Difference between revisions of "VPN"

From ForensicsWiki
Jump to: navigation, search
m (caterogies)
Line 18: Line 18:
 
* Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.
 
* Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.
  
[[Category:Anti-forensics tools]]
+
[[Category:Anti-Forensics]]
 
[[Category:Network Forensics]]
 
[[Category:Network Forensics]]
 +
[[Category:Encryption]]

Revision as of 15:06, 15 October 2008

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

VPN (Virtual Private Network) is a computer network in which some of the links between nodes are carried by connections in another network (with optional encryption).

Overview

Virtual Private Networks are widely used by organizations and individuals for different purposes:

  • Protecting confidential information in organizations;
  • Providing employees with secure remote access to the network;
  • Securing Internet traffic in insecure networks (e.g. open wireless networks).

Some VPN services are focused on providing solutions to promote fraud. In this case, VPN service is used for anonymity.

VPN and anonymity

  • Log files: VPN services may maintain usage logs;
  • Protocol stack: TCP timestamps and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.