Difference between revisions of "VPN"
From ForensicsWiki
m (caterogies) |
|||
Line 18: | Line 18: | ||
* Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams. | * Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams. | ||
− | [[Category:Anti- | + | [[Category:Anti-Forensics]] |
[[Category:Network Forensics]] | [[Category:Network Forensics]] | ||
+ | [[Category:Encryption]] |
Revision as of 19:06, 15 October 2008
Please help to improve this article by expanding it.
|
VPN (Virtual Private Network) is a computer network in which some of the links between nodes are carried by connections in another network (with optional encryption).
Overview
Virtual Private Networks are widely used by organizations and individuals for different purposes:
- Protecting confidential information in organizations;
- Providing employees with secure remote access to the network;
- Securing Internet traffic in insecure networks (e.g. open wireless networks).
Some VPN services are focused on providing solutions to promote fraud. In this case, VPN service is used for anonymity.
VPN and anonymity
- Log files: VPN services may maintain usage logs;
- Protocol stack: TCP timestamps and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.