrypted connection over an unsecure network like the internet by encapsulating data packets and replacing the user's true IP address, effectively hiding their online activity and location from websites and servers.

Uploaded by

Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

IP ADDRESS:

IP address stands for internet protocol address; An IP address is a unique


address that identifies a device on the internet or a local network.

An IP address is a string of numbers separated by periods. IP addresses


are expressed as a set of four number — an example address might be
192.158.1.38. Each number in the set can range from 0 to 255. So, the full
IP addressing range goes from 0.0.0.0 to 255.255.255.255.

Class A: 0.0.0.0-127.255.255.255

Class B: 128.0.0.0-191.255.255.255

Class C: 192.0.0.0-223.255.255.255

Class D: 224.0.0.0-239.255.255.255

Class E: 240.0.0.0-255.255.255.255

IP addresses are not random. They are mathematically produced and


allocated by the Internet Assigned Numbers Authority (IANA), a division of
the Internet Corporation for Assign ed Names and Numbers (ICANN).
ICANN is a non-profit organization that was established in the United
States in 1998 to help maintain the security of the internet and allow it to be
usable by all. Each time anyone registers a domain on the internet, they go
through a domain name registrar, who pays a small fee to ICANN to
register the domain.

How do IP addresses work?

If you want to understand why a particular device is not connecting in the


way you would expect or you want to troubleshoot why your network may
not be working, it helps understand how IP addresses work.
Internet Protocol works the same way as any other language, by
communicating using set guidelines to pass information. All devices find,
send, and exchange information with other connected devices using this
protocol. By speaking the same language, any computer in any location
can talk to one another.

The use of IP addresses typically happens behind the scenes. The process
works like this:

1. Your device indirectly connects to the internet by connecting at


first to a network connected to the internet, which then grants your
device access to the internet.
2. When you are at home, that network will probably be your Internet
Service Provider (ISP). At work, it will be your company network.
3. Your IP address is assigned to your device by your ISP.
4. Your internet activity goes through the ISP, and they route it back
to you, using your IP address. Since they are giving you access to
the internet, it is their role to assign an IP address to your device.
5. However, your IP address can change. For example, turning your
modem or router on or off can change it. Or you can contact your
ISP, and they can change it for you.
6. When you are out and about – for example . This is because you
will be using another network (Wi-Fi at a hotel, airport, or coffee shop,
etc.) to access the internet and will be using a different (and
temporary) IP address, assigned to you by the ISP of the hotel,
airport or coffee shop.

DOMAIN NAME  IP Address

Virtual Private Network (VPN)

https://www.youtube.com/watch?v=xGjGQ24cXAY GARY

https://www.youtube.com/watch?v=_wQTRMBAvzg
VPN stands for virtual private network. A virtual private network (VPN) is a
technology that creates a safe and encrypted connection over a less secure
network, such as the internet.

Virtual Private network is a way to extend a private network using a public


network such as internet.

The name only suggests that it is Virtual “private network” i.e., user can be the
part of local network sitting at a remote location. It makes use of tunneling
protocols to establish a secure connection.

3 main points to remember--

1. Encryption

2. Encapsulation.

3. Tunneling

NEED OF VPN

1. When you're on public Wi-Fi

When you're using a public Wi-Fi network, even one that's password-protected, a
VPN is your best friend. If a hacker is on the same Wi-Fi network, it's actually
quite easy for them to snoop on your data. The basic security that your average
coffee shop uses, a WPA2 password, doesn't actually protect you from others
on the network in a robust way.

Using a VPN will add an extra layer of security to your data, ensuring you
bypass the coffee shop's ISP and encrypting all your communication. Hackers will
need to find easier prey.

2. When you're traveling


If you're traveling to a foreign country (say, China, where sites like Facebook
are blocked), a VPN can help you access services that may not be available in that
country.

Often, the VPN will allow you to use streaming services that you paid for and
have access to in your home country, but for international rights issues aren't
available in another. Using a VPN can make it seem like you're enjoying the
service just like you were at home. VPN use sees huge spikes from non-U.S.
countries during events like the Super Bowl and March Madness. Netflix is always
trying to crack down on VPN users, but many VPN providers are continuously
adapting their services in response. It's a bit of a whack-a-mole game, but some
VPNs do, in fact, poke through.

Travelers may also be able to find cheaper airfare when using a VPN, as
prices can vary from region to region.

3. When you're a remote worker or student

Many employers require the use of a VPN to access company services remotely,
for security reasons. A VPN that connects to your office's server can give you
access to internal company networks and resources when you're not in the
office. It can do the same for your home network while you're out and about.

4. When you're a political dissident

Some countries don't have the same protections for press freedom, speech, and
expression that many Western countries have, and a few regimes even take
draconian measures to monitor and take action against those they see as threats to
the regime.

It should almost go without saying that for political dissidents, using a VPN
(among other privacy tools) is essential for internet use within an oppressive
regime. They're not a catch-all solution, though, and governments are beginning to
crack down on their use.

5. When you just want some privacy

Even in the comfort of your own home, doing your regular internet thing, using a
VPN isn't a terrible idea. Generally, it will keep you from leaving footprints on the
web for your ISP to scoop up.

6. Bypass restrictions

Using a computer at certain locations, such as a school or library, will not offer the
full internet, but rather a filtered, partially censored version. While in some cases
this works for the protection of users, in other cases it can be frustrating when
trying to look into a blocked topic.

7. Research without a trace:

There are times when some research needs to be done without tipping your hand.
For example, if one company wants to look at the available jobs or policies at a
competitor, it would be ideal to do this without revealing their IP address,
especially if this is done from the workplace.

A VPN is an effective cloak in these cases, as the user will be assigned a totally
different IP address, and it can be chosen to be geographically disparate for an
additional element of safety.
VPN
HOW VPN WORKS?

See this video before reading what is written next to it, it will help you.

https://www.youtube.com/watch?v=yB1KiboEWC4

A VPN tunnel works by encapsulating data in an encrypted data packet. To


understand encapsulation, let us attempt a simple analogy.

If you were a political refugee and your location was confidential for your
safety but you needed to communicate with key people in your home country,
how would you do it?

Well, one way would be writing the message on a postcard with the address of
the final recipient and then put the postcard into an envelope and post it to a
trusted friend in your home country. When your friend receives it, he opens the
envelope, puts a stamp on the postcard and posts it. The final recipient of the
postcard has no knowledge of where the postcard came from since the stamp is
local.

The act of putting the postcard into the envelope with its own address is
equivalent to encapsulation and when you do this with data on the Internet, you
create a virtual private network tunnel, commonly called 'VPN tunneling'.

Although this is technically a VPN, it's not really private until you encrypt the
contents of the envelope. Without encryption, we could still hide our identity but
what if the final recipient was powerful enough and had friends in the post
office? In this case the post office employee could see the stamp on the envelope
before it reached your friend and leak your location.

To achieve a much higher level of security, you need to encrypt the contents of
the postcard inside the envelope so that only yourself and your friend can decode
it. Now if anyone intercepted and opened it, they would have no idea who the
postcard was addressed to nor would they understand the contents of the message.

When your friend receives the envelope, he would open it and decrypt the message
and forward it to its final recipient. In the context of a public VPN service, your
friend would be the VPN service and the final recipient would be the website you
are browsing.

It is worth noting at this point that the message sent from your friend to the final
recipient cannot be encrypted since the final recipient does not have the decryption
key. Equally, when using a VPN service, the data sent from the VPN service to the
destination website cannot be encrypted; however, your private IP address has
been replaced with the address of the VPN service so your identity is still masked.

Whilst communicating with your friend, it's as if there is a secure tunnel between
the two of you protecting the contents. This is why it is called a virtual tunnel or
more commonly, a VPN tunnel.

The origin of your data is hidden so the websites and servers you visit can’t see
where your activity originated. Rather, the activity appears to originate at the
location of the VPN’s server.

The process of encapsulating the data hides its origin, but it isn’t automatically
private or secure from hackers or government surveillance. To achieve a higher
level of security, your data must also be encrypted so if your data is intercepted
between your device and the VPN’s server, it can’t be read or understood.

You have a right to privacy—even when you’re online. And when you use a VPN
tunnel to go online, you protect your online activity and private data from hackers,
governments and corporations who want to watch what you do.

How Does VPN Tunneling Work?

It helps to think of VPN tunneling as a two-fold process of data encapsulation and


data encryption.

Data encapsulation: Encapsulation is the process of wrapping an internet data


packet inside of another packet. You can think of this as the outer tunnel structure,
like putting a letter inside of an envelope for sending.

Data encryption: However, just having a tunnel isn't enough. Encryption


scrambles and locks the contents of the letter, i.e. your data, so that it can't be open
and read by anyone except the intended receiver.

VPN protocols

VPN protocols ensure an appropriate level of security to connected systems when


the underlying network infrastructure alone cannot provide it. There are several
different protocols used to secure and encrypt users and corporate data. They
include:

IP security (IPsec)

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Point-To-Point Tunneling Protocol (PPTP)

Layer 2 Tunneling Protocol (L2TP)

OpenVPN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy