Dynamic Virtual Private Network
#1

Definition
Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally designed with businesses in mind. It lacks the technology required for secure business transactions and communications. A challenge therefore arises for businesses with intranet, i.e. how to establish and maintain trust in an environment which was originally designed for open access to information. More specifically, a way has to be found to secure an intranet without impinging on its inherent benefits of flexibility, interoperability and ease of use.

Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provide both high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs. Our dynamic VPN can provide this flexibility based on a unique agent-based architecture as well as other features.

Because information can now be made available in such a flexible and fine-grained fashion, a company's files, documents or data that had to locked in the past can now be accessed in either whole or in part to carefully selected groups of users in precisely determined ways. As a result, a dynamic VPN is an intranet enabler. It enables an intranet to offer more services and services than it could otherwise, thereby allowing the business to make more use of its information resources.

In order to accommodate new, changing and expanding groups of users and provide these users with information in a number of ways, intranets should deliver several benefits, including flexibility, interoperability, ease of use and extendibility. In particular, they should be open and and standards based, so information can be read by different users with different applications on different platforms.

However, the benefits promised by intranets lead to an important challenge for businesses using this technology: how to establish and maintain trust in an environment which was designed originally for free and open access to information. The Internet was not designed with business security in mind. It was designed by universities as an open network where users could access, share and add to information as early as possible. A way has to be found to secure an intranet for businesses without impinging on the intranet's inherent benefits of flexibility interoperability and ease of use. Indeed, an ideal solution must also provide not only the highest levels of security but also security in such a way that users can easily access, modify and share more information, not less, under carefully controlled and maintained conditions.

The most appropriate and successful answer to this challenge will be a DYNAMIC VIRTUAL PRIVATE NETWORK. Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provides both extremely high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs.

A dynamic VPN is actually an intranet enabler. It enables an intranet to offer more resources and services than it could otherwise, thereby allowing the business to make more use of its information resources.




Major Drawbacks Of VPN
The single major problem on the road to VPN is network security. Because VPN is connected to a public network. , the internet, it is prone to be hacked. Though all networks have some basic security that prevents such access they are often insufficient. The main threat is to the data that is transmitted through the internet. Then the user at this has to be sure that the person at the other is really the person who he claims to be. This protects data through a combination of encryption, host authentication and protocol tunneling. The commonly used basic protecting data is encryption. This involves scrambling the data using an algorithm so that even if the transmitted data is tapped, it cannot be decoded without the correct key
Reply
#2

[attachment=12360]
ABSTRACT
Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally designed with businesses in mind. It lacks the technology required for secure business transactions and communications. A challenge therefore arises for businesses with intranet, i.e. how to establish and maintain trust in an environment which was originally designed for open access to information. More specifically, a way has to be found to secure an intranet without impinging on its inherent benefits of flexibility, interoperability and ease of use.
Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provide both high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs. Our dynamic VPN can provide this flexibility based on a unique agent-based architecture as well as other features.
Because information can now be made available in such a flexible and fine-grained fashion, a company’s files, documents or data that had to locked in the past can now be accessed in either whole or in part to carefully selected groups of users in precisely determined ways. As a result, a dynamic VPN is an intranet enabler. It enables an intranet to offer more services and services than it could otherwise, thereby allowing the business to make more use of its information resources.
Chapter-1
Introduction to Topic

In order to accommodate new, changing and expanding groups of users and provide these users with information in a number of ways, intranets should deliver several benefits, including flexibility, interoperability, ease of use and extendibility. In particular, they should be open and and standards based, so information can be read by different users with different applications on different platforms.
However, the benefits promised by intranets lead to an important challenge for businesses using this technology: how to establish and maintain trust in an environment which was designed originally for free and open access to information. The Internet was not designed with business security in mind. It was designed by universities as an open network where users could access, share and add to information as early as possible. A way has to be found to secure an intranet for businesses without impinging on the intranet’s inherent benefits of flexibility interoperability and ease of use. Indeed, an ideal solution must also provide not only the highest levels of security but also security in such a way that users can easily access, modify and share more information, not less, under carefully controlled and maintained conditions.
The most appropriate and successful answer to this challenge will be a DYNAMIC VIRTUAL PRIVATE NETWORK. Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provides both extremely high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs.
A dynamic VPN is actually an intranet enabler. It enables an intranet to offer more resources and services than it could otherwise, thereby allowing the business to make more use of its information resources.
1.1 Understanding Security Needs
In thinking about the challenge of the trust in an open, changing environment, we will examine the security needs first. Security for an Intranet is based on several hardware and software components. Specific mechanisms and technology will vary, but what is sometimes called “industrial-strength” security must always satisfy the following basic needs:
• Privacy, with the ability to scramble or encrypt the messages across an unsecured network.
• Access control, determining who is given access to a system or network, as well as what and how information someone can receive.
• Authentication, which verifies the identity of the two companies executing the transaction.
• Integrity, ensuring that the messages or files have not been altered in transit.
• Non-repudiation, which prevents the two companies from denying that they send or receive a file.
1.2 Accommodating changes
Along with industrial-strength security, an Intranet must also be able to accommodate changing information needs involving multiple groups of users arranged in multiple ways on an ongoing dynamic basis. User groups might include employees according to department, rank or location. Other groups might include members of organizations, subscribers to services, corporate vendors, or the general public. One person might also be a member of several groups concurrently. At the same time, membership in each group is constantly varying as members join or leave the groups.
1.3 The solution: A Dynamic VPN
To meet the challenge of establishing and maintaining trust in an open, changing environment, the best strategy is to implement what we call a dynamic VPN.
In general, any VPN is a process whereby the public networks (the Internet) is secured in order to function as if it were a private network. As such, a VPN is not defined by specialized circuits or routes. Rather, it is defined by security mechanisms and procedures that allow only appointed users access to the VPN and the information that flows through it.
VPNs are not new. Dynamic VPN is appropriate for intranet security by its dynamic nature. By dynamic, we mean its ability to accommodate open, changing business environments. This ability is based on a unique architecture and set of other features.
1.4 MAJOR DRAWBACKS OF VPN
The single major problem on the road to VPN is network security. Because VPN is connected to a public network. , the internet, it is prone to be hacked. Though all networks have some basic security that prevents such access they are often insufficient. The main threat is to the data that is transmitted through the internet. Then the user at this has to be sure that the person at the other is really the person who he claims to be.
This protects data through a combination of encryption, host authentication and protocol tunneling. The commonly used basic protecting data
is encryption. This involves scrambling the data using an algorithm so that even if the transmitted data is tapped, it cannot be decoded without the correct key.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: private school jobs manhattan, project based on virtual private network, virtual private network architecture, best 50 private, virtual privatr network seminar report, top private california, canadian virtual universities,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,543 20-02-2019, 01:16 PM
Last Post:
  network security seminars report computer science technology 14 20,511 24-11-2018, 01:19 AM
Last Post:
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,824 14-07-2015, 02:24 PM
Last Post: seminar report asees
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,356 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Virtual keyboard computer science crazy 3 3,493 17-09-2014, 10:23 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,924 30-03-2014, 04:40 AM
Last Post: Guest
  Dynamic Synchronous Transfer Mode computer science crazy 3 4,574 19-02-2014, 03:29 AM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 12 17,855 17-07-2013, 04:08 PM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 10,347 28-02-2013, 02:42 PM
Last Post: Guest
  Network security and protocols project topics 1 2,239 24-01-2013, 12:41 PM
Last Post: seminar details

Forum Jump: